The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
This paper proposes an approach to model switched Ethernet communication within a model- and component-based software development framework for vehicular distributed embedded systems. The paper also presents a method to extract the network timing model from the systems that use switched Ethernet networks. In order to provide a proof of concept, an existing industrial component model and its tool suite,...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
The software-defined networking (SDN) paradigm promises greater control and understanding of enterprise network activities, particularly for management applications that need awareness of network-wide behavior. However, the current focus on switch-based SDNs raises concerns about data-plane scalability, especially when using fine-grained flows. Further, these switch-centric approaches lack visibility...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
Most of IoT applications include large number of distributed sensors which are interesting in specific geographical area. A large number of IoT entities have multiple relations and dynamic connections with each other. And there are many group communication requirements. Flexible multicast mechanism will be essential in such environments but it is difficult to satisfy verious requirements by means...
With the fast development of cloud computing and online business of Internet, the importance of data center is gradually increasing. Conventional Ethernet protocols can hardly meet the scalability and performance requirements of data centers (DCs). The traditional method solves the congestion problem by reducing the network throughput. In this paper, based on software-defined networks (SDNs) technology,...
In this paper, we introduce an opportunistic networking protocol, denoted as NOPPoS, that assigns station and access point roles to mobile devices based on the number of mobile devices and access points in the proximity. As main novel feature, NOPPoS is highly responsive to node mobility due to periodic, low-energy scans of its environment. In fact, NOPPoS can determine the exact number of neighbors...
The clock synchronization technologies applied to controlling layer and primary equipment like intelligent switchgear of processing layer in intelligent substation are analyzed in this paper. IEEE1588 message timing mode, which can be accurate to nanosecond, is used as the mode of substation system, in order to fulfill the real-time and accuracy requirements of intelligent switchgears and remote control...
OpenFlow/Software-Defined Networking (SDN) is a new networking paradigm that virtualizes network infrastructure by decoupling the control and data plane logic of traditional network devices. The controller of SDN has the overall look about network topology and hence provides flexibility to network operators to implement its own routing approaches. However, it could not control the way client works...
Time-Sensitive Networking (TSN) is becoming more important in automotive and industrial sectors. There is no clear strategy how to use TSN to improve and migrate the established real-time protocols without excluding legacy devices. This paper presents a realistic concept to integrate TSN into automation networks. We choose Sercos as a deterministic Industrial-Ethernet protocol to be extended with...
This paper presents an efficient design method used to implement high performance multi-mode memory controllers which fits different applications with different demands. The proposed design method is based on the use of dynamic partial reconfiguration (DPR) to commute from mode to another using time-multiplexing on the same chip region to save considerable area and enable usage of low-cost FPGAs....
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
While extending network programmability to a larger degree, P4 also raises the risks of incurring runtime bugs after the deployment of P4 programs. These runtime bugs, if not handled promptly and properly, can ruin the functionality and performance of networks. Unfortunately, the absence of runtime debuggers makes troubleshooting of P4 program bugs challenging and intricate for operators. This paper...
Bluetooth Low Energy (BLE) is a personal area wireless network technology that is of increasing importance for emerging Internet of Things (IoT) deployments. By design, BLE supports short-range, single-hop communication between a pair of BLE devices. As such, native BLE does not allow network-based policy control or in-network functions for service enhancement. These limitations are impediments to...
We implemented a controller in a form of a dollhouse and toy household appliances. Small children can operate actual household appliances in their environment with the controller. When children touch a NFC tag attached to a toy house appliance in a dollhouse, the corresponding actual household appliance is operated via Wi-Fi router. The dollhouse is nested in the smart house and it provides feedback...
It is well-known that the communication among agents plays an important role in leader-following consensus. When the communication fails, it will greatly degrade the performance of the leader-following consensus. As technology develops, memory components are quite cheap. Thus it is very natural to use the information before the communication failure to enhance the robustness of leader-following consensus...
The problem of managing and orchestrating communication protocols is studied using the discrete event system approach. The indicative cases of the BGP, the CAN protocol and the IEEE 802.11 protocol are modelled as finite state machines Two supervisors are designed to be simultaneously applied. The first controls the consecutive connection tries of each protocol. The second orchestrates the hierarchical...
PUFs are an emerging security primitive that offers a lightweight security alternative to highly constrained devices like RFIDs. PUFs used in authentication protocols however suffer from unreliable outputs. This hinders their scaling, which is necessary for increased security, and makes them also problematic to use with cryptographic functions. We introduce a new Dual Arbiter PUF design that reveals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.