The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we describe a methodology to estimate one-way packet loss from IPFIX or NetFlow flow records collected at two monitoring points. The proposed method does not require tight synchronization between the two monitoring points, nor it relies upon external routing information. It can run online or offline, and can work on legacy IPFIX/NetFlow traces which were not collected for the specific...
Traffic intersections are plenteous in this world we live in, while the efforts to secure them are not. With a little knowledge in the Department of Transportation one could easily take control of an intersection for a period of time without any interference from authorities. In this paper a proposal to encrypt such SDLC and broadband messages shall be described. DES and MD5 prove to be strong solutions...
The delivery of mobile services is traditionally limited to the cellular operator's home domain, except for a small set of standardized services. Due to the centralized nature of service platforms, resource demanding services suffer from long delays if a user is accessing them when roaming. In this paper we describe an architecture that supports a dynamic, distributed service provisioning for mobile...
Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst),...
The increasing development of configurable electronic systems for digital processing of signals from radiation detectors highlights the convenience of having more and more advanced equipment for support design and test of processing architectures from the hardware and firmware point of view. We propose a configurable design and test equipment that is able to emulate the detection process output on...
Wireless sensor networks represent relatively new data collection paradigm that is used for most of the indoor and outdoor data collecting environments. In an indoor factory monitoring environment production lines modification or expansion are necessary over time based on user and system requirements. For any kinds of modification in the production lines sensors addition and/or relocation are necessary...
Mutli-domain monitoring aims at guaranteeing QoS for services crossing several domains. It is often desirable to perform global monitoring to guarantee end-to-end QoS for services across domains and to reduce the monitoring cost. However, global monitoring might be infeasible due to confidentiality constraints. The alternative solution is to perform per-domain monitoring. In this work, we propose...
The energy consumption of ICT infrastructures has increased considerably in the recent years. This has resulted in extensive research on dynamic power management strategies as well as data centre design and placement. The main problem with most of the proposed or existing approaches is that they do not fully take the distributed nature of and strong logical dependencies between executed services into...
Mobile Ad-hoc Networks (MANETs) involve the establishment of wireless connections between mobile nodes, and can dynamically extend the coverage area of wireless local area networks (LAN). For MANETs that use a single channel, the communication performance decreases due to interferences between nodes when frames are being relayed. In this paper, we propose a priority control scheme based on neighbor...
Many algorithms have been proposed in the last decade to detect traffic anomalies in enterprise networks. However, most of these algorithms cannot detect anomalies that occur beyond enterprise boundaries. Anomaly monitoring and detection on end-to-end Internet paths, although important for network operations, is challenging due to lack of access and control over intermediate network devices. In this...
Delay boundary is an important topic for evaluating the service performance of network. In this paper, we focus on the delay boundary of the end-to-end in wireless sensor networks (WSN). We propose stochastic arrive curve model and stochastic service curve model based on stochastic network calculus (SNC), which can be applied to analyze the service performance of WSN. Then we derive the end-to-end...
In this paper we demonstrate the online applicability of the fault detection and diagnosis approach which we previously developed and published in [1]. In our former work we showed that a purely data driven fault detection approach can be successfully built based on monitored inter-component communication data of a robotic system and used for a-posteriori fault detection. Here we propose an extension...
For meeting quality of services, it is proposed the Analytic Hierarchy Process evaluation model with the new generation power information and communication technology (ICT) network in this paper. Firstly, based on the characteristic of the network, the quality evaluation indicators are established and the parameters of the indicators are extracted. Finally the proposed method implements evaluation...
This paper gives out a survey on event monitoring in Event-driven wireless sensor networks (EWSNs). In EWSNs, there are mainly two tasks, one is accurate event detection with higher detection probability and lower false-alarm probability. The other is reliable dissemination of the event information after accurate detection. In this paper, we firstly address the design issues for event detection and...
It is a significant application of wireless sensor networks to monitor a mobile target. Multiple sensor nodes cooperate to get an accurate estimation of the signal of the mobile target. Spatial correlation, induced by the spatial distribution of target and sensor nodes, is an inherent phenomenon of wireless sensor networks. This correlation causes redundancy amongst nodes which create redundant information...
In order to achieve higher bandwidth and higher throughput, the carrier aggregation (CA) technique has been adopted by the specifications of 3GPP Release 10 for Long Term Evolution (LTE) advanced systems, where the user equipment (UE) may operate over up to 5 component carriers (CCs). On the other hand, 3GPP specifications also define a mechanism named discontinuous reception (DRX) in order to save...
This paper describes an implementation for monitoring the Quality of Service (QoS) and expecting the Quality of Experience (QoE) of a voice communication in a Real-time Transport Protocol (RTP) based telecommunication environment. The resulting QoS parameters are evaluated, the QoE is determined with the E-Model and processed for graphical presentation. With the use of some open-source programming...
Wireless Body Area Networks (WBANs) offer tremendous benefits for remote health monitoring and real-time patient care. However, the success of such a system would primarily depend on the reliability of the data transmitted by the WBAN. Two aspects of data reliability need to be considered, namely, data accuracy and data freshness (or, recentness of data). Assuming that the sophistication of the sensors...
Use of sensor in data path to predict circuit failure before major errors occur in circuit performance due to reliability issues, especially negative bias temperature instability (NBTI), is common in new scaled CMOS circuits. In this paper, circuit failure prediction by timing degradation is employed to monitor semiconductor aging. For safe operation, we propose on-chip, on-line aging monitoring....
As Great East Japan Earthquake occurred at 11 March 2011 suffered a heavy loss, Japan is one of the most risky country stroke by an earthquake. Therefore, it is a social mission for enterprises in Japan, especially for telecommunication careers like us, to establish disaster recovery plan against a great earthquake. One way to achieve disaster recovery is locating a backup system geographically away...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.