The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Functions Virtualization (NFV) is a new network paradigm that has been strongly promoted from both scientific community and telecom industry, where network functions (NFs) such as firewalls, load balancers, gateways among others, are virtualized, isolated from middleboxes and housed on one or more industry standard computing nodes. One of the main challenges for service providers when they...
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
Nowadays multiple bus communication types are comprehensively employed to construct different networks in vehicles information system design. Data interchange among these networks must be conducted through complex communication gateways, which are difficult to test all the features wholly by manual work. MIC and RS422 communication networks are very common in some special vehicles, so in this paper...
In this paper, we study a resource granularity effect on the optimal resource assignment of MME and S/P-GW in a single vEPC server. We distinguished communications of M2M devices and smartphones and modeled the vEPC server by using queueing theory. Numerical analysis under a fixed number of hardware resources of MME and S/P-GW is done for various resource granularities of the vEPC server. The evaluation...
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains (SFCs), a common cloud and...
Prior load balancing solutions for chaining virtualized network functions cause significant control and data plane overheads and demand special requirements on network hardware. In this study, we present the design, implementation, and evaluation of Hash-based Traffic Steering on Softswitches (HATS), a load balancing mechanism that aims at mitigating such drawbacks. The method exploits flow hashing...
Agile environmental monitoring is a novel style of environmental-monitoring development that lets you rapidly develop sensor devices and monitoring systems through trial and error during continuous sensing. The authors developed three environmental-monitoring systems and adapted them in situ based on actual field requirements. This article is part of a special issue on smart cities.
We propose an implementation of a secured content addressable memory (SCAM) based on homomorphic encryption (HE), where HE is used to compute the word matching function without the processor knowing what is being searched and the result of matching. By exploiting the shallow logic structure (XNOR followed by AND) of content addressable memory (CAM), we show that SCAM can be implemented with only additive...
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually...
A virtualized network infrastructure is composed of multiple virtualized network functions (VNF) interconnected by well defined interfaces, and thus forming a VNF-graph. The initial deployment of such a VNF-graph inside a data center (DC) is a complex task with multidimensional aspects compared to deploying a single VNF that may represent a single network function. The problem space becomes more complex...
We present a system that allows drivers and fleet managers to interact with their connected vehicles both by means of direct control and indirect goal-setting. The ability to move data from vehicles to a remote server is established by the flexible and secure open vehicle telematics platform “CloudThink.” Based on this platform, we present several prototypes of how people can be enabled to conveniently...
Increasing numbers of remotely accessed software applications are adopting Two Factor Authentication (TFA) methods, particularly when performing sensitive actions such as payment transactions. TFA methods, though addressed several weaknesses of purely password based authentication systems, have their own challenges such as their adverse effect on usability and, most notably, the operating cost. For...
With the development of information technology, the Smart home element with information electronic devices has found its way and adapted into daily life. However, the diversity of communication mode between different equipment has made it complicated to make new device accessible to Smart home. In another words, the scalability of Smart home is low. Generally, the cost of extension is expensive. The...
VXLAN (Virtual extensible Local Area Network) is an edge-overlay model that uses L2-in-L3 tunneling protocol. It has attracted attentions for multi-tenant datacenter networks. For the deployment of VXLAN in legacy networks, networks can include VXLAN gateways which forward traffic between VXLAN and non-VXLAN environments. This paper proposes the design of VXLAN gateways which are not in servers, but...
Precision agriculture and agricultural decision making assistance have attracted researchers of engineering and agronomy as well as industries as a promising application of wireless sensor network (WSN) technology. However, agriculture is an industry with severe cost-cutting pressure and there is little advance guarantee that the WSN increases profit of farmers. Compared with other applications of...
A change process in already deployed system requires its components to step through a few temporary states before they reach their desired states, however, most prevalent IT resource management tools seldom assume such temporary states. Therefore, the tools are not applicable to the change management of already deployed systems, particularly those that consist of hardware components. This paper addresses...
We investigated how to reduce the energy loss of server power supplies equipped with vertical-trench normally-off Silicon Carbide junction-gate field-effect transistors (SiC-JFETs). High-speed driving circuits consisting of a speed-up capacitor with separated source terminal and timing adjust circuits to ensure a dead time margin are proposed. Applying the developed normally-off SiC-JFETs and the...
An IT infrastructure comprises both hardware and software resources. While much progress has been made on automating the provisioning of software resources, provisioning hardware resources continues to use labor-intensive manual processes. For example, hardware provisioning tasks including most of the peripheral tasks, such as designing the system architecture, planning the tasks to deploy on it,...
In the last decade, information and communication technology has been developing rapidly. From multimedia and integration concept comes Classroom Suite (CRS), a system that enhance educational process for better education system in the school. CRS helps school in rural areas that lack of proper educator. CRS provides educational content so that an educator can teach some subject even he/she isn't...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.