Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 24

Liczba wyników na stronie
first rewind previous Strona / 2 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  protocols
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 2 next fast forward last
EN
This article provides a comparison of various wireless data transmission protocols, such as Wireless M-Bus, Lo- RaWAN, Sigfox, NB-IoT and a newly developed proprietary protocol, studying their performance in the application of batterypowered residential water meters. Key aspects of the comparison include energy consumption, which is analyzed through comparing unitary amount of charge required to conduct a single, bidirectional data transaction between the meter and base station, and maximum coupling loss which effectively defines the range and coverage in the system. For completeness, the study includes also a brief cost analysis and ends with a conclusion, stating when each of the particular standards should be favored.
2
Content available remote Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic Failures
EN
The publication of the pivotal state machine replication protocol PBFT laid the foundation for a body of BFT protocols. We introduce a probabilistic model for evaluating BFT protocols in the presence of dynamic link and crash failures. The model is derived from the communication pattern, facilitating an adaptation to other protocols. The state of replicas is captured and used to derive the success probability of the protocol execution. To this end, we examine the influence of link and crash failure rates as well as the number of replicas. A comparison in protocol behavior of PBFT, Zyzzyva and SBFT is performed.
3
Content available remote Data Mining-Based Phishing Detection
EN
Webpages can be faked easily nowadays and as there are many internet users, it is not hard to find some becoming victims of them. Simultaneously, it is not uncommon these days that more and more activities such as banking and shopping are being moved to the internet, which may lead to huge financial losses. In this paper, a developed Chrome plugin for data mining-based detection of phishing webpages is described. The plugin is written in JavaScript and it uses a C4.5 decision tree model created on the basis of collected data with eight describing attributes. The usability of the model is validated with 10-fold cross-validation and the computation of sensitivity, specificity and overall accuracy. The achieved results of experiments are promising.
4
Content available remote Remote programming and reconfiguration system for embedded devices
EN
This article presents a concept of a system which can be utilized as a remote management add-on for embedded devices. It can be applied to resource-constrained wireless sensors and IoT nodes based on a general purpose microcontroller unit or a field programmable gate array (FPGA) chip. The proposed solution facilitates remote firmware update, management, and operation monitoring. Thanks to the utilization of standard protocols and interfaces, the proposed system is very flexible and it can be easily customized for multiple modern microcontrollers or programmable logic chips. The presented system can be an efficient solution for fast prototyping and it can be an alternative to a time-consuming process of bootloader development for ad hoc devices. It can also be applied to remote laboratory access for educational purposes. A proof of concept prototype implementation has been successfully developed and evaluated. The implementation is available on a free license and utilizes a commonly available and inexpensive hardware platform.
5
Content available Protocols for Wireless Sensor Networks: A Survey
EN
This paper presents a survey on the MAC and network layer of Wireless Sensor Networks. Performance requirements of the MAC layer are explored. MAC layer protocols for battery-powered networks and energy harvesting-based networks are discussed and compared. A detailed discussion on design constraints and classification of routing protocols is presented. Several routing protocols are compared in terms of such parameters as: energy consumption, scalability, network lifetime and mobility. Problems that require future research are presented. The cross-layer approach for WSNs is also surveyed.
EN
The aim of the paper is to present a recent development in the field of communication from the point of view of embedded machine condition monitoring system (CMS). Although the general purpose of CMS remains the same over years, various electronic innovations open new possibilities of enhancement, including lower price, smaller size, larger bandwidth, smaller energy consumption or larger distance for wireless transmission. The paper considers a general notion of an embedded monitoring system, which consists of a sensor, data acquisition and processing unit, storage peripherals, and a communication module for final data destination. For each of these defined parts, a detailed description of possible data transfer protocols and interfaces is given, including popular, and experimental ones.
PL
Celem artykułu jest ilustracja rozwoju technologii komunikacyjnych, z punktu widzenia wbudowanego systemu monitorowania i diagnostyki maszyn (SM&D). Pomimo, iż ogólny cel SM&D pozostaje taki sam od lat, różnorodne innowacje w elektronice otwierają nowe możliwości udoskonalania systemów, m.in. zmniejszanie ceny i rozmiaru, zwiększanie pasma, zmniejszanie zużycia energii, bądź zwiększenie transmisji w systemach bezprzewodowych. Artykuł traktuje system wbudowany jako jednostkę złożoną z sensora, jednostki akwizycji i przetwarzania, miejsca zapisu danych oraz modułu komunikacji. Dla każdego z wymienionych elementów, w artykule przedstawiono szczegółowo możliwe protokoły i interfejsy komunikacyjne, zarówno powszechnie stosowane oraz takie, które są wykorzystywane w systemach prototypowych.
Logistyka
|
2015
|
nr 3
2118--2127, CD 1
PL
Roboty mobilne znajdują coraz szersze zastosowanie w wielu różnych dziedzinach. Obecnie w większości konstrukcji układów sterowania robotów wykorzystuje się zamknięte rozwiązania opracowane przez producentów. Podejście takie powoduje, że trudne jest serwisowanie tych urządzeń oraz integracja z innymi systemami. W rozdziale przedstawiono analizę możliwości wykorzystania otwartych protokołów sieciowych, do wymiany danych w systemie sterowania robotem. Na przykładzie robota mobilnego z manipulatorem pokazano podsystemy występujące w układzie sterowania i określono wymagania dotyczące wymiany danych. Przedstawiono następnie istniejące protokoły sieciowe i przeanalizowano ich funkcjonalność pod kątem zastosowania w układzie sterowania robota. Następnie pokazano przykładową realizację wykorzystującą protokół MQTT.
EN
Mobile robots are increasingly used in many different areas. Currently, most of the design of robot control systems are closed solutions developed by manufacturers. This approach makes it difficult to service these devices and integration with other systems. The paper presents an analysis of the possibilities of using open network protocols for data exchange in robot control system. As example a mobile robot manipulator is shown, its control subsystems and the requirements for data exchange. Next existing network protocols are analyzed in terms of their functionality for using in robot control system. Then there is shown an example of the control system application that uses MQTT protocol.
EN
Wireless Sensor Network consist of thousands sensor node which have limited Power, Computation, Sensing and Communication capabilities. Among all operation of Sensor Node, Wireless Communication consumes most of the energy. So it is necessary to decrease the number of packets transmitted through the network. Many Sensor Node could detect similar event, which increases the overall bandwidth utilization to transmit redundant data. Here Nodes computation is cheaper than communication in terms of energy. So the technique of Data Aggregation is applied to summarize data which decreases the amount of data transmitted in the network, which in turn increases the lifetime of the network. Many Data aggregation protocols are based on a structured approach which is suitable for data collection application. But maintenance of the structure is an extra overhead and this approach is not suitable for dynamic scenario. So we propose an ad-hoc data aggregation protocol for dynamic scenario mainly event based application.
EN
The article constitutes an introduction to IPv6 protocol and is a review of the existing approaches to ensure the coexistence of IPv6 and IPv4, on the example of homogeneous Cisco network infrastructure. In the first paragraph, the IPv6 protocol has been characterized and compared to the IPv4. Then, concepts connected with IPv6 addressing have been described. As the main part, it has been discussed methods to provide the coexistence of the two IP protocols. It has been characterized the primary option which is the dual stack, two types of both point to point and multipoint tunnels and finally - address translation NAT-PT.
PL
Artykuł stanowi wprowadzenie do protokołu IPv6 oraz jest przeglądem istniejących podejść dla zapewnienia współistnienia IPv6 i IPv4, na przykładzie homogenicznej infrastruktury sieciowej Cisco. W pierwszym rozdziale scharakteryzowano protokół IPv6 i porównano go z IPv4. Następnie opracowano koncepcje związane z adresowaniem IPv6. W głównej części opisano metody do zapewnienia koegzystencji dwóch protokołów IP. Scharakteryzowano podstawową opcję jaką jest podwójny stos, po dwa rodzaje tunelowania punkt-punkt i punkt-wielopunkt oraz w końcu translację adresów NAT-PT.
PL
Zaprezentowano i poddano analizie rozszerzenia i optymalizacje protokołów mobilności, umożliwiające ich efektywne wykorzystanie w nowoczesnych sieciach IP. Niezależnie od rozwiązań zarządzania mobilnością w warstwie sieciowej, przedstawiono wiele rozwiązań wsparcia mobilności realizowanych w wyższych warstwach modelu ISO-OSI. Dodatkowo przedstawiono rozwój mechanizmów zarządzania mobilnością z wyróżnieniem nowych rozwiązań różnorodnych technik wirtualizacyjnych, w szczególności zmierzających do rozdzielenia identyfikacji adresata od jego lokalizacji w systemie sieciowym oraz do wprowadzenia separacji warstw wyższych od struktury tzw. sieci transportowej. Nakreślono obowiązujące tendencje i kierunki rozwoju protokołów zarządzania mobilnością.
EN
This paper presents optimizations and extensions of the above mobility protocols, allowing them to be successfully deployed in support of modern IP networks and applications. Apart from these classic, network-layer mechanisms, a number of alternative solutions utilizing higher ISO-OSI layer mechanisms have also been described. Moreover, the evolution of mobility support mechanisms is presented, leading to description of new solutions, utilizing abstraction and virtualization techniques to logically separate changing network location information from persistent identity of mobile host or employing completely new approaches, such as universal mobility support lacking necessity to employ well-known mobility agent based solutions.
PL
Przedstawiono krótką charakterystykę rynku teleinformatycznego i wymagań nowych usług sieciowych, porównując je z możliwościami funkcjonalnymi oferowanymi przez współczesne systemy i sieci, tak przewodowe, jak i bezprzewodowe. Sformułowano ograniczenia architektury TCP/IP w aspekcie obsługi urządzeń mobilnych i nowych scenariuszy mobilności. Wzięto pod uwagę zarówno oczekiwania użytkowników, jak i możliwości sprzętowe oraz naturalne ograniczenia stosu protokołów IP. Na podstawie dokonanej oceny przedstawiono rozwiązania protokolarne niezbędne do realizacji usług pożądanych przez użytkowników mobilnych. Wskazano na tendencje w rozwoju protokołów mobilności, zarówno w kontekście współczesnej sieci IR jak też nowych propozycji Internetu przyszłości.
EN
In this paper (a first piece of two-part series devoted to modem network mobility protocols) we present a short analysis of current telecommunication market trends and user expectations concerning availability of new services. Network requirements emerging from introduction of such services are then compared with functionality provided by currently deployed networking technologies, both wired and wireless. Further analysis covers the foundation of global Internet network - the TCP/IP protocol stack architecture - and its current ability to support device mobility. Elements such as user expectations, hardware capabilities and limitations of protocol stack arę taken into account. Based on the this analysis, we then present a chosen set of fundamental mobility protocols necessary to fulfill the abovementioned requirements along with their evolution trends, both in context of current global IP network and new approaches to Future Internet architecture.
13
Content available remote On Distributed k-Anonymization
EN
When a database owner needs to disclose her data, she can k-anonymize her data to protect the involved individuals’ privacy. However, if the data is distributed between two owners, then it is an open question whether the two owners can jointly k-anonymize the union of their data, such that the information suppressed in one owner's data is not revealed to the other owner. In this paper, we study this problemof distributed k-anonymization. We have two major results: First, it is impossible to design an unconditionally private protocol that implements any normal k-anonymization function, where normal k-anonymization functions are a very broad class of k-anonymization functions. Second, we give an efficent protocol that implements a normal k-anonymization function and show that it is private against polynomial-time adversaries. Our results have many potential applications and can be extended to three or more parties.
14
Content available remote SXCCP+: Simple XML Concurrency Control Protocol for XML Database Systems
EN
Increasing significance and popularity of XML is the main reason why many commercial object-relational database management systems (ORDBMSs) developed XML storage and processing functionality. Additionally, there are new types of specialized database systems known as 'native' XML database systems. As we know, concurrency control is one of the most important mechanisms in DBMSs. Unfortunately, concurrency control mechanisms, which have been used so far in commercially available native XML DBMSs, offer very low degree of concurrency. The development of universal and effective concurrency control protocol for accessing XML data, with high degree of concurrency, is a necessary condition of the native XML database growth. The aim of this paper is to propose a new concurrency control protocol in XML document access. This protocol is based on primitive operations, which can be treated as a unification platform for any of the XML access methods.
15
Content available Hyper-heuristics for power-aware routing protocols
EN
The idea underlying hyper-heuristics is to discover some combination of straightforward heuristics that performs very well across a whole range of problems. In this paper we describe genetic algorithm-based (GA) approach that learns such a heuristic combination for solving energy-efficient routing problem in mobile ad hoc networks (MANETs).
EN
The presently offered VoIP services pose a serious security problem -they are vulnerable to eavesdropping, impersonation, session hijacking and denial of service attacks. The paper presents security analysis of the proposed VoIP protocol stack, including signaling protocol SIP, key management protocols ZRTP and MICKEY and transport layer security protocol SRTP. The VoIP network security subsystem upgrade path is also described.
PL
Powszechnie dostępne usługi VoIP nie zawierają mechanizmów chroniących transmisję, w związku z czym są podatne na podsłuch, przechwytywanie sesji oraz blokadę usługi. W artykule przedstawiono analizę bezpieczeństwa protokołów VoIP z uwzględnieniem protokołu sygnalizacyjnego SIP, protokołów zarządzania kluczami ZRTP i MICKEY oraz protokołu transportowego SRTP. Zaprezentowano również propozycję poprawy proponowanych obecnie sposobów ochrony komunikacji.
17
Content available remote Automating Synthesis of Asynchronous Communication Mechanisms
EN
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed processes in digital systems. In previous work, systematic ACM synthesis methods have been proposed. In this paper, we advance this work by developing algorithms and software tools which automate most of the ACM synthesis process. Firstly, an interleaving specification is constructed in the form of a state graph, and secondly, a Petri net model of an "ACM-type" is derived using the theory of regions. The method is applied to a number of "standard" writing and reading policies of ACMs with shared memory and unidirectional control variables.
18
EN
This paper presents flow-aware routing protocol (FARP), a new routing strategy designed to improve load balancing and scalability in mobile ad hoc networks. FARP is a hop-by-hop routing protocol, which introduces a flow-aware route discovery strategy to reduce the number of control overheads propagating through the network and distributes the flow of data through least congested nodes to balance the network traffic. FARP was implemented in GloMoSim and compared with AODV. To investigate the load distribution capability of FARP new performance metrics were introduced to measure the data packet flow distribution capability of the each routing protocol. The simulation results obtained illustrate that FARP achieves high levels of throughput, reduces the level of control overheads during route discovery and distributes the network load more evenly between nodes when compared to AODV. This paper also describes a number of alternative strategies and improvements for the FARP.
EN
The IEEE 802.11 medium access control protocol is vulnerable to selfish backoff attacks consisting in the selection of shorter-than-random backoff times by some stations. Administrative punishment and reputation-based prevention of such attacks fail in wireless ad-hoc networks which lack any means of mandating stations' behavior. In this paper, we take an incentive-oriented approach whereby stations are allowed to act so as to maximize their payoffs (obtained bandwidth shares). An approximate Markovian model is proposed to calculate the payoffs under saturation load. The payoff structure specific to CSMA/CA permits to define a two-player game of perfect information, one of the players launching a backoff attack and the other defending itself via a simple jamming mechanism. It is shown that under some conditions, not launching a backoff attack is a weakly best-response strategy against a certain strategy that the defending player may commit herself to.
PL
Konieczność posiadania pełnej informacji o poziomie poboru energii elektrycznej, a także zapewnienie ciągłości zasilania wymusza stosowanie specjalistycznych i nowoczesnych systemów, które umożliwią realizację tych wymagań. Omówiono kompleksowy, opracowany w ITR system kontroli, sterowania i zarządzania procesami energetycznymi w przemyśle. System wykorzystuje elementy składowe opracowane w ITR, wychodzi naprzeciw potrzebom pełnej integracji poszczególnych komponentów, realizowanych przez jednego dostawcę sprzętu oraz oprogramowania nadrzędnego.
EN
Complete on-line information on power consumption and uniterrupted power supply are Ndemands which require sophisticated and modern systems to be used in order to satisfy them. In the article there is presented an integrated control and management system for electrical energy processes in industry developed at the Tele- and Radio Research Institute. The system, composed of components elaborated at the Institute, is intended to achieve the Institute's goal of being a supplier of both the protection relays hardware and control and monitoring systems.
first rewind previous Strona / 2 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.