Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Opportunistic networks are formed by people carrying mobile devices with wireless capabilities. When in mutual transmission range, the nodes of such networks use device-to-device communication to automatically exchange data, without requiring fixed infrastructure. To solve challenging opportunistic networking problems like routing, nodes exchange information about whom they have met in the past and...
We present a work in progress of an adaptive security management scheme for wireless sensor networks. The unique characteristics of these networks place great demands on their design and operation in terms of resource and security management. Resource and security adaptability achieved through self- and context-awareness will take the feasibility of the networks to a new level. The scheme has self-...
Routing is an important and critical issue for successful transmission in Vehicular Ad-hoc Networks (VANETs). Most of the traditionally designed routing schemes are based on optimising their parameters individually in the existing VANET architecture. Such approaches may not result in an overall efficient system. Therefore, it is important to consider various parameters from multiple layers such as...
Wireless mesh networks (WMN) are efficient and low cost solutions for the deployment of broadband access in various environments. While the capacity and the bandwidth availability of single radio WMNs may severely limit QoS, multiradio cognitive WMNs (CWMN) can provide better QoS mechanisms. This paper describes a multihop backpressure scheduling algorithm which ensures that the available bandwidth...
Radio Admission Control (RAC) is a key function of the Radio Resource Management (RRM) at layer 3 of an eNodeB; however, the 3GPP standard does not specify the RAC and is left as an eNodeB vendor specific. Most admission control schemes proposed to date do not ensure differentiation among the users at different priority levels. Also, they do not provide fairness among the users with the same priority...
A primary task in wireless sensor networks (WSNs) is for sensors to communicate collected data to a sink for analysis and processing. A single sink in the network can lead to high energy consumption and hence, a reduction of the network lifetime. Thus, to achieve a degree of fault tolerance we consider the problem, where the hop distance from every sensor to a sink is bounded by an integer k and each...
The impact of natural disasters can be catastrophic for communication networks and may cause significant costs for service providers and subscribers. Dynamic spreading of failures in natural disasters follows a time-varying probabilistic pattern, which requires a dynamic probabilistic response to mitigate the effect of failures. In this paper we examine the preventive protection scheme as an effective...
When a disaster happens, the communication network is very likely to be damaged. Since communication is critical for coordinating the operations of disaster recovery, restoring the communication network is always the first priority. In many situations, however, the breakdown of the communication network results from the cutoff of the power network, and it is difficult to recover the power network...
In the last few years, we have witness many disasters which destroyed communication networks to the outside world. Wireless mesh network (WMN) is one of the best choices for establishing a network during disaster recovery. In most disaster area, the reliability of WMNs decreased rapidly due any unpredictable environment changes. The disruption of services are often introducing delay and dropping of...
When data is transferred between nodes in a network, it is often transferred in-order. However, in distributed systems, such as peer-to-peer networks and cloud-based systems, transferring data out-of-order can be advantageous, for instance by improving transfer speed, availability and reliability. With the intent of creating a reusable formalism that can describe the complexities of out-of-order content...
Network controller is the core of the OpenFlow-Based Software-Defined Networks (SDN). High availability of network controller is an urgent need objectively. The appearance of controller instance fault should not be perceived by data plane. During the fault recovery, OpenFlow messages, especially asynchronous message from data plane, should not be discarded. Otherwise the control platform would hold...
Given peoples increasing dependence on communication networks, vulnerabilities of communication networks and the Internet can significantly impact our lives. These networks and services are susceptible to accidents or natural disasters that can disrupt service and compromised the network infrastructure. In the face of these disasters, the need for greater resilience for the Internet has attracted...
The exponential growing demand of mobile Internet data traffic requires a rethinking of current infrastructures and calls for innovative approaches that provide online-streaming of content to interested subscribed mobile users. We introduce a mobile system called HyCloud for device-to-device content distribution. HyCloud delivers the content from a cloud backend, and it can reduce the total amount...
Advances in micro-electro-mechanical systems (MEMS), computing hardware, and software algorithms for wireless sensor networks (WSNs) have boosted the adoption of WSNs, also known as machine-to-machine (M2M) communications systems, in many fields, including vehicle tracking, supply chain management, security, and healthcare. Due to the large scale of the deployments of many commercial applications,...
We present a solution for service discovery of resource constrained devices based on mDNS/DNS-SD. We extend the mDNS/DNS-SD service discovery protocol with support for proxy servers. Proxy servers temporarily store information about services offered on resource constrained devices and respond on their behalf while they are not available. We analyze two protocols for the delegation mechanism between...
For security concerns, a security traversal service can route data flows through a sequences of security devices (middleboxes). In this paper, we identify the problem of delay guarantee in security traversal and propose a scheme to dynamically change the security traversal path. To provide deterministic delay guarantee with minimum virtual machine (VM) and transmission cost, we model this security...
In this paper, we discuss optimal controller placement for Software Defined Networks (SDN) and propose a non-zero-sum game based distributed technique. Our proposed technique is a simple and low-complexity solution which runs in real-time. This can be implemented as an optimization engine at each SDN controller. The optimization engine at each controller computes a payoff function and compares its...
Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication aims to increase safety, efficiency, and comfort of drivers. Vehicles periodically broadcast their current status, such as position, velocity, and other information. Received information is stored in a local knowledge base, often called world model, and used for application decisions. Because of the potential impact, V2V communication...
Home networks are becoming increasingly rich in devices and applications, but continue to share the broadband link in a neutral way. We believe the time is ripe to personalize the home network experience, allowing a household to differentiate its users (e.g. father's laptop prioritized over kid's iPad) and services (e.g. video streaming prioritized over downloading). In this paper we argue that SDN...
We investigate the network connectivity of Vehicular Ad Hoc Networks (VANETs) for a typical highway at the free flow state. We propose a new approach to model the spatial distribution of vehicles in a given area using the statistical properties of spatial point patterns. We consider the VANET as a homogenous Poisson point process in which the number of vehicles per unit area has a Poisson distribution...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.