The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The P4 language provides a way to describe a custom network packet processing behavior that involves header parsing, matching and assembling modified packets. Such abstraction represents a significant step towards removing the limitation of fixed-function networking devices. Our live demonstration shows a straightforward usage of an algorithm and tool that maps a P4 program to a general architecture...
The paper presents experimental research related to pH measuring and to the design of a system of pH monitoring. The paper is structured on three parts. The first part presents the principle of measuring the pH of a solution matter, the transducer structure and of the adaptor used. The second part is dedicated to the experimental research effectuated aiming at the use of PACTware software environment...
The document contains a comparative analysis of the key technologies to ensure collaboration of telecommunication networks that were built with using different versions of IP protocol: dual stack; tunneling and encapsulation; translation of the protocols. Two groups of factors are proposed: factors that will influence the choice of the technical migration way to the IPv6 stack and the factors that...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
In this paper, an overview of a testing and simulation approach for a DTN protocol implementation (named µPCN) is provided. This implementation is intended to render low-cost world-wide satellite communication possible. It will be flighttested during the ESA OPS-SAT mission. To ensure its quality, a simulation environment has been developed used for testing its functionality in simulated LEO satellite...
Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN...
Mission spacecraft telemetry data formats have some complex characteristics. The formats have hierarchical and nested structures which need to be processed cross frames. The formats also have complex parameter dependencies and change frequently. So we design Multi-Channel-Protocol(MCP) Model. This model has the advantage of strong expressiveness, good versatility and scalability. This model is utilized...
For much of the past decade NASA and other organizations have been developing the Disruption Tolerant Networking protocol suite with a primary focus on bringing internet-like functionality to space missions. Now that the core protocols are complete, engineers are beginning to incorporate DTN into mission system designs. When we look across the NASA mission needs over the next decade, there are multiple...
Scientific HPC applications along with the emerging class of Big Data and Machine Learning workloads are rapidly driving the fabric scale both on premises and in the cloud. Achieving high aggregate fabric throughput is paramount to the overall performance of the application. However, achieving high fabric throughput at scale can be challenging - that is, the application communication pattern will...
Novel trusted hardware extensions such as Intel's SGX enable user-space applications to be protected against potentially malicious operating systems. Moreover, SGX supports strong attestation guarantees, whereby remote parties can be convinced of the trustworthy nature of the executing user-space application. These developments are particularly interesting in the context of large-scale privacy-preserving...
The success of the Internet around the world has produced many benefits, but due to IP protocol stack limitations, the IP addresses exhaustion problem soon arose. Although it has been proposed several solutions to alleviate it, the problem still remains, specially in the emerging countries, which have a reduced pool of public IPv4 addresses. Classless Inter-Domain Routing (CIDR) scheme has partially...
Highway Addressable Remote Transducer (HART) is an open fieldbus protocol for industrial automation and implemented in almost all the commercially available field transmitters and actuators. This paper details the intricacies and challenges involved in designing a HART Analog Input Module (HAIM) for the indigenous Supervisory Control And Data Acquisition (SCADA) solution developed at the Control and...
The ability to recognize emotions in spoken words is central in human communication and social relationships. When studying one's ability to perceive emotions, the standard paradigm is to have listeners choose which one of several emotion words best characterizes linguistically neutral utterances made by actors attempting to portray various emotional states. Usually, generic experiment control software...
The study presents a multi-disciplinary application of the Internet of Things (IoT) benefiting both the engineering and music community. A music composition algorithm based on a finite-state machine was designed to receive and manipulate wind turbine voltage output data into a musically aesthetic composition. The algorithm adapts common western music theory and imposes these limitations on the wind...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are catching the attention of telecom operators. Telecom environments establish a set of Carrier Grade requirements such as high availability, high throughput and low latency. To address these challenges SDN deploys logically-centralized controllers, such as ONOS and OpenDayLight. Based on the JAIN SLEE component model, which...
Due to SCADA (Supervisory Control And Data Acquisition) system constitutes critical infrastructure, the disablement of its components could have a significant influence on the national security. It should be emphasized that the problem to identify and confront threats to the security of SCADA energy systems. A new method to solve this problem is proposed in this paper, based on the construction of...
Integrated environmental modelling (IEM) couples interdependent environmental models and data together to solve complex environmental problems. There are two major modelling frameworks for IEM: component based framework, and service oriented framework. This paper suggests to take the best of both to couple modelling components and services together. The result is a hybrid method to leverage Open Modelling...
Until recently, IT security received limited attention within the scope of Process Control Systems (PCS). In the past, PCS consisted of isolated, specialized components running closed process control applications, where hardware was placed in physically secured locations and connections to remote network infrastructures were forbidden. Nowadays, industrial communications are fully exploiting the plethora...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.