Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In an ad hoc network, communication distance is limited by the need to minimize the power consumption of the communication nodes. To deal with this, we usually employ multi-hop relaying functions that use the number of hops as a routing metric. But in an environment where traffic density is high, the same relaying node may be used by multiple sending nodes due to their spatial distribution. Data packets...
Public buildings and large infrastructure are typically monitored by tens or hundreds of cameras, all capturing different physical spaces and observing different types of interactions and behaviours. However to date, in large part due to limited data availability, crowd monitoring and operational surveillance research has focused on single camera scenarios which are not representative of real-world...
Network Neutrality states that users should have equal access to all Internet content and that Internet Service Providers (ISP) should not unfairly block or degrade access to any site. The Network Neutrality controversy has been in the spotlight for several years due to political, economic, social, and technical implications. While proponents argue that enforcing Network Neutrality by law is important...
A Service Level Agreement (SLA) is a contract between a service provider and a consumer which specifies in detail the level of service expected from the service provider, obligations, commitment and objectives. In the cloud computing environment, both the cloud provider and the cloud consumer want to know of a likely service violation before the actual violation occurs and to adjust the scaling of...
The communication among entities in any network is administered by a set of rules and technical specifications detailed in the communication protocol. All communicating entities adhere to the same protocol to successfully exchange data. Most of the rules are expressed in an algorithm format that computes a decision based on a set of inputs provided by communicating entities or collected by a central...
In this work, we introduce an application autotuning framework to dynamically adapt applications in multicore architectures. In particular, the framework exploits design-time knowledge and multi-objective requirements expressed by the user, to drive the autotuning process at the runtime. It also exploits a monitoring infrastructure to get runtime feed-back and to adapt to external changing conditions...
Software-Defined Networking enables the centralized orchestration of data traffic within a network. However, proposed solutions require a high degree of architectural penetration. The present study targets the orchestration of network elements that do not wish to yield much of their internal operations to an external controller. Backpressure routing principles are used for deriving flow routing rules...
The advent of cloud, big data, and mobile creates fast-growing demand of storage. Cloud service providers and data centers are looking for cost-effective storage solution alternative to traditional high-cost embedded-system based storages to meet the need of newly emerging applications, such as messaging, video streaming, data analytics, etc. In particular, they are facing the challenge of lowering...
One advantage of content-centric networking lies in its built-in support for multipath forwarding. In this paper, we propose a multipath forwarding strategy in order to fully utilize available bandwidth in a content-centric network. Using the proposed strategy, each intermediate router sensibly adjusts the amount of traffic forwarded over a given face (among a set of faces) associated with a content...
Today's data centers host wide variety of applications which generate diverse mix of internal data center traffic. In a data center environment 90% of the traffic flows, though they constitute only 10% of the data carried around, are short flows with sizes up to a maximum of 1MB. The rest 10% constitute long flows with sizes in the range of 1MB to 1GB. Throughput matters for the long flows whereas...
Software-Defined Networking promises to deliver more flexible and manageable networks by providing a clear decoupling between control plane and data plane and by implementing the latter in a logically centralized controller. However, if such principles are to be applied also to wireless networks, new primitives and abstractions capable of providing programmers with a global view of the network capturing...
In this paper we address the problem of network contention between the migration traffic and the VM application traffic for the live migration of co-located Virtual Machines (VMs). When VMs are migrated with pre-copy, they run at the source host during the migration. Therefore the VM applications with predominantly outbound traffic contend with the outgoing migration traffic at the source host. Similarly,...
In this prototype, sensing infusion use the sensor circuit consisting of diode laser and photodiode that used to provide electrical signals to the comparator then forwarded to the microcontroller for processing into data packets. Data packets are sent via the Zigbee transmission device, after the data packet is received by the coordinator of the ZigBee, then it is processed and displayed on the GUI...
Monitoring of high-speed networks is becoming a resource intensive task. There are dedicated flow monitoring probes built with commodity hardware support up to 10G links, but multiple 10G or even 100 G optical networks are being used for transport networks and a data center connectivity. Running and maintaining many separate probes is uneconomical and time-consuming. Therefore, we explore the possibility...
This demo demonstrates results of a joint research project of CESNET and INVEA-TECH focused on 100 GbE network flow monitoring using FPGA. It shows, to the best of our knowledge, the first flow monitoring setup capable of handling fully saturated 100 G Ethernet line. We present COMBO-CG card that provides accurate timestamps for high-resolution traffic monitoring. The card is complemented by fast...
With the increasing number of the epilepsy patients (EPs) and their growing need for continuous monitoring and immediate respond to their seizures, the Epilepsy Patients Monitoring System (EPMS) is proposed to be the fit solution for the healthcare monitoring applications especially for the EPs monitoring application. This paper focuses on the use of Wireless Sensor Networks (WSNs) for the healthcare...
Wireless data networks, particularly 4th generation (4G) and long-term evolution (LTE) are rapidly gaining ground as predominant telecommunication services to provide high quality services to wireless end-user consumer (WEC). This growth is in response to insatiably increasing popularity and penetration of mobile devices among individual, corporates, business, and government service consumers. Beside...
Measuring multiple physical quantities are increasingly being demanded in commercial, biomedical and generally in ubiquitous applications. Although the recent emergence of passive sensor enabled RFID tags (sensor tags) provide new opportunities for these types of applications mainly due to the extended operational life and the small form factor, the energy harvesting nature of sensor tags hinders...
Wireless sensor networks for control and moni- toring applications introduce critical constraints on the design of multiple access schemes. Controlling dynamic processes requires that priority must be given to critical systems for the use of the wireless medium. Tournaments in the medium access control (MAC) layer are presented as a way to evaluate priorities and assign channel resources in a distributed...
A ubiquitous tourist system provides information and services available at tourist spots to the tourists unobtrusively. The information need to be provided in personalized way suitable to tourists with different requirements. To enable such efficient way of information provision, we need to consider the QoS requirements of the application and maintain it with the changing context of the tourist by...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.