The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network operations needed to operate, control and manage large-scale multi-domain, multi-layer and multi-vendor TE networks, so as to facilitate network programmability, automation, efficient resource sharing. This paper provides scalable telemetry streaming mechanisms that describe Key Performance Indicator (KPI) telemetry...
CoAP is a web transfer protocol that provides basic RESTful services for IoT devices. Since CoAP operates on top of UDP, CoAP must support additional congestion control and reliability mechanisms. However, CoAP is originally designed to allow implementations that do not maintain any end-to-end connection information. Thus, the default congestion control mechanisms are not capable of adapting to network...
Bluetooth Low Energy (BLE), also known as Blue-tooth Smart, is part of the Bluetooth 4.0 Core specifications, introduced in June 2010 by the Bluetooth Special Interest Group (SIG). BLE is designed as a radio standard that minimizes power consumption and it is particularly suited for low cost, low bandwidth, low power, and low complexity applications. These aspects of the standard represent the reasons...
The virtualization and softwareization of network functions, controls, and applications are promising as they optimize costs and processes while bringing new value to the network infrastructures. However, the centralized reliability management over the complex softwareized network poses both scalability and latency challenges on the failure recovery process. In this paper, we propose a Network Architecture-aware...
The quality of water resources has a direct impact on the daily life of mankind and the sustainable development of society. However, with the rapid development of national industrialization, the current industrial wastewater discharge and improper handling have become more and more serious, especially for the growing domestic water pollution today, it is an urgent need for an efficient water quality...
Enormous amounts of data are growing because of the continuous and increasing use of smart devices which connect, collect, exchange and transfer these large amounts of data. With the convergence of new technologies like Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Cloud Computing (CC) many sectors are benefited. Our research has to do with Big Data Delivery over the IoT. Specifically,...
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as...
Software-Defined Networking (SDN) is an innovative approach to provisioning and delivering QoS (Quality of Service) services, yet it is still devoid of context-differentiating services. In this paper we propose a network application (Autonomic QoS Broker) and a controller module that implements the OpenVSwitch Database Management Protocol (OVSDB). These two components were implemented and validated...
We describe a cloud-based architecture for monitoring large numbers of industrial automation devices. We are interested in massive parallel monitoring of software components controlling critical automation facilities such as factories, mines or oil rigs. Monitoring focuses on post-deployment verification, aiming at discovering specification violations indicating for example bugs or incompatibilities...
This paper takes an unsupervised learning approach for monitoring edge activity within an enterprise computer network. Using NetFlow records, features are gathered across the active connections (edges) in 15-minute time windows. Then, edges are grouped into clusters using the k-means algorithm. This process is repeated over contiguous windows. A series of informative indicators are derived by examining...
Enforcing the computer systems security policy is highly reliant upon the use of security monitors. The monitoring system should provide a complete view of the monitored system in a stealth mode. The Serial ATA Commands Logger system described in this paper intercepts the ATA commands sent by a host bus adapter to an attached storage device, by monitoring the exchanged traffic, in a transparent manner...
In this work, we propose a system-on-chip (SoC) design tool for the automatic generation of hardware sandboxes for securing untrusted IP to be integrated into trusted systems. The Component Authentication Process for Sandboxed Layouts (CAPSL) is a design flow that incorporates behavioral specifications of IP interfaces in order to generate sandboxes purposed for detecting trojan activation and isolating...
Current networking integrates common "Things" to the Web, creating the Internet of Things (IoT). The considerable number of heterogeneous Things that can be part of an IoT network demands an efficient management of resources. With the advent of Fog computing, some IoT management tasks can be distributed toward the edge of the constrained networks, closer to physical devices. Blockchain protocols...
Sensor networks have been widely used traditionally in monitoring the state of heavy machinery and large factories whose condition is critical to the operation of machine as well as the safety of people around them. Recently, industrial wireless sensor networks (IWSNs) are getting popular for environment monitoring in such conditions to help us make a decision on the state of machines in a certain...
Medical applications, along with Information and Communication Technology (ICT), have contributed with many solutions to support the treatment of SEPSIS. However, there are few solutions for the transport of sepsis data with Quality of Service (QoS). In this paper we propose a self-manageable architecture for the provision and delivery of sepsis data using Software-Defined Networking (SDN). To evaluate...
The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic,...
The vision of cyber-physical systems (CPSs) considered the Internet as the future communication network for such systems. A challenge with this regard is to provide high communication reliability, especially, for CPSs applications in critical infrastructures. Examples include smart grid applications with reliability requirements between 99–99.9999% [2]. Even though the Internet is a cost effective...
As the intelligent control and detection technology improving, more and more smart devices/sensors can be used to increase the living standard. In order to integrate the Internet of Things (IoT) with microgrid (MG), an enhanced hierarchical control strategy for IoT-based home scale MG is proposed in this paper. Physical smart devices/sensors and inverters are defined at the primary level. Electrical...
An intelligent condition based monitoring system needs to have a communication subsystem for consensus among the devices of that system. Development of such a communication system has to follow an industry oriented universally acceptable standard protocol. Having universal acceptability, MTConnect is potentially most effective, efficient and sustainable protocol for this purpose. This paper presents...
We consider a system where randomly generated updates are to be transmitted to a monitor, but only a single update can be in the system at a time. Therefore, the source has to prioritize between the two possible transmission policies: preempting the current update or discarding the new one. We consider Poisson arrivals and general service time, and refer to this system as the M/G/1/1 queue. We start...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.