The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, monitoring per-flow metrics, such as throughput and delay, in OpenFlow networks represents an important input to implement traffic engineering approaches. Per-flow monitoring mechanisms require to uniquely identify the complete network path followed by all the packets of the corresponding flow. For example, in order to measure path delay, monitoring mechanisms regularly inject probe packets...
The significant growth in the number of access points deployed in WLAN stimulates research efforts to focus on finding solutions to reduce the power consumed by their components. One promising approach is to put the access points (or at least its radio interface) into sleep mode when no activity is detected on the channel. In this paper we designed and implemented a measurement platform which can...
This paper summarizes the recent changes to the hardware and software systems associated with the diagnostic digitizer triggers and their data acquisition control program at the Saturn pulsed power facility at Sandia National Laboratories. The main screen room contains approximately 70 digitizing scopes for monitoring 6 voltage or current probes along each of its 36 energy storage and transmission...
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a serious challenge of sustenance amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial of service (DoS) attack poses serious threats to legitimate...
To promptly identify a path failure and transfer an ongoing data stream to another lively path, we have proposed a path failure detection and recovery mechanism in an ID/locator-split network architecture, called HIMALIS. Unlike traditional solutions, the proposed mechanism provides better resiliency to path failure independently of the network and transport layers protocols. This paper presents an...
With the explosive growth and wide spread of smartphones with Wi-Fi enabled, people are used to accessing the internet through Wi-Fi network interfaces of smartphones. In the meanwhile, smartphones periodically transmit Wi-Fi messages, even when not to connect to a network. In this paper, we describes the Mo-Fi system which monitors and aggregates Wi-Fi message transmissions in the area of interest...
We consider a large-scale cyber network with N components. Each component is either in a healthy state or an abnormal state. To model scenarios where attacks to the network may not follow a stochastic process and the attackers may adapt to the actions of the intrusion detection system (IDS) in an arbitrary and unknown way, we adopt a non-stochastic model in which the attack process at each component...
Based on the analysis of the IEEE 1149.4 Std for a Mixed-Signal Test Bus, this paper analyzed the working and use principle of STA400 that supports the IEEE1149.4 Std in detail. Then this paper proposed constructive view on its use in design for testability on analog circuits, which has practical significance to the use of IEEE1149.4 Std.
We propose a circuit switching Network-on-chip with a parallel probe searching setup method, which can search the entire network in constant time, only dependent on the network size but independent of the network load. Under a specific search policy, the setup procedure is guaranteed to terminate in time 3D+6 cycles, where D is the geometric distance between source and destination. If a path can be...
In large network environment, in the application of Etrust Intrusion Detection and Netflow Analysis, we need to solve the following problems: data type and acquisition method. An overall comparison between 4 current netflow acquisition technologies based on flow is made in this paper from network application level, flow data comprehensiveness, data acquisition protocol, installation and deployment...
We consider portable software implementations of hash tables with timeouts. The context is a high volume stream of keyed items. When a new item arrives, we want to know if has been seen recently in terms of a fixed lifespan.
At present, harmful information promulgated on the internat has become an important social proble, which not only poisons people's mind, but also might effect social stability and country security. In order to reinforce the control of the network infromation and guarantee the security of the content promulgated on networks, the paper proposes a content-based network monitoring system. This paper first...
In modern day data networks, with the increased focus on aspects like network security, band-width optimization and intrusion detection, network monitoring has become an integral part of network design. This paper discusses a method for accelerating the network policing using node capabilities. Presently network monitoring requires the hardware component regeneration tap for packet duplication and...
The size, heterogeneity and dynamism of the execution platforms of scientific applications, like computational grids, make using those platforms complex. Furthermore, today there is no effective and relatively simple solution to the programming of these applications independently of the target architectures. Using the master-worker paradigm in software components can provide a high level abstraction...
This paper introduces a general framework directed for system instrumentation. The introduced framework provides support for a system instrumentation approach that enables designing information capture, monitoring and analysis features into a software-intensive system. We describe the general concept, architecture and implementation of the framework and two case studies in its application. As a prototyping...
We report thermoelectric characterization of Bi2-xSbxTe3 (x = 0.5, 1.0, and 1.5) synthesized by a solvothermal method using DMF as solvent. For Bi2Te3, the size of the edge and thickness of the hexagonal nanoplatelets are 200-250 nm and 20-25 nm, respectively. Bi2Te3 nanosheets appear to grow epitaxially from the surface of the Te tubes, which forms in the first step and acts as the template for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.