The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The loT (Internet of things) is emerging as a wide variety of devices are attached to the Internet to support ubiquitous and pervasive sensing and computing, home automation, and the shift toward smart cities. As the IoT becomes a critical part of the Global Internet on which we increasingly rely, resilience is increasingly important. Of greatest concern is resilience to large-scale disasters that...
Container-based Software-as-a-Service (SaaS) systems are rapidly emerging as a dominate cloud deployment paradigm, as supported via Docker, etc. This has opened new research avenues as lighter-weight containers replace heavier-weight virtual machines (VMs) as atomic cloud deployment units. Advancing such research requires sufficiently rich, container-aware cloud simulation frameworks so as to explore...
In this paper, we present an environment for the simulation of DRDoS attacks and protection mechanisms against them. The main difficulties of simulating attacks of this type are listed, the ways of their solution in the form of a system approach are shown.
The technological rebellion has made current generations to depend more on the digital world in their day to day life. The effectiveness of the digital world has changed the learner's perceptive towards the education system. The impulsivegrowth of technology has increased the popularity of Information and Communication Technology which has created a research scope in Computer network domain thus Computer...
A wireless sensor network (WSN) is a collection of sensor nodes which can monitor the physical activities and attributes of a whole spectrum of objects and environments. The purpose of collecting this data and processing it in a meaningful manner requires that it adds significant value to the end user. WSN are deployed ever more frequently and applications vary from providing an early alert system...
Ns-3 is a widely used as a the network simulator of choice by researchers. It contains many well tested and high quality models of network protocols. However, the application layer models of ns-3 are very simplistic, and do not capture all aspects of real life applications. As a result, there is often a huge gap between the results of real experiments and the corresponding simulations. This problem...
Cloud computing has experienced enormous popularity and adoption in many areas, such as research, medical, web, and e-commerce. Providers, like Amazon, Google, Microsoft, and Yahoo have deployed their cloud services for use. Cloud computing pay-as-you-go model, on demand scaling, and low maintenance cost has attracted many users. The widespread adoption of cloud paradigm upshots various challenges...
It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication...
The distributed computing of data is a challenging task in terms of the self-organizing task distribution and computing, especially if distributed computing systems are becoming very large and complex. Therefore, the distributed hash table (DHT)-based P2P system called DuDE has been developed to compute statistics of access nodes of Internet service providers in an efficient way. DuDE exploits the...
Network simulations mostly focus on protocol observation, development, and prediction. However, newly developed protocol will take time to become standard and be implemented on network devices. A faster way of network improvement is to optimize existing network card parameters, because they are generic and protocol-independent. In this paper, we propose mathematical models to represent network card...
Efficient and accurate network simulation techniques are critical for evaluating protocols and systems at scale. For example, the magnitude of modern data center deployments requires the use of fast simulation techniques in order to evaluate newly proposed algorithms and system architectures. Unfortunately, efficient simulation can come at the cost of accuracy and realism. In this work-in-progress...
A contemporary governance challenge for governments concerns the biogas domain: what incentives and policies can lead to a viable biogas economy? To support addressing this challenge, a prototype of a simulator is constructed in which horizontal governance is applied in a multi-stakeholder context. This paper reports on the modelling and knowledge acquisition that led to the development of that prototype...
Distributed systems can be characterized by processes that communicate with each other by message passing, through communication channels, and may be located at several computers spread over a communication network. These processes and communication channels are usually characterized by synchronous or asynchronous timeliness behavior, according to the characteristics of underlying system (operating...
Traffics produced by P2P system such as BitTorrent, Skype, etc, has been the primary networking traffic. Peer-to-peer systems can be very large and highly dynamic. Therefore, testing a new algorithm for P2P computing in real Internet is impractical and expensive. Simulation is another feasible approach to test new algorithms or investigate P2P system behaviors. Many P2P-oriented simulators have been...
In recent years there has been rapidly increasing activity in identifying and proposing various methods for supporting the development and deployment of assisted living systems that utilize remote monitoring and modern communications technology. Such systems often rely on streams of sensor data for intelligent methods of analyzing daily activity patterns and acting on any detected exception conditions...
Computer Generated Forces (CGF) lacks an effective collaboration method. As a result of this, Based on the traditional contract net protocol, a integrated contract net protocol suitable for CGF collaboration is proposed in which strategies such as interaction trust, witness trust and threshold value are integrated. In order to ensure integrity, correctness and reliability of integrated contract net...
The paper presents a new approach to the simulation of RFID dynamic systems. The designed simulation model is strictly based on the system principle of operation being in accordance with the standard ISO 18000-6. Therefore it is applicable to a great number of existing RFID systems. A genuine matrix notation for describing the system state during identification process was used. The model makes the...
In Delay Tolerant Networks (DTNs), characteristics of mobility model have essential impact on routing protocols design and verification. Most of current studies about network characteristics are derived from theoretical models or small-scale real network traces. Properties of nodes in those networks are simple and can not reflect features in large-scale applications. In addition, few studies focus...
Nowadays, communication technology is increasingly used in Chinese Train Control System. And the Railway Signal Safety Communication protocol is the upper layer protocol that ensures safety transmission of safety related information in a non-trusted channel. The characteristics and behavior pattern of the protocol are closely related to the safety of the whole railway signal system. This paper simulates...
EPA (Ethernet for Plant Automation) resolves the nondeterministic problem of Ethernet through sub-segment topology and deterministic scheduling mechanism. In this paper, the EPA scheduling mechanism is implemented by simulation tool. And the influence of EPA scheduling mechanism on network performance is shown in the simulation result. According to the study, the real-time performance of EPA periodic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.