The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Rescue teams require information about victims in need of help rapidly to improve survival rate at the time of disaster. Emergency Rescue Information Sharing System gathers and provides the information with a framework called METHANE in addition to efficient wireless link's selection using OpenFlow. However, it is difficult for those who rescue the victims except for the rescue teams to recognize...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
This paper presents a research of applying software-based SDN network virtualization technology across data centers in a large enterprise. The development history of SDN was briefly reviewed at the beginning, followed by introductions to two SDN network virtualization solutions based on overlay network. An implement method in an enterprise is elaborated based on SDN solutions. This method is proved...
Video surveillance, as an effective technical mean in remote live monitoring and on-site monitoring, is widely used in each link of the smart grid. With the deepening of the continuous development and application of video surveillance technology, it plays an increasingly important role in ensuring network security. This paper, combined with the characteristics of the softswitch system, leads the softswitch...
This paper deals with a method to measure the quality of Giga Internet service. The existing method needs both remote servers and a client application when measuring Internet quality such as throughput(speed), delay and loss. On the other hand, the proposed method only needs a single-sided application which is installed in a personal computer(PC). The key technique is to use traffic loopback algorithm...
In this paper, a half-bridge (HB) LLC resonant converter which has been used for server power supply, is controlled by digital controller. In order to increase the entire load efficiency of HB LLC converter, a synchronous rectifier (SR) should has a robust control at any condition such as PFC noise or the lack of current sensing. For these reason, digital controller with LLC SR control is preferred...
Test beds are essential in teaching and research on computer networks and security. However, designing and deploying a test bed is an expensive task. Various virtualization technologies make this task easier by enabling the creation and deletion of virtual machines (VMs) and their networks in less time on a single physical infrastructure. However, these VM based test beds are heavy-weight. In this...
The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things...
With the development of the Internet, the requirement of the unified network computing and storage will continue to increase, which will make the high speed transmitting technology to be adopted more widely. With the advantages of high speed and reliable, InfiniBand technology could load other protocol data units, and bring the convergence of InfiniBand and Ethernet. In this paper the conversion technologies...
In order to guarantee the security of the communication between the in-vehicle IPv6 subnet and internet, a scheme is putted forward based on the address filtering in the network handoff. This scheme considers the address filtering in the network handoff, when the mobile node came into a different network, it only needs to filter its own IPv6 address without the need to re-access authentication. Tests...
In this paper we discuss a mixed policy comprising of exhaustive and gated vacation policies for a two queue system where the first queue has two priorities (high and low) of voice traffic and second queue has data traffic arrival. First queue is served in a mixed order, exhaustive for high priority and gated for low priority. The gate in front of the second queue is independent of the first queue...
The International Electrotechnical Commission (IEC) 61850 standard is widely used in substation automation system (SAS), even if some aspects related to the network-based time synchronization are still under investigation. The latest version of the IEC 61850 standard introduces IEEE 1588 Precision Time Protocol (PTP) for distributing time in the station and process buses, in addition to the previously...
Voice over Internet and more generally unified communication raised their importance in last decade as they are more and more reliable and robust. However as they gets more widely used, security issues became more noticeable and dangerous indeed. The objective is to give the reader a good overview and most relevant details about technologies used. This document provides architectures overview as well...
Delivering Multimedia services such as Mobile IPTV over 3GPP/LTE based on Femtocell networks has been a main purpose according to the demand grows in the world. The Femtocell networks, which is a small cellular base station in home and small business environment. It is best solution for operators to improve indoor coverage and network capability. In this paper, we designed functional entities of 3GPP/LTE...
IB network as a new network technology, in many areas has been rapid development. In the mass storage system, the network will serve as a link compute nodes and storage nodes in the task, while the IB network in high-performance systems are gradually popular. In this paper, test new high-speed InfiniBand network into FC testing methods, and proved by experiments that the method is feasible and reasonable...
This paper presents HERMES: an energy-efficient data transfer framework for data-center, grid and cloud networks. An architecture and simulations are provided to show that this framework could save more than two-thirds of the energy currently consumed by these networks.
An autonomous decentralized system and a series of methods for reducing the detection time of path failures in the system are developed. Computing devices in the proposed system are organized into at least three groups based on their connectivity of system's graph model. Each computing device is assigned three identification values associated with their group memberships. The identification values...
Long Term Evolution (LTE) as an evolution of fourth generation (4G) technology offers high data rate of upto 100 Mbps for data applications. But it lacks native support for Circuit Switched (CS) voice service which has been the main revenue generator for operators. This introduces the problem of how to provide voice call when a user is in LTE and how to ensure voice call continuity when it moves out...
The use of Internet-Protocol (IP) Based, combine the transmission of multimedia communication service signalling with other internet based service within the same infrastructure. UDP as the default signaling transport protocol for SIP based mutlimedia communication signalling brings an issue of call drop possibilities during network congestion, leads to impossibility to realize reachibility of service...
Random Early Detection (RED) algorithm, a framework of active queue management (AQM), has been proposed in order to improve the performance of congestion routers due to the increased use of Internet. But, the basic problem of a lag between congestion's occurrence and its remedy remained. To overcome this problem of RED, Explicit Congestion Notification (ECN) proposed by the IETF that allows end-to-end...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.