The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Networking (SDN) is an emerging networking technology that has attracted intense interest from both the industry and research communities. Thus far, it is primarily applied to datacenters and research network environments. Despite meticulous effort in planning and equipment selection prior to deployment, there remain unknowns that can affect the network's performance after equipment...
Different architectures of interactions between the objects in the Internet of Things have been proposed, based on direct exchange of data between the wireless devices or based on synchronization with fixed network devices or cloud infrastructure. We evaluated how the selection of the communication architecture influences the performance of the data exchange using discrete event simulation. The distribution...
This paper presents the development of a remote experimentation for automatic control engineering education. By using a smartphone application, students can interact with real laboratory didactic equipment. Through a friendly graphical user interface and information provided by built-in smartphone sensors, students can modify the process parameters and verify in real time what's happening on the experimental...
Nowadays, the maturity of IoT applications, networking technologies and manufacturers of "things" have caused an explosion in the number of connected devices. There are several reports which calculate that the number of connected things will reach 50 billion in the near future. This paper focuses on the provision of wide area and efficient connectivity to the Internet of Things(IoT), akeyfactorinsuchanexplosion,...
Traditionally, network storage systems have mainly been dominated by two IP-based storage technologies, i.e., Network Attached Storage (NAS) and Storage Area Network (SAN). In recent years, cloud based storage (e.g., Amazon S3) has gained growing popularity for its high flexibility and cross-platform compatibility. Many enterprises are considering to replace traditional storage systems with cloud-based...
In order to provide augmented reality services, vast amounts of various forms of information are required, which can then be dispersed on multiple servers on the Internet. Thus, when a server does not have proper information for a certain request from a user device, it is better to pass the request to another server with the penalty of a longer response time. This paper proposes a method to reduce...
The Internet of Things (IoT) has advanced in different directions, including the development of new architectures, platforms and applications. This multidirectional progress has resulted in the creation of several parallel IoT ecosystems called verticals. Therefore, several approaches have proposed solutions for interoperability of these ecosystems through the delivery of services over virtual infrastructure...
The requirements' demands of applications, such as real-time response, are pushing the wearable devices to leverage more power-efficient processors inside the SoC (System-on-chip). However, existing wearable devices are not well suited for such challenging applications due to poor performance, while the conventional powerful many-core architectures are not appropriate either due to the stringent power...
The increasing number of connected devices with extremely diverse requirements in terms of data exchange rate, form factor, computing, or communication capabilities is a real challenge to device management. The Lightweight M2M protocol simplifies the management of constrained devices and reduces the cost of cloud-device connections. In the paper, behavioral models of LWM2M server and client for connectivity...
In this paper, we propose techniques for dynamically adjusting heartbeat or keep-alive interval of long-lived TCP connections, particularly the ones that are used in push notification service in mobile platforms. When a TCP connection between a client behind a NAT (or any other middle-box) and a server is idle for a long time, it may get torn down due to TCP binding timeout. In order to keep the connection...
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a large demand of smart devices which are loaded with sensors collecting information from their surroundings, processing it and relaying it to remote locations for further analysis. The wide deployment of IoT devices and the pressure of time to market of device development have raised security and privacy...
Information Centric Networks (ICN) has been a new network paradigm and it has attracted a lot of attention recently. In this new model, contents are retrieved by their name, not by IP address, shifting from host-to-host to a host-to-content approach. In networking-caching plays a very important role in ICN, which enables routers to cache content in the path between a user and the permanent server,...
This paper proposes a novel buffering algorithm for write buffer, comprised of DRAM and NVM, in NAND flash storages of the home cloud server is proposed. As adopting dirty first migration and clean page caching technique, the algorithm may improve performances and lifetime of storage system of the home cloud server. The experimental results show that the algorithm improved buffer hit ratio by up to...
Sever based analysis for local triangles counting cannot handle large scale graph accurately. For accuracy it needs a large amount of memory and it is almost impossible for the server to prepare all. So till now for efficiency the server uses a small amount of memory and finds out the approximate value of local triangles. In this paper we propose the method in which we use edge device resources in...
Connected mobile systems are useful to provide remote and continuous monitoring, which has been increasingly applied in healthcare. In order to protect patients' privacy based on HIPPA regulation, the security of connected mobile systems decides if users can trust and adopt the system. This paper proposes a novel approach to protect a connected mobile system in a mobile cloud environment. The novel...
This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's...
Cloud computing is emerging computational paradigm that provide resources to perform complex tasks. Large datacenters are used to facilitate the incoming tasks by providing resources, such as CPU, memory, storage, and network bandwidth. Datacenters offers hosting and processing of complex tasks and services, where servers and cooling systems consume huge amount of energy. Excessive amount of energy...
According to the statistics, there is low resource utilization and high energy consumption in traditional servers. To reduce the cost, more and more companies begin to build virtual servers. Sever virtualization implements the mapping from virtual resources to physical resources and deal with resource contention among all VMs. Because of complexity of virtualized server systems, it is necessary to...
Nowadays, the information systems for enterprises become popular and these systems produce an extreme huge amount of data. The produced data are all important and should be kept for further analysis. However, as this trend continues, the lack of human resources and budgets makes the ways to efficiently store and analyze data challenging. To solve this predicament, Cloud Storage Service (CSS) provides...
A mobile-cloud architecture provides a practical platform for performing face recognition on a mobile device. However, using a mobile-cloud architecture to perform real-time face recognition presents several challenges including resource limitations and long network delays. In this paper, we determine three approaches for accelerating the execution of the face recognition application by utilizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.