The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of interesting problems, arising with deployment of large-scale systems, is integration of its nodes (systems / devices). In this work, we discus how to apply semantic technologies, as a mechanism to support node integration and facilitate interoperability within the developed ecosystem. We focus on pragmatic aspects of the proposed solution, discussed from the perspective of the Dependable Embedded...
In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed...
The idea of the Internet of Things, which emerged in recent years, became one of the main fields of interest in industrial and academic research. The Constrained Application Protocol (CoAP) is one of the technologies aspiring to a standard in the IoT world. CoAP was designed to provide a low-overhead, machine-to-machine communication for constrained devices in a way similar to HTTP. In this paper...
Service architecture of the Internet becomes more and more complex as it expands as a medium for large-scale distribution of diverse content. Dynamic growth of various content distribution systems, deployed by influential Internet companies, content distributors, aggregators and owners, has substantial impact on distribution of the network traffic and the scalability of various Internet services....
To better improve the information security and mobility issues, many enterprises have started to adopt virtual desktop technologies environment. During the setup stage of current virtual desktop services, user access authority must be predefined roughly as network access level control and other applications restriction respectively. Unfortunately, the authorization capability for IP network access...
The notion of Mobile IP (MIP) has been developed to support mobility of mobile nodes over the Internet. But MIP has many drawbacks like frequent registration of care-of-address, triangular routing, etc. To overcome the frequent registration, hierarchical mobility management scheme for mobile IP networks (HMIP) has been suggested. The signaling cost and communication overhead due the registration procedure...
This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected...
Wireless sensor networks are used for monitoring phenomena using spatially distributed sensor nodes. A wireless sensor network may be far away from a server which collects and processes data from the network. In that case, one or more gateways are used to connect the network to the remote server via TCP/IP or UDP/IP. To speed up testing and deployment of a network, we have developed a simulator which...
With advances in low-power and low-cost wireless and sensor technologies, using WSNs in eHealthCare system has yielded tremendous efforts in recent years. However, most of previous researches adopt a remote server to process large scale of health sensor data forwarded by gateways that allow for interconnecting WSNs to IP network. In this paper, we present a prototype of a smart 6LoWPAN border router...
everal protocols for routing and forwarding in Wireless Mesh Networks (WMN) have been proposed, such as AODV, OLSR or B.A.T.M.A.N. However, providing support for e.g. flow-based routing where flows of one source take different paths through the network is hard to implement in a unified way using traditional routing protocols. OpenFlow is an emerging technology which makes network elements such as...
This paper analyzes database requirement of embedded development and embedded Web server, combines with the database design on embedded home gateway using SQLite architecture, and implements the SQLite embedded database on home gateway. Web server is successfully ported, and embedded Linux operation system is ported to home gateway platform.
Wireless Sensor Networks (WSNs) are at high speed gaining in popularity. Because of this increased adoption, the need for integration with existing technologies becomes more prominent. In practice, a WSN is often deployed in environments where both wired and wireless data networks are also present. Consider for instance a WSN which acts as a climate monitoring or fire detection system in a large office...
VoIP is becoming the dominant approach for telephony and its growth will continue with the upcoming introduction of 4G mobile wireless and fibre to the home networks. With the growing demand for VoIP and increased VoIP traffic, it is important to implement a system that provides interoperability between the existing telephony numbering system and the IP network device addresses. Infrastructure ENUM...
The emergency call service is to forward the emergency call originated from subscribers in an emergency situation to the nearest PSAP (Public Safety Answering Point) based on their location. However, it is relatively difficult to measure an accurate location of subscribers of the internet telephone based on the IP address. Therefore, the paper introduces methods and implemented examples in the KT...
Softswitching is a significant technology of the Next-Generation Network, but it can't be widely used if there isn't a provisioning system supporting it. The workflow-based Softswitching provisioning system in this paper helps engineers working together even they are not in the same location, and provides an easier way to configure the devices quickly and correctly. It not only improves efficiency...
In this paper, the technology of auxiliary VLAN is discussed. When IP phones are connected to the existing switch-based campus area network, the data traffic and voice traffic are present on the VLAN at the same time. To avoid a significant reduction on the quality of the VoIP traffic, the voice traffic is separated from the data traffic on an auxiliary VLAN. In an IP PBX, there are three frame types...
In this paper, we propose a gateway system for wireless sensor network based on environmental monitoring. Resource sharing and long-distance accessing are important issues for application of wireless sensor network and environmental monitoring. Itpsilas necessary to connect wireless sensor network to external network which makes the administrator could access data duly and expediently from long-distance...
This paper describes the integration of the presence management service into existing IP Multimedia Subsystem (IMS) laboratory infrastructures. Both laboratories - NGNlab in Bratislava and the laboratory in Leipzig - use the Fraunhofer OpenIMS as core components for their testing IMS environment (i.e. Call Session Control Functions (CSCF), Home Subscriber Server (HSS)). The virtualization of these...
This paper constructs an architectural model of database gateway, which can monitor and record the data flow between users and databases of digital library. Then it introduces cosine Similarity Algorithm, and proposes COSDCSU, (DCSU, databases choice stickiness of user) to present the similarity of choice tendency in user pairs. Furthermore, it discusses the Interval Probability distribution of COS...
The approach currently being taken by ETSI (BSM) in defining future open standards for network management architecture for IP-based broadband multimedia satellite systems is described. This work has recently begun and the final objective is to arrive at a consensus for an architecture which meets the requirements of compatibility and interworking with external networks (e.g. within the NGN) and is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.