The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
The present paper allows to energy information collecting agent for IoT BigData system. Energy management system (EMS) is computer-based platform to monitor and control energy usage at a smart home and building. There are several model EMS — centralized and distributed. This paper suggested hybrid architecture of EMS for efficiently energy management.
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect of human life. The IoT devices equipped with sensors are changing every domain of the world to become smarter. In particular, the majorly benifited service sectors are agriculture, industries, healthcare, control & automation, retail & logistics, and power & energy. The data generated...
In this paper, we introduce an opportunistic networking protocol, denoted as NOPPoS, that assigns station and access point roles to mobile devices based on the number of mobile devices and access points in the proximity. As main novel feature, NOPPoS is highly responsive to node mobility due to periodic, low-energy scans of its environment. In fact, NOPPoS can determine the exact number of neighbors...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
In distributed Smart Farming applications, a reliable communication is often crucial, in particular during collaborating operations. In rural areas, the network connectivity via Public Land Mobile Networks is, however, not always sufficient. Network disruptions may occur hindering reliable transmissions. For the delivery of periodic sensor data streams of agricultural machines, several modern communication...
Nowadays one of the most important tasks in the field of network technologies is to ensure the data transmission, processing and storage security. In this paper, the idea of a new approach to the design of a distributed system for managing data flows and protecting computer networks from harmful effects is proposed. The main principles of this approach are considered, problems are set and ways of...
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to a number of protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life is still limited, in part due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel ad hoc protocol named...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
Personal Cloud Storage (PCS) is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Notably, content sharing is a key feature for PCS users. It however comes with extra costs for service providers, as shared files must be synchronized to multiple user devices, generating more downloads from cloud servers. Despite...
Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation...
Novel trusted hardware extensions such as Intel's SGX enable user-space applications to be protected against potentially malicious operating systems. Moreover, SGX supports strong attestation guarantees, whereby remote parties can be convinced of the trustworthy nature of the executing user-space application. These developments are particularly interesting in the context of large-scale privacy-preserving...
According to the World Health Organization (WHO) the population of the developed countries is rapidly ageing. Despite the perspective of a longer life is a blessing for the mankind, it also implies a growing number of elderly people who may need permanent medical monitoring and constant assistance to conduct daily activities. A viable approach to guarantee those people a good quality of life is the...
This paper presents the implementation of an SNMP agent on an embedded LINUX operating system in low cost platforms with network interface, used to control devices without the capability to implement TCP/IP protocol. Three communication algorithms were evaluated with the devices in order to find a model in which the communication was efficient and the impact on processing, memory and energy consumption...
A remote memory paging system called a distributed large memory (DLM) has been developed, which uses remote-node memories in a cluster, as the main memory extension of a local node. The DLM is available for out-of-core processing, i.e., processing of large-size data that exceeds the main memory capacity in the local node. By using the DLM and memory servers, it is possible to run multi-thread programs...
Mobile devices have become quite popular, and they are responsible for a significant part of Internet traffic. In these devices, multimedia services, such as video streaming over HTTP, are commonly adopted, and TCP protocol is the standard to assure reliable data transmission. To deal with applications that require higher bandwidth, several modifications were made on TCP, and they are called extensions...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
CoAP is a web transfer protocol that provides basic RESTful services for IoT devices. Since CoAP operates on top of UDP, CoAP must support additional congestion control and reliability mechanisms. However, CoAP is originally designed to allow implementations that do not maintain any end-to-end connection information. Thus, the default congestion control mechanisms are not capable of adapting to network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.