Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "network management" wg kryterium: Wszystkie pola


Tytuł:
Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer
Autorzy:
Sawicki, K.
Piotrkowski, Z.
Powiązania:
https://bibliotekanauki.pl/articles/309523.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
hidden protocol bridge
hidden protocol interpreter
master resident
non-classified data hiding system
steganography
voice over IP
watermarking
Opis:
The paper presents a practical implementation of the non-classified data hiding system (NDHS) understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy. The NDHS performs here as a botnet network that is managed by the hidden transmission controller referred to as the master resident. Research studies are dedicated to investigation of various connections in heterogeneous links as well as functionalities of such components as hidden protocol bridges and the master resident.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 1; 11-16
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Self-organization and Routing Algorithms for the Purpose of the Sensor Network Monitoring Environmental Conditions on a Given Area
Autorzy:
Bronk, K.
Lipka, A.
Wereszko, B.
Żurek, J.
Żurek, K.
Powiązania:
https://bibliotekanauki.pl/articles/307916.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
network management
network self-organization
sensor networks
Opis:
The article describes an implementation of wireless sensor network (WSN) based on the IEEE 802.15.4-2006 standard, which was designed to monitor environmental conditions (e.g. temperature, humidity, light intensity, etc.) on a given area. To carry out this task, a self-organization algorithm called KNeighbors was selected. It exhibits low computational complexity and is satisfactory with respect to energy consumption. Additionally, the authors proposed a novel routing algorithm and some modifications to the MAC layer of the IEEE 802.15.4 standard. The article discusses the selected algorithms and procedures that were implemented in the network.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 4; 39-52
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic tactical network node configuration with XML and SNMP
Autorzy:
Małowidzki, M.
Bereziński, P.
Powiązania:
https://bibliotekanauki.pl/articles/308089.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
network management
network configuration
tactical network
SNMP
NETCONF
Opis:
In the paper, we describe a "plug-and-play" configuration of nodes of a tactical network on the basis of XML configuration templates and a network plan, developed during the network planning process. We present the concept of a configuration repository, an XML-based database that stores network structure and configuration data, and describe how the Simple Network Management Protocol is used to apply the settings to network devices. We also comment on a possible use of the next-generation NETCONF protocol for such a task.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 84-87
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimized Energy Aware Resource Allocation Algorithm Using Software Defined Network Technology
Autorzy:
Al-Musawi, Ranya
Al-Khatib, Obada
Powiązania:
https://bibliotekanauki.pl/articles/309122.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
computer network management
network servers
software defined networking
virtual machines
Opis:
The number of data centers (DCs) used for storing and processing data has evolved rapidly in recent years. However, the operations held by DCs may relate to a number of disadvantages, primarily presuming in excessive energy and power consumption due to the poor management standards applied. This may lead to a situation in which many devices within the DC operate at full capacity without any tasks assigned for actual execution. A Software Defined Network (SDN) is a network architecture where the control plane is an independent entity from the data plane, yielding to a higher controllability and flexibility over the network. Through the utilization of SDN architecture, a highly functional energy aware network may be established. In this paper, we propose a heuristic algorithm that monitors the current status of an SDN network (in addition to all ingoing and outgoing traffic), in order to dynamically and efficiently allocate network resources by ensuring that only the necessary network devices are active and by turning the idle ones off. The results show that the proposed algorithm reduces energy consumption of the network compared to existing solutions.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 83-91
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Comparison Study of DASH Technique by Video Streaming over IP with the Use of RTP and HTTP Protocols
Autorzy:
Hoppe, Christian
Uhl, Tadeus
Powiązania:
https://bibliotekanauki.pl/articles/309066.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
H.265
IP network technology
MPEG-DASH
network management
QoS measurement
video streaming
Opis:
Today’s Internet knows no bounds. New applications are marketed every single day. Many of them incorporate video sequences. These must be transported over the Internet quickly (often in real time). However, the Internet has not been designed for live communications and, regrettably, this may become apparent all too quickly. Countermeasures are required in the form of new, efficient transport techniques facilitating online video services. MPEG-DASH is one of such modern techniques. But how good is this new technique really? This paper delves into the matter. The paper contains an analysis of the impact that the new technology exerts on the quality of video streaming over IP networks. It also describes a new numerical tool – QoSCalc (DASH-HTTP) which has been used to analyze MPEG-DASH under different use scenarios. The results are presented graphically and their interpretation is provided
Źródło:
Journal of Telecommunications and Information Technology; 2020, 1; 70-75
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A concept of Differentiated Services architecture supporting military oriented Quality of Service
Autorzy:
Kwiatkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/307725.pdf
Data publikacji:
2003
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
quality of service
military networks
differentiated services
bandwidth brokerage
policy based network management
Opis:
This paper presents a concept of IP Differentiated Services (DiffServ) architecture in conjunction with bandwidth brokerage and policy based network management, all aimed at efficient and flexible provision of the military oriented Quality of Service (M-QoS) features in the Australian Defence (strategic) wide area network and its satellite trunk interconnections with the tactical domain. Typical DiffServ functions are analysed in the paper with regard to their roles in offering M-QoS. Some preliminary simulation results of applying these mechanisms to achieve traffic policing and differentiation for (UDP) video traffic streams, are also presented. Finally, the paper proposes the use of bandwidth brokerage in each DiffiServ domain to facilitate automatic Service Level Specification (SLS) arrangements with end-user applications, and policy based network management to support the flexible implementation of bandwidth brokerage.
Źródło:
Journal of Telecommunications and Information Technology; 2003, 2; 71-76
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Labeling of signals in optical networks and its applications
Autorzy:
Borzycki, K.
Powiązania:
https://bibliotekanauki.pl/articles/308136.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
optical fiber transmission
transparent optical network
pilot tone
network management
overhead data channel
optical fiber dispersion
optical label
Opis:
The paper is a review and comparative analysis of most common techniques proposed to attach additional data or identification information to digital signals in optical fiber networks by purely optical means. Such "labels" or "headers" can be attached either to continuous bit streams, e.g., in SDH networks or to optical packets. They enable to monitor, route and identify signals in transparent optical networks, especially those with optical wavelength multiplexing, allow management and supervision of remote optical amplifiers and can be used in optical switching systems. Other applications of this relatively unknown technology include monitoring of optical path dispersion, equalization of channels in DWDM systems and detection of intrusion or jamming in highly secure networks.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 2; 73-88
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparison of resource control systems in multi-layer virtual networks
Autorzy:
Dabiński, B.
Petrecki, D.
Świątek, P.
Powiązania:
https://bibliotekanauki.pl/articles/308736.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Execution Management
MPLS
network virtualization performance
OpenFlow
parallel networks
virtual networks
virtual networks performance
Opis:
This paper describes the performance of various methods of QoS assurance for each connection in an environment composed of virtual networks and dedicate end-to-end connections inside them. The authors worked on the basis of research conducted with the use of the authorial network management system named Executed Management, which uses resources virtualization platforms VMware and Mininet for testing purposes. We briefly describe our system and techniques we used and some alternatives we tested and discarded because of their limitations. Functionality and performance of proposed solution to widespread implemented mechanisms as OpenFlow and MPLS are compared. Reasons for selecting well-known techniques to isolate networks and limit bandwidth on different levels of virtualization are considered. The purpose of this paper is to show out our studies and performance we achieved.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 3; 38-47
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An identity-based broadcast encryption scheme for mobile ad hoc networks
Autorzy:
Ng, C. Y.
Mu, Y.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/309104.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
dynamic mobile ad hoc network
identity-based
non-interactive
secure communication protocol
group key management
Opis:
Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity-based ad hoc protocol for mobile devices to construct a group key for a setup of a secure communication network in an efficient way and support dynamic changing of network topology. Unlike group key management protocols proposed previously in the literature, mobile devices can use our protocol to construct the group key by observing the others' identity, like the MAC address, which distinguishes the device from the others. In contrast to other interactive protocols, we only need one broadcast to setup the group key and member removal is also highly efficient. Finally, we discuss the security issues and provide security proofs for our protocol.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 1; 24-29
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
RED-LE: A Revised Algorithm for Active Queue Management
Autorzy:
Hassan, Samuel O.
Powiązania:
https://bibliotekanauki.pl/articles/2142301.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
active queue management
network congestion
router
RED-LE
simulation
Opis:
The random early detection (RED) algorithm was developed in 1993. Nearly three decades later, several improved variants have been proposed by scientists. The use of a (pure) linear function for computing packet drop probability has turned out to be a disadvantage, leading to the problem of large delays. Such a problem may be addressed by using linear and non-linear (i.e. as exponential) packet drop probability functions. This paper proposes a revised RED active queue management algorithm named RED-linear exponential (RED-LE). This variant involves an interplay of linear and exponential drop functions, in order to improve the performance of the original RED algorithm. More importantly, at low and moderate network traffic loads, the RED-LE algorithm employs the linear drop action. However, for high traffic loads, RED-LE employs the exponential function for computing the packet drop probability rate. Experimental results have shown that RED-LE effectively controls congestion and offers an improved network performance under different traffic loads.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 91--97
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Interference Management using Power Control for Device-to-Device Communication in Future Cellular Network
Autorzy:
Nugraha, T. A.
Pamungkas, M. P.
Chamim, A. N. N.
Powiązania:
https://bibliotekanauki.pl/articles/958069.pdf
Data publikacji:
2018
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cellular network
device-to-device communication
interference management
power control
Opis:
There are many scenarios that have been proposed for fifth generation (5G) networks. Some of them, if implemented, will bring fundamental changes at the architectural and node level. One example of such proposed technologies is device-to-device (D2D) communications which will change the nature of conventional cellular network design. D2D permits direct communication between two or more user devices without intervention of the base station (i.e. eNB). D2D can ensure network performance improvement over the traditional cellular network, because it can offload the mobile data traffic from the other devices. However, applying D2D features in a cellular network will bring about more complex interference problems, since D2D communication uses the same band as its underlying cellular communication network. The aim of this research is to investigate interference-related problems caused by D2D communications, affecting the underlying cellular networks, during downlink and uplink transmissions. The paper examines the use of power control methods to mitigate interference. A comparison is offered between fixed power level (FC) with or without power control, and adaptive power controls using two methods (AC1 and AC2), on a base station or on each of the D2D devices, based on the measured signal to interference plus noise ratio (SINR). The simulation results show that both power control methods contribute to improvement of network performance. AC1 and AC2 can improve SINR by about 1 dB and 0.5 dB compared to FC in a downlink transmission, and by 0.5 dB in an uplink transmission.
Źródło:
Journal of Telecommunications and Information Technology; 2018, 3; 31-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New Developments in a Two-criteria Approach to Dynamic Power Management in Energy-aware Computer Networks
Autorzy:
Karbowski, A.
Jaskóła, P.
Powiązania:
https://bibliotekanauki.pl/articles/309427.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data-intensive computing
energy-aware network
energy-aware routing
dynamic power management
MIQP problems
traffic engineering
Opis:
In the paper authors continue the development of a model of dynamic power management in energy-aware computer networks, where two criteria: energy consumption and the quality of service are considered. This approach is appropriate when the routing problem with fixed demands is inadmissible. The formulation introducing edge indices is modified and tests on problems of different sizes are performed.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 21-25
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Function Virtualization: Mitigating the Impact of VoLTE on the Policy and the Charging System
Autorzy:
Jouihri, Y.
Guennoun, Z.
Chagh, Y.
Zahi, D.
Powiązania:
https://bibliotekanauki.pl/articles/307932.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
NFV
policy diameter signaling
policy management
VoLTE
Opis:
Needless to say that telecommunications’ operators are showing increasing interests toward solving the dilemma of optimizing network resources while offering state-of-the-art quality of service. Recently, operators have shown an increasing interest to investigate solutions for better control on network utilization, service usage and monetization. They also noticed a significant growth in Diameter signaling and more specifically in signaling related to policy management. A massive introduction of Voice over LTE (VoLTE) service will have a significant impact on the systems handling policy signaling, as VoLTE will reshape the landscape of Long Term Evolution (LTE) policies and completely change the way policy management works. However, this massive approach is meant to provide significant competitive advantages for operators offering LTE services and still require circuit-switched network to provide voice service. The biggest challenge for those operators is to find an appropriate solution, scalable enough to handle the unpredictable growth of Diameter signaling. In this paper, a model, based on Network Function Virtualization (NFV) technology is proposed, able to address the challenges of massively introducing VoLTE, without impacting existing services and without jeopardizing current revenues. In presented approach, the standard VoLTE call flows, referenced user’s behavior and latest experiments’ results on NFV technology are used.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 66-76
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey on Wireless Network Applications in Automated Public Utilities Control and Management
Autorzy:
Nayaka, R. J.
Biradar, R. C.
Powiązania:
https://bibliotekanauki.pl/articles/308729.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Automated Meter Reading
AMR
wireless sensor networks
WSN
Wireless communication
Short Message Services
SMS
Opis:
Public utilities such as water, electricity and gas are essential services that play a vital role in economic and social development. Automation of public utility services addresses the huge losses faced by the utility services today, due to non-accounting of distributed utility resources. Automation improves government revenues. The different type of architectures are proposed and designed for automated metering, control and management of public utilities like water, gas, and electricity for effective management and control of resources. The various network topologies, hardware and software architectures to automation and management of public utilities are proposed by researchers. In this paper, the different technologies proposed by various researchers across the globe are surveyed and list of issues and challenges for automated meter reading and control of public utilities is identified.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 3; 13-24
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Advanced Considerations Concerning Impact of Applied Call Admission Control Mechanisms on Traffic Characteristics in Elastic Optical Network Nodes
Autorzy:
Głąbowski, Mariusz
Sobieraj, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/27312941.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
elastic optical networks
frequency slot unit
loss probability
reservation mechanism
threshold mechanism
switching networks
traffic management
Opis:
Over the past few years, a significant increase in network traffic volumes has been observed. The ever growing bandwidth demands mean that a reliable and optimum service level needs to be ensured in communication systems for specific traffic categories. Optimal allocation and use of resources may be achieved through the use of call admission control (CAC) mechanisms implemented in network systems. The resource reservation mechanism and the threshold mechanism are two of the most popular CAC methods. In the reservation mechanisms, a certain number of resources is reserved for selected (predefined) services only. In the case of threshold mechanisms, the number of resources allocated to individual traffic classes depends on the network load. This article discusses the results of simulations verifying the impact of applied CAC mechanisms on the traffic characteristics in elastic optical network (EON) nodes with a Clos structure. Loss probability results obtained with the use of the simulator are presented as well.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 4; 68--75
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies