The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect of human life. The IoT devices equipped with sensors are changing every domain of the world to become smarter. In particular, the majorly benifited service sectors are agriculture, industries, healthcare, control & automation, retail & logistics, and power & energy. The data generated...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
Personal Cloud Storage (PCS) is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Notably, content sharing is a key feature for PCS users. It however comes with extra costs for service providers, as shared files must be synchronized to multiple user devices, generating more downloads from cloud servers. Despite...
We have proposed a distributed storage system which dynamically makes storage tiers and optimizes location of data blocks autonomously. This aims to enhance the I/O performance of the storage system without remarkable network overhead. Our system dynamically organizes storage tiers considering device characteristics. And the data blocks will be placed in a suitable storage tier according to their...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
PerfMon is a prototype implementation of a real-time performance management method for sensor data communication in assisted living applications. It is implemented in accordance with the specification for GATT services in Bluetooth low energy (BLE). PerfMon provides a tool for real-time performance monitoring and control for caregivers and service providers. Test results from monitoring and control...
With the rapid development of the Internet of Things (IoT) technologies, IoT devices have been widely deployed. In industrial scenarios, the deployment cost including human operation and time can be increased with the scale of the network because there might be more than thousands of devices that need to be provisioned at the same time. Currently, most systems require human involvement when a newly...
An asymmetric secret sharing scheme (A-SSS) can set the number of data servers that hold shares to less than k because it can generate up to k – 1 shares from one key of the secret's owner. Therefore, the secret is not revealed even if all the data servers are attacked. However, if the owner's key is stolen and attacked, the secret may be leaked. Therefore, in this paper, we propose two proactive...
NVMe is emerging as the standard protocol for communicating with high performance storage devices over the PCIe interface, independent of the underlying storage technology. Being a relatively new standard, there is a distinct lack of tools that can help in evaluating contemporary and future storage solutions built on NVMe. In this paper, we provide the design and analysis of FlexDrive, a software...
4G/3G Networks have been widely deployed around the world to provide high wireless bandwidth for mobile users. However, the achievable 3G/4G bandwidth is still much lower than their theoretic maximum. Signal strengths and available backhaul capacities may vary significantly at different locations and times, often leading to unsatisfactory performance. Band-width aggregation, which uses multiple interfaces...
A Virtual Private Network (VPN) is a technology that is used to securely connect private network passing through a public network such as the Internet. Using a VPN, a computer, tablet, or smartphone is able to securely connect with others in the Internet as if they were part of a private network. Using this technology may also bring security threats like spoofing, snipping, and hacking as the data...
Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation...
The ability to remotely discover and configure devices in an automation network without the need for prior knowledge of the network topology or the identities of hosts and servers is a key requirement for industrial networks and cyber-physical systems. The Dynamic Host Configuration Protocol (DHCP) as a UDP-based standardized network protocol became very successful in computer networking and also...
Virtualized access to M2M (Machine-to-Machine) devices can offer to operators various benefits in terms of hardware and management costs. However, it is often impeded by the inability to efficiently handle the traffic from the devices towards servers that are appropriate to serve as virtual hosts for the given devices. In this paper we present a solution which can be applied in a virtual Home Gateway...
Constrained Application Protocol (CoAP) was developed to support the communication between resource constrained nodes via low-power links. As an Internet protocol, CoAP needs congestion control primarily to stabilize the networking operation. In this paper we propose a new round trip time based adaptive congestion control scheme, which improves CoAP by utilizing the retransmission count information...
Different architectures of interactions between the objects in the Internet of Things have been proposed, based on direct exchange of data between the wireless devices or based on synchronization with fixed network devices or cloud infrastructure. We evaluated how the selection of the communication architecture influences the performance of the data exchange using discrete event simulation. The distribution...
Traditionally, network storage systems have mainly been dominated by two IP-based storage technologies, i.e., Network Attached Storage (NAS) and Storage Area Network (SAN). In recent years, cloud based storage (e.g., Amazon S3) has gained growing popularity for its high flexibility and cross-platform compatibility. Many enterprises are considering to replace traditional storage systems with cloud-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.