Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, a distributed home automation system will be demonstrated. Traditional systems are based on a central controller where all the decisions are made. The proposed control architecture is a solution to overcome the problems such as the lack of flexibility and re-configurability that most of the conventional systems have. This has been achieved by employing a method based on the new IEC...
Named-Data Networking (NDN) is a novel clean-slate architecture for Future Internet. It has been designed to take into account a new use of the Internet and especially accessing content for a large number of users, and it integrates several features such as in-network caching, security or multipath. As NDN relies on content names instead of host address, it cannot rely on traditional Internet routing,...
The Content-Centric Networking (CCN) concept is a significant approach of several future Internet research activities. CCN in Wireless Sensor Networks present a promised technique that may ensure data routing based on content. In this paper, we focus on the lifetime of the Content Object exchanged in the network and we explain the idea of its integration in CCN for WSNs to better highlight the relevance...
Network Security is the most demanding domain in the Computer Science field. Network architectures are more vulnerable to malicious attacks. For this reason, updated mechanisms should be applied to network security. The concept of Network Intrusions Detection System helps in identifying the occurrence of malicious activity in a network. Various applications have been developed in order to detect attacks...
The cellular technology is mostly an urban technology that has been unable to serve rural areas well. This is because the traditional cellular models are not economical for areas with low user density and lesser revenues. In 5G cellular networks, the coverage dilemma is likely to remain the same, thus widening the rural-urban digital divide further. It is about time to identify the root cause that...
Most networking performance enhancements occur through specific static solutions, where the structure of the protocol stack remains unchanged. Instead, we focus on a flexible software and hardware co-design for the entire protocol stack. In this paper, we present EmbedNet, a System-on-Chip implementation of a flexible network architecture for the Future Internet, where parts of the protocol stack...
The single-chip crosspoint-queued (CQ) switch is a self-sufficient switching architecture enabled by state-of-art ASIC technology. Unlike the legacy input-queued or output-queued switches, this kind of switch has all its buffers placed at the crosspoints of input and output lines. Scheduling is also performed inside the switching core, and does not rely on instantaneous communications with input or...
Flow-Aware Networking (FAN), after a few years of limited interest becomes again a promising concept for the Future Internet. In this paper, we present an integrated approach to ensure efficient and reliable transmission in FAN. The proposed solution is based on the central controller, which enhances an operation of particular mechanisms which compose the integrated system. The key mechanisms of the...
The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures use a forwarding plane that requires large Forwarding Information Bases (FIB) listing the next hops to name prefixes and Pending Interest Tables (PIT) that maintain per-Interest forwarding state. We introduce CCN-RAMP (Routing to Anchors Matching Prefixes), a new approach to content-centric networking that substitutes...
The recent development in the large domain of theInternet of Things is driving conventional change in Vehicle AdhocNetworks, now known as Internet of Vehicles (IOV), Vehicleto-Vehicle (V2V), Vehicle-to-Infrastructure(V2I) and someIntelligent Transport System (ITS) applications will require verylow latency, much lower than is currently provided by existingcommunication networks. The connected vehicles...
Heterogeneity in constrained networks and gateways is perhaps one of the single greatest challenges facing end-to-end management of devices and networks in the IoT. Today, the Lightweight M2M (LWM2M) protocol, leveraged on open Internet standards, has become a strong contender for REST-based IoT management. However, significant challenges exist for remote gateway management, particularly for proxies...
The Internet of Vehicles (IoV) has become an indispensable part of a smart city, which can provide useful traffic information to supervise and guide drivers in metropolis. However, as the traffic data scales to a great volume, it becomes difficult for conventional database management tools to meet the requirement of massive data analysis. HBase is an open source, non-relational, distributed database...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
Big Data technologies have traditionally operated in an offline setting, collecting large batches of information on clusters of commodity machines and performing complex and time-consuming computations over it. While frameworks following this approach served well for most applications involving big data analysis during the last decade, other use cases have recently emerged posing challenging requirements...
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing...
Delay-tolerant Network (DTN) is a computer network architecture that operates effectively over an extreme distance and communicates with heterogeneous networks that may affect the continuous network connectivity. DTN is particularly useful for the areas in which there are no direct connection (either physical or wireless) between source and destination over a long distance, as it can overcome the...
The growth of the Internet of Things and the trends to deploy more sensors everywhere has led to search for cost effective ways to connect the devices to the Internet. In the most common network architecture for home IoT, the devices use low-power wireless or WiFi to connect to an AP and access the Internet backend. We present a study on the feasibility and efficiency of an alternate network architecture...
Hijacks, outages, route leaks, and AS path spoofing are cases where network operators may want to influence the way routes are accepted and propagated from BGP neighbors in ways not supported by traditional BGP speakers. In this paper, we introduce Bongo, a software-based BGP speaker than can selectively filter out or extend the path of BGP updates received from other peers based on arbitrary operator-defined...
The ICN (Information Centric Networking) approach, totally centered on the content, was proposed to reconstruct the model of Internet communication. It introduces new concepts such as naming, forwarding and caching. The ICN paradigm is explored by several research projects to present a new Internet communication architecture. In this work, we focus on NDN (Named Data Networking) project in order to...
Due to security situation in Afghanistan traditional paper-based libraries are vulnerable to preserve Afghan knowledge and culture heritage. This paper proposes a robust library management system namely "e-Ketabtoon". The architectural landscape is comprised of two layers: server responsiveness capacity and client request capacity. User centered design has been adhered throughout the development...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.