The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into network device tables. With heterogeneous devices, deployment is strongly bounded by the respective table constraints (size, lookup time, etc.) and forwarding pipelines. Hence, minimising the overall...
Social Media plays an increasingly important role in humanitarian and disaster response scenarios. However, typical social media applications rely on internet connectivity, and as a result are often not available during the acute phase of disasters. The MeshMS service of the Serval Mesh established the practicality of implementing a secure and private SMS-like textmessaging facility that can be used...
User story literature nearly exclusively studies how to create, prioritise, or ensure the quality of a user story. Little is known about other activities and artefacts involved preceding or following these activities in systems development. Consequentially, software teams seeking to leverage user stories’ full potential do not know how to incorporate user stories into all aspects of their software...
Being able to record and analyze data securely have a paramount importance to meet the needs of both military and civilian applications. Therefore, data acquisition systems are used to meet the needs of complex applications. A data acquisition system capable of data conversion, collection and transfer is described in this paper. This system is implemented on FPGA, because of high processing speed...
A tele-monitoring system, based on a soft transducer network, developed by students of the Course "Measurements on Communications Network" (MRC), at the Department of Electrical Engineering and Information Technology, University of Naples Federico II, is presented. This project is the result of an innovative education approach for (i) overcoming specialization of single Courses on different...
The P4 language provides a way to describe a custom network packet processing behavior that involves header parsing, matching and assembling modified packets. Such abstraction represents a significant step towards removing the limitation of fixed-function networking devices. Our live demonstration shows a straightforward usage of an algorithm and tool that maps a P4 program to a general architecture...
The paper presents experimental research related to pH measuring and to the design of a system of pH monitoring. The paper is structured on three parts. The first part presents the principle of measuring the pH of a solution matter, the transducer structure and of the adaptor used. The second part is dedicated to the experimental research effectuated aiming at the use of PACTware software environment...
The document contains a comparative analysis of the key technologies to ensure collaboration of telecommunication networks that were built with using different versions of IP protocol: dual stack; tunneling and encapsulation; translation of the protocols. Two groups of factors are proposed: factors that will influence the choice of the technical migration way to the IPv6 stack and the factors that...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
In this paper, an overview of a testing and simulation approach for a DTN protocol implementation (named µPCN) is provided. This implementation is intended to render low-cost world-wide satellite communication possible. It will be flighttested during the ESA OPS-SAT mission. To ensure its quality, a simulation environment has been developed used for testing its functionality in simulated LEO satellite...
Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN...
Mission spacecraft telemetry data formats have some complex characteristics. The formats have hierarchical and nested structures which need to be processed cross frames. The formats also have complex parameter dependencies and change frequently. So we design Multi-Channel-Protocol(MCP) Model. This model has the advantage of strong expressiveness, good versatility and scalability. This model is utilized...
For much of the past decade NASA and other organizations have been developing the Disruption Tolerant Networking protocol suite with a primary focus on bringing internet-like functionality to space missions. Now that the core protocols are complete, engineers are beginning to incorporate DTN into mission system designs. When we look across the NASA mission needs over the next decade, there are multiple...
Scientific HPC applications along with the emerging class of Big Data and Machine Learning workloads are rapidly driving the fabric scale both on premises and in the cloud. Achieving high aggregate fabric throughput is paramount to the overall performance of the application. However, achieving high fabric throughput at scale can be challenging - that is, the application communication pattern will...
Novel trusted hardware extensions such as Intel's SGX enable user-space applications to be protected against potentially malicious operating systems. Moreover, SGX supports strong attestation guarantees, whereby remote parties can be convinced of the trustworthy nature of the executing user-space application. These developments are particularly interesting in the context of large-scale privacy-preserving...
The success of the Internet around the world has produced many benefits, but due to IP protocol stack limitations, the IP addresses exhaustion problem soon arose. Although it has been proposed several solutions to alleviate it, the problem still remains, specially in the emerging countries, which have a reduced pool of public IPv4 addresses. Classless Inter-Domain Routing (CIDR) scheme has partially...
Highway Addressable Remote Transducer (HART) is an open fieldbus protocol for industrial automation and implemented in almost all the commercially available field transmitters and actuators. This paper details the intricacies and challenges involved in designing a HART Analog Input Module (HAIM) for the indigenous Supervisory Control And Data Acquisition (SCADA) solution developed at the Control and...
The ability to recognize emotions in spoken words is central in human communication and social relationships. When studying one's ability to perceive emotions, the standard paradigm is to have listeners choose which one of several emotion words best characterizes linguistically neutral utterances made by actors attempting to portray various emotional states. Usually, generic experiment control software...
The first release of hardware transactional memory (HTM) as commodity processor posed the question of how to efficiently handle its best-effort nature. In this paper we present Part-HTM, a hybrid transactional memory protocol that solves the problem of transactions aborted due to the resource limitations (space/time) of current best-effort HTM. The basic idea of Part-HTM is to partition those transactions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.