Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "network control" wg kryterium: Temat


Wyświetlanie 1-12 z 12
Tytuł:
Optimization approach with ?-proximal convexification for Internet traffic control
Autorzy:
Kozakiewicz, A.
Powiązania:
https://bibliotekanauki.pl/articles/309008.pdf
Data publikacji:
2005
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
nonlinear programming
price method
convexification
network control
Opis:
The optimization flow control algorithm for traffic control in computer networks, introduced by Steven H. Low, works only for concave utility functions. This assumption is rather optimistic and leads to several problems, especially with streaming applications. In an earlier paper we introduced a modification of the algorithm based on the idea of proximal convexification. In this paper we extend this approach, replacing the proximal method with the ?-proximal method. The new method mixes the quadratic proximal term with higher-order terms, achieving better results. The algorithms are compared in a simple numerical experiment.
Źródło:
Journal of Telecommunications and Information Technology; 2005, 3; 37-42
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bayesian Network Based Fault Tolerance in Distributed Sensor Networks
Autorzy:
Lokesh, B. B.
Nalini, N.
Powiązania:
https://bibliotekanauki.pl/articles/308287.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Bayesian network
distributed sensor networks
fault detection
fault tolerance
fault recovery
network control
routing
Opis:
A Distributed Sensor Network (DSN) consists of a set of sensors that are interconnected by a communication network. DSN is capable of acquiring and processing signals, communicating, and performing simple computational tasks. Such sensors can detect and collect data concerning any sign of node failure, earthquakes, floods and even a terrorist attack. Energy efficiency and fault-tolerance network control are the most important issues in the development of DSNs. In this work, two methods of fault tolerance are proposed: fault detection and recovery to achieve fault tolerance using Bayesian Networks (BNs). Bayesian Network is used to aid reasoning and decision making under uncertainty. The main objective of this work is to provide fault tolerance mechanism which is energy efficient and responsive to network using BNs. It is also used to detect energy depletion of node, link failure between nodes, and packet error in DSN. The proposed model is used to detect faults at node, sink and network level faults (link failure and packet error). The proposed fault recovery model is used to achieve fault tolerance by adjusting the network of the randomly deployed sensor nodes based on of its probabilities. Finally, the performance parameters for the proposed scheme are evaluated.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 4; 44-52
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On effectiveness of conditional admission control for IP QoS network services with REM scheme
Autorzy:
Dąbrowski, M.
Burakowski, W.
Bęben, A.
Powiązania:
https://bibliotekanauki.pl/articles/309267.pdf
Data publikacji:
2002
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
QoS IP network
conditional admission control
Opis:
Future IP QoS (quality of service) networks are aiming at differentiating transfer quality of packets belonging to different flows. For this purpose, a set of network services (NS) with different QoS objectives is defined and implemented in the network. To a NS a certain amount of network resources, i.e. dedicated link capacity with associated buffer size, is allocated. Moreover, the resources dedicated for one NS are not available for other NSs. Traditional approach for admission control algorithm corresponding to given NS takes into account current traffic conditions inside considered NS. This can lead to the situation, due to traffic fluctuations, that temporary overloaded NS cannot use the spare bandwidth from underloaded in this time other NSs. This paper describes a conditional admission control algorithm (C-AC), allowing us to admit new packet flow conditionally in the case where no available capacity inside a given NS. For conditionally accepted flow currently unused capacity, dedicated to other NS, is allocated. This can be done only in the case when QoS requirements for both the conditionally accepted flow and the flows in progress are satisfied. The conditions for effective using of C-AC algorithm are discussed in the paper, like characteristics of NS borrowing and lending capacity and their current traffic load. To show potential benefits of the approach, exemplary numerical results are included, corresponding to hypothetical NSs using REM (rate envelope multiplexing) scheme.
Źródło:
Journal of Telecommunications and Information Technology; 2002, 2; 33-39
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BSBI - a Simple Protocol for Remote Verification of Identity
Autorzy:
Kozakiewicz, A.
Pałka, P.
Powiązania:
https://bibliotekanauki.pl/articles/309333.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
authentication
biometric verification
network protocols
Opis:
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules. The architecture assumes strict separation of all personal metadata and the actual verification data. The paper also describes a prototype implementation of the protocol and its extension enabling the state of the module to be monitored from the main system. The proposed design solves the problem of using advanced verification methods, especially biometric ones, in systems where direct implementation is not possible due to hardware incompatibilities, insufficient resources or other limitations.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 50-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Introduction of the Network Centric Warfare concept to Czech Armed Forces
Autorzy:
Eichelmann, P.
Lukáš, L.
Powiązania:
https://bibliotekanauki.pl/articles/308350.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
network-centric warfare
command and control
tactical command and control system
situation awareness
Opis:
One of the features determining the strength of troops is command and control. The quality of command and control is determined by the quality of the command and control systems (C2S). The Czech Armed Forces are developing tactical command and control systems (TC2S) for the Ground and Air Forces. The TC2S were a little bit separately developed. Now, we want to use the benefit of shared situation awareness. The concept of Network Centric Warfare is a solution of this problem. The integration of both TC2S's is its main objective. To apply this concept, separate C2S's of different units are integrated into one logical system, into one joint C2S. Thus it is possible to create the common operation picture for all units of the task force.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 4; 53-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the Design of the TCP/AQM Traffic Flow Control Mechanisms
Autorzy:
Karpowicz, M. P.
Powiązania:
https://bibliotekanauki.pl/articles/307606.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
game theory
network security
TCP/AQM
traffic flow control
Opis:
Several aspects of the TCP/AQM system design are discussed that may affect performance of the network. Namely, due to decentralized structure of the network traffic flow control system in which traffic rate control tasks are delegated to autonomous agents, it may be possible for the agents to profitably re-engineer the TCP congestion control algorithm at the cost of the overall performance of the network. In this paper it is shown how the commonly applied TCP/AQM design procedures may give rise to mechanisms that are prone to attacks discreetly moving the network traffic flow away from the desired operating point. Furthermore, a short discussion is presented concerning the countermeasures that can be taken to reduce these effects.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 4; 31-37
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Transmission of Disaster Warnings via Control Channels in Cellular Networks
Autorzy:
Aal-Nouman, Mohammed I.
Abdullah, Osamah
Salman, Omar Hussein
Al-Shaikhli, Noor Qusay A.
Powiązania:
https://bibliotekanauki.pl/articles/1839317.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
control channel
disaster reduction
early warning message
mobile network
Opis:
According to United Nations reports, natural disasters caused, worldwide, approximately 100,000 deaths and affected 175 million people each year between 2004 and 2013. To reduce those numbers, countries around the globe have made specific arrangements enabling them to warn the population about imminent disasters, in order to evacuate the area in due time. But providing such warnings in areas where no Internet access is available poses a great challenge. In this paper, we proposed a method to transmit early warning messages via UMTS cellular networks, while relying on spare extensions of control channels (FACH). The results obtained are validate based on their comparison with theoretical considerations and are also benchmarked against the 3GPP standard. The results show that messages may be sent faster than with the use of the 3GPP standard.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 4; 53-61
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters
Autorzy:
Mahmoud, K. W.
Mansour, K.
Makableh, A.
Powiązania:
https://bibliotekanauki.pl/articles/308289.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
intrusion detection systems (IDS)
network security
password protection
Opis:
This paper presents novel mechanisms that effectively detect password file thefts and at the same time prevent uncovering passwords. The proposed mechanism uses delay between consecutive keystrokes of the password characters. In presented case, a user should not only enter his password correctly during the sign-up process, but also needs to introduce relatively large time gaps between certain password characters. The proposed novel approaches disguise stored passwords by adding a suffix value that helps in detecting password file theft at the first sign-in attempt by an adversary who steals and cracks the hashed password file. Any attempt to login using a real password without adding the time delays in the correct positions may considered as an impersonation attack, i.e. the password file has been stolen and cracked.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 4; 101-108
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Interference Management using Power Control for Device-to-Device Communication in Future Cellular Network
Autorzy:
Nugraha, T. A.
Pamungkas, M. P.
Chamim, A. N. N.
Powiązania:
https://bibliotekanauki.pl/articles/958069.pdf
Data publikacji:
2018
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cellular network
device-to-device communication
interference management
power control
Opis:
There are many scenarios that have been proposed for fifth generation (5G) networks. Some of them, if implemented, will bring fundamental changes at the architectural and node level. One example of such proposed technologies is device-to-device (D2D) communications which will change the nature of conventional cellular network design. D2D permits direct communication between two or more user devices without intervention of the base station (i.e. eNB). D2D can ensure network performance improvement over the traditional cellular network, because it can offload the mobile data traffic from the other devices. However, applying D2D features in a cellular network will bring about more complex interference problems, since D2D communication uses the same band as its underlying cellular communication network. The aim of this research is to investigate interference-related problems caused by D2D communications, affecting the underlying cellular networks, during downlink and uplink transmissions. The paper examines the use of power control methods to mitigate interference. A comparison is offered between fixed power level (FC) with or without power control, and adaptive power controls using two methods (AC1 and AC2), on a base station or on each of the D2D devices, based on the measured signal to interference plus noise ratio (SINR). The simulation results show that both power control methods contribute to improvement of network performance. AC1 and AC2 can improve SINR by about 1 dB and 0.5 dB compared to FC in a downlink transmission, and by 0.5 dB in an uplink transmission.
Źródło:
Journal of Telecommunications and Information Technology; 2018, 3; 31-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparative Study of Wireless Sensor Networks Energy-Efficient Topologies and Power Save Protocols
Autorzy:
Niewiadomska-Szynkiewicz, E.
Kwaśniewski, P.
Windyga, I.
Powiązania:
https://bibliotekanauki.pl/articles/309032.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
energy conservation protocols
topology control
wireless sensor network
Opis:
Ad hoc networks are the ultimate technology in wireless communication that allow network nodes to communicate without the need for a fixed infrastructure. The paper addresses issues associated with control of data transmission in wireless sensor networks (WSN) - a popular type of ad hoc networks with stationary nodes. Since the WSN nodes are typically battery equipped, the primary design goal is to optimize the amount of energy used for transmission. The energy conservation techniques and algorithms for computing the optimal transmitting ranges in order to generate a network with desired properties while reducing sensors energy consumption are discussed and compared through simulations. We describe a new clustering based approach that utilizes the periodical coordination to reduce the overall energy usage by the network.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 68-75
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Empirical Approach in Topology Control of Sensor Networks for Urban Environment
Autorzy:
Musznicki, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/309443.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
empirical approach
node deployment
sensor network
topology control
urban environment
WSN
Opis:
Research into the topology control of Wireless Sensor Networks (WSNs) is geared towards modeling and analysis of methods that may be potentially harnessed to optimize the structure of connections. However, in practice, the ideas and concepts provided by researchers have actually been rarely used by network designers, while sensor systems that have already been deployed and are under continued development in urban environments frequently differ from the patterns and research models available. Moreover, easy access to diversified wireless technologies enabling new solutions to be empirically developed and popularized has also been conducive to strengthening this particular trend.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 47-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Price Method and Network Congestion Control
Autorzy:
Malinowski, K.
Niewiadomska-Szynkiewicz, E.
Jaskóła, P.
Powiązania:
https://bibliotekanauki.pl/articles/309158.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
computer network
congestion control
coordination strategy
price
price instruments
retail pricing problem
Opis:
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems. The formulation and basic properties of the Price Method are reviewed and then the congestion control by price instruments in a computer network is described and tested.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 2; 73-77
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-12 z 12

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies