The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The large software applications of today provide abstractions of the real-life systems that they support. A digital model of the system, and of the changes that occur within, are being maintained and updated, as triggered by real-life events. Morphologically, such applications contain several distinct architectural entities: databases holding the state, central components describing how the system...
This publication presents a novel concept for autonomous and decentralised M2M application service provision. The functional architecture of the approach is introduced as well as a detailed description of the system structure and process for application creation. Furthermore, this publication describes details about the proposed process for decentralised M2M application service management and formal...
In this paper, we extend our prior work on efficient policy composition for Software Defined Networks and propose a machine learning based framework for anomaly free, on demand, application-aware software defined firewalling. We use a combination of Propositional Logic, Artificial Neural Networks and Hidden Markov Models to create the framework.
Inter-vehicle communication (IVC) is a key component enabling the autonomous driving vehicles. Standardization of IVC is advanced but yet improvements are still introduced. Congestion control is one of the sensitive topics. The IVC European standard ITS-G5 addresses the congestion issue enabled by a geo-networking protocol that exploits at networking level the geographic information. Implementation...
This paper mainly investigates an integrated control system operating under the software defined network (SDN) protocoI. SDN is a new networking paradigm in which network inteIIigence is centraIIy administered and network controI data and decisions are communicated via channeIs that are physicaIIy separated from those conveying user data. Hence, under the SDN architecture, it is relatively easy to...
In this paper, we propose the China-US international data placement laboratory (iDPL) based on an inter-continental testbed for data placement research. iDPL is able to support various data placement research due to its scalability and flexibility in deploying the experiments in the real network environment. The core design of iDPL leverages reliable workflow management and lightweight I/O protocol...
This paper identifies trust factor and rewarding nature of bitcoin system, and analyzes bitcoin features which may facilitate bitcoin to emerge as a universal currency. Paper presents the gap between proposed theoretical-architecture and current practical-implementation of bitcoin system in terms of achieving decentralization, anonymity of users, and consensus. Paper presents three different ways...
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
OpenFlow has been applied to a variety of demands of the transmission quality of the Internet business and it is still growing on its way. To test this protocol with its evolution consideration, we analyzed the working process of OpenFlow protocol and constructed the CPN model through phasing firstly and then role division for version 1.0. In addition, the selection of tokens and their given values...
During the past 60 years scientific research proposed many techniques to control robotic hand prostheses with surface electromyography (sEMG). Few of them have been implemented in commercial systems also due to limited robustness that may be improved with multimodal data. This paper presents the first acquisition setup, acquisition protocol and dataset including sEMG, eye tracking and computer vision...
A platform for software-based Visible Light Communication (VLC) can be built with simple hardware components and VLC can be integrated into a room's lighting system. VLC is therefore a good match for indoor setups that need to support a large number of nodes with moderate bandwidth requirements. But designing a VLC system for worst-case operating conditions is more restrictive than necessary. This...
Sleep mechanism(SM) is often used to design green network, however, sleep mechanism must take data loss, network performance and other situations into consideration. Due to hierarchical and centralized control, SDN makes it simple to deploy new applications. SDN is becoming more and more popular in new network applications. In this paper, a new implementation of SM based on SDN is proposed, the SM...
We present a novel, industry-first approach to the deployment of a practical, edge analytics framework and describe the instantiation of a framework under challenging constraints within heterogeneous environments. We propose an approach for industry deployment where knowledge graphs are used to capture domain knowledge for reusability, maintainability, and data stream communication normalization for...
Network operators and equipment vendors can hesitate to deploy network protocol innovations in fear of breaking connectivity for end users. To assess the potential for evolution of the protocol stack, it is important to know the existing network impairments and opportunities to work around the impairments. While classical network measurement tools often focus on absolute performance values, PATHspider...
Kademlia is a decentralized overlay network, up to now mainly used for highly scalable file sharing applications. Due to its distributed nature, it is free from single points of failure. Communication can happen over redundant network paths, which makes information distribution with Kademlia resilient against failing nodes and attacks. In this paper, we simulate Kademlia networks with varying parameters...
Named Data Networking (NDN) is one of the promising future internet architectures, which focuses on the data rather than its location (IP/host-based system). NDN has several characteristics which facilitate addressing and routing the data: fail-over, in-network caching and load balancing. This makes it useful in areas such as managing scientific data. The CMS experiment on the Large Hadron Collider...
In this paper, we introduce Kalis, a self-adapting, knowledge-driven expert Intrusion Detection System able to detect attacks in real time across a wide range of IoT systems. Kalis does not require changes to existing IoT software, can monitor a wide variety of protocols, has no performance impact on applications on IoT devices, and enables collaborative security scenarios. Kalis is the first comprehensive...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
In recent years, mobile data gathering in wireless sensor networks has attracted much interests in the research community. However, despite extensive efforts, many of previous work in this area lies only in theory and evaluates network performance with computer simulations, which leaves a large gap from reality. In this paper, we present the design and implementation of a general purpose, flexible...
The number of software-defined controllers available in the market has increased greatly in the last few years. Nowadays, it is possible to find proprietary controllers as well as open source controllers. Examples are companies as HPE and Cisco that offer those two types of controllers to their clients simultaneously. It is also important to note that in both, the open source version is a commercial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.