Search results for "Computer network"

showing 10 items of 1634 documents

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct

Demo - A Cell-level Traffic Generator for LoRa Networks

2017

In this demo we present and validate a LoRa cell traffic generator, able to emulate the behavior of thousands of low-rate sensor nodes deployed in the same cell, by using a single Software Defined Radio (SDR) platform. Differently from traditional generators, whose goal is creating packet flows which emulate specific applications and protocols, our focus is generating a combined radio signal, as seen by a gateway, given by the super-position of the signals transmitted by multiple sensors simultaneously active on the same channel. We argue that such a generator can be of interest for testing different network planning solutions for LoRa networks.

IoTGenerator (computer programming)cell emulatorSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryNetwork packet05 social sciences020206 networking & telecommunications02 engineering and technologySoftware-defined radioLoRaLoRaWANNetwork planning and designDefault gateway0502 economics and business0202 electrical engineering electronic engineering information engineeringWirelessSDRbusinessTraffic generation model050203 business & managementComputer networkCommunication channelProceedings of the 23rd Annual International Conference on Mobile Computing and Networking - MobiCom 17
researchProduct

Distributed GNSS-Based Time Synchronization and Applications

2016

The paper deals with synchronization standards, applications and challenges in the modern packet switched telecommunication networks. In recent years, the number of time-dependent services and systems only increases with the development of such areas as Internet of Things (IoT), industrial Internet, remote automation and robotics, precise positioning etc. In the paper, these emerging applications are discussed. An alternative way to the traditional centralized synchronization infrastructure is proposed. Compact and low-priced devices equipped with a Global Navigation Satellite System (GNSS) receiver and a reliable internal clock can be installed specifically in the places where they are nee…

IoTta213GNSSComputer sciencebusiness.industry020206 networking & telecommunicationsRoboticsSatellite system02 engineering and technologyAutomationtimestampindustrial internetGNSS applicationsSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringIndustrial InternetData synchronizationArtificial intelligenceTimestampbusinesssynchronizationComputer network
researchProduct

The Impact of Java Applications at Microarchitectural Level from Branch Prediction Perspective

2009

The portability, the object-oriented and distributed programming models, multithreading support and automatic garbage collection are features that make Java very attractive for application developers. The main goal of this paper consists in pointing out the impact of Java applications at microarchitectural level from two perspectives: unbiased branches and indirect jumps/calls, such branches limiting the ceiling of dynamic branch prediction and causing significant performance degradation. Therefore, accurately predicting this kind of branches remains an open problem. The simulation part of the paper mainly refers to determining the context length influence on the percentage of unbiased bran…

JavaComputer Networks and CommunicationsComputer scienceIndirect branchContext (language use)Parallel computingArityBranch predictorComputer Science ApplicationsSoftware portabilityInheritance (object-oriented programming)Computational Theory and MathematicscomputerGarbage collectioncomputer.programming_languageInternational Journal of Computers Communications & Control
researchProduct

A Task Execution Scheme for Dew Computing with State-of-the-Art Smartphones

2021

The computing resources of today’s smartphones are underutilized most of the time. Using these resources could be highly beneficial in edge computing and fog computing contexts, for example, to support urban services for citizens. However, new challenges, especially regarding job scheduling, arise. Smartphones may form ad hoc networks, but individual devices highly differ in computational capabilities and (tolerable) energy usage. We take into account these particularities to validate a task execution scheme that relies on the computing power that clusters of mobile devices could provide. In this paper, we expand the study of several practical heuristics for job scheduling including executi…

Job schedulerTK7800-8360Computer Networks and CommunicationsComputer scienceWireless ad hoc networkdew computingcomputer.software_genresmartphoneScheduling (computing)Task (computing)edge computingscheduling heuristicsHardware and ArchitectureControl and Systems EngineeringHuman–computer interactionMiddlewareSignal ProcessingElectrical and Electronic EngineeringElectronicsjob schedulingHeuristicsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Mobile devicecomputerEdge computingElectronics
researchProduct

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

2013

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

Key distribution in wireless sensor networksComputer Networks and CommunicationsForward secrecybusiness.industryComputer scienceNode (networking)Distributed data storeProbabilistic logicKey (cryptography)businessWireless sensor networkComputer networkComputer Communications
researchProduct

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks

2012

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…

Key distribution in wireless sensor networksComputer sciencebusiness.industryRobustness (computer science)Wireless ad hoc networkDistributed computingComputer data storageScalabilityTrusted ComputingTrusted third partybusinessWireless sensor networkComputer network2012 IEEE 13th International Conference on Mobile Data Management
researchProduct

A hybrid network for maritime on-board communications

2012

Current maritime on-board communications have to be enhanced for safety and security, where ubiquitous technologies can help, together with providing comfort and convenience to the crew and passengers. Employing wireless sensor networks on board is one recent practice of implementing ubiquitous technology for ships, where further study is needed because of the connectivity challenges. Meanwhile, it is important for an on-board communication system to be reliable and flexible for handling emergency situations. In this paper, we propose a solution of employing ubiquitous technology on ships in a way that both connectivity and emergency handling are examined. Two key aspects of this proposal a…

Key distribution in wireless sensor networksUbiquitous computingbusiness.industryComputer scienceHybrid systemThe InternetWired communicationCommunications systembusinessWireless sensor networkBackward compatibilityComputer network2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Towards a layer-less network architecture — A case from Wireless Sensor Networks

2011

Ad hoc and Wireless Sensor Networks (WSNs) form a challenging domain for existing network protocols and paradigms to fit into. The traditional models conceived for wired networking and adapted for wireless and mobile environments provide an inefficient and ungraceful outcome when exercised against highly dynamic and highly mobile nature of ad hoc wireless sensor networks. Efforts are being made to tweak existing (and sometimes create from scratch) principles and models that can provide a concrete framework for such newer paradigms. The momentum of the traditional layered architecture carried over from the wired networks to infrastructure based wireless networks pushes the same approaches as…

Key distribution in wireless sensor networksVehicular ad hoc networkWireless ad hoc networkComputer sciencebusiness.industryWireless networkDistributed computingMobile wireless sensor networkMobile ad hoc networkAd hoc wireless distribution servicebusinessWireless sensor networkComputer network2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

A Multisensor Proposal for Wireless Sensor Networks

2008

Every sensor node in a wireless sensor network (WSN) has a microcontroller, a transmitter/receiver and a sensor. It is able to acquire data from specific point in a real environment and transmit it through the WSN. Sometimes it is useful to gather different type of data from the same place in order to obtain a final result. In the related literature, very few works are about sensing different parameters using a unique sensor. In this paper we propose a Wireless IP multisensor that is able to gather several types of data from the environment and transmit the result of their combination. Our proposal decision has being mainly based on its development costs, its expansion capacity and its flex…

Key distribution in wireless sensor networksVisual sensor networkComputer sciencebusiness.industrySensor nodeMobile wireless sensor networkWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessSensor fusionWireless sensor networkData transmissionComputer network2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)
researchProduct