Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Konorski, J." wg kryterium: Autor


Wyświetlanie 1-6 z 6
Tytuł:
Detection and quantification of self- similarity in data traffic for prediction of performance of marine data file transfer
Autorzy:
Konorski, J.
Powiązania:
https://bibliotekanauki.pl/articles/1920405.pdf
Data publikacji:
1999
Wydawca:
Instytut Morski w Gdańsku
Tematy:
marine data
data traffic
Opis:
The time-sensitivity of large marine data files over a communication network necessitates accurate simulative prediction of the file transfer performance. Careful data traffic modelling is required to fit the actual traffic characteristics for subsequent generation of synthetic traffic traces and feeding them into a simulation model. Classical models have recently proved inadequate due to the discovery of self-similarity (fractal behaviour) in data traffic. This paper attempts to systematise the mathematical background of self-similarity and the ways it manifests itself in stochastic processes modelling data traffic. Relevance of self-similarity to traffic description and measurements is discussed. Results of a research effort at the Department of Marine Electronics of the Maritime Institute in Gdansk are described, which focus on the development of a software tool for detection and quantification of self- similarity in observed or synthetically generated data traffic.
Źródło:
Biuletyn Instytutu Morskiego w Gdańsku; 1999, 26, 2; 29-48
1230-7424
2450-5536
Pojawia się w:
Biuletyn Instytutu Morskiego w Gdańsku
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
Autorzy:
Makutunowicz, A.
Konorski, J.
Powiązania:
https://bibliotekanauki.pl/articles/308273.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
secret sharing
security
smart grid
Opis:
The industry pushes towards Smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the Smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses a security risk to the power grid infrastructure. In this paper the authors consider a Threshold Attendance Protocol (TAP) acting in a reverted security paradigm. Its main idea is to keep the network load at a predictable level at all times. To achieve that, TAP in AMI environment is embedded and the solution using real-life simulation parameters is validated.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 2; 42-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of a hash function to discourage MAC-layer misbehaviour in wireless LANs
Autorzy:
Konorski, J.
Kurant, M.
Powiązania:
https://bibliotekanauki.pl/articles/958119.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
wireless LAN
MAC protocol
noncooperative setting
Opis:
Contention-based MAC protocols for wireless ad hoc LANs rely on random deferment of packet transmissions to avoid collisions. By selfishly modifying the probabilities of deferments greedy stations can grab more bandwidth than regular stations that apply standard-prescribed probabilities. To discourage such misbehaviour we propose a protocol called RT-hash whereby the winner of a contention is determined using a public hash function of the channel feedback. RT-hash is effective in a full hearability topology, assuming that improper timing of control frames is detectable and that greedy stations do not resort to malicious actions. Simulation experiments show that RT-hash protects regular stations' bandwidth share against various sophisticated greedy strategies of deferment selection; as such it may contribute to MAC-layer network security.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 2; 38-46
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Framework for Detection of Selfishness in Multihop Mobile Ad Hoc Networks
Autorzy:
Konorski, J.
Orlikowski, R.
Powiązania:
https://bibliotekanauki.pl/articles/308968.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
reputation system
selfish behavior
wireless ad hoc network
Opis:
The paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behavior. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer theory-based selfishness detection framework (DST-SDF) with some mathematical background and simulation analysis.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 2; 34-40
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modulo N Backoff Scheme for Effective QoS Differentiation and Increased Bandwidth Utilization in IEEE 802.11 Networks
Autorzy:
Janczar, T.
Konorski, J.
Wodniak, J.
Pawlikowski, K.
Powiązania:
https://bibliotekanauki.pl/articles/308888.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
channel access
MAC
performance analysis
random backoff
WLAN
Opis:
The paper presents a new modulo N channel access scheme for wireless local area networks (WLANs). The novel solution derives from the distributed coordination function (DCF) of the IEEE 802.11 standard, further elaborated as enhanced distribution channel access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks. The most appealing feature of the new modulo N backoff scheme is that it outperforms the original 802.11 solution in terms of channel utilization ratio under any traffic conditions. Furthermore, the modulo N proposal can be naturally augmented with QoS differentiation mechanisms like 802.11e extensions. The prioritized modulo N scheme achieves better throughput-delay characteristics for multimedia traffic when compared with the original 802.11e proposal. At the same time, the new solution retains backward compatibility and includes all features which have made IEEE 802.11 networks extremely popular nowadays.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 2; 41-47
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measurements of QoS/QoE parameters for media streaming in a PMIPv6 testbed with 802.11 b/g/n WLANs
Autorzy:
Hoeft, M.
Gierlowski, K.
Gierszewski, T.
Konorski, J.
Nowicki, K.
Wozniak, J.
Powiązania:
https://bibliotekanauki.pl/articles/220593.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
media streaming
mobility
Proxy Mobile IPv6
IEEE 801.11
QoS/QoE
Opis:
The growing number of mobile devices and the increasing popularity of multimedia services result in a new challenge of providing mobility in access networks. The paper describes experimental research on media (audio and video) streaming in a mobile IEEE 802.11 b/g/n environment realizing network-based mobility. It is an approach to mobility that requires little or no modification of the mobile terminal. Assessment of relevant parameters has been conducted in an IPv6 testbed. During the tests, both Quality of Service (QoS) and Quality of Experience (QoE) parameters have been considered. Against the background of standard L3 and L2 handovers, an emerging mobility solution named Proxy Mobile IPv6 (PMIPv6) has been examined. Its advantages (L3 connectivity maintenance) and disadvantages (packet loss during handover) are emphasized based on the obtained results. Moreover, a new solution for handover optimization has been proposed. A handoff influence upon audio/video generation and transfer imperfections has been studied and found to be an interesting direction of future work.
Źródło:
Metrology and Measurement Systems; 2012, 19, 2; 283-294
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies