Search results for "distributed"
showing 10 items of 1260 documents
PQ Metrics Implementation on Low Cost Smart Metering Platforms. A Case Study Analysis
2018
The increasing interest on the quality of the energy supplied and generated in distribution networks is raising the need of distributed power quality (PQ) measurements. To allow such capabilities with cost effective metering solutions, this paper wants to investigate the feasibility of using smart meters, already installed for energy billing, also for power quality monitoring. To this aim, an electronic board (based on STCOMET metrology device), already used in many energy meters of different countries, has been selected as case study platform. The manufacturer firmware of this board was essentially aimed at implementing energy meter metrics and power line communications functionalities. In…
The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 2: On-line coupling with the Multi-Model-Driver (MMD)
2012
A new, highly flexible model system for the seamless dynamical down-scaling of meteorological and chemical processes from the global to the meso-γ scale is presented. A global model and a cascade of an arbitrary number of limited-area model instances run concurrently in the same parallel environment, in which the coarser grained instances provide the boundary data for the finer grained instances. Thus, disk-space intensive and time consuming intermediate and pre-processing steps are entirely avoided and the time interpolation errors of common off-line nesting approaches are minimised. More specifically, the regional model COSMO of the German Weather Service (DWD) is nested on-line into the …
Incentive Mechanism for Edge-Computing-Based Blockchain
2020
Blockchain has been gradually applied to different Internet of Things (IoT) platforms. As the efficiency of the blockchain mainly depends on the network computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, we focus on investigating incentive mechanism for rational miners to purchase the computational resources. A edge computing-based blockchain network is considered, where the edge service provider (ESP) can provide computational resources for the miners. Accordingly, we formulate a two-stage Stackelberg game between the miners and ESP. The aim is to investigate Stackelberg equilibriu…
An Energy Blockchain, a Use Case on Tendermint
2018
The recent advances in distributed energy systems require new models for exchanging energy among prosumers in microgrids. The blockchain technology promises to solve the digital issues related to distributed systems without a trusted authority and to allow quick and secure energy transactions, which are verified and cryptographically protected. Transactions are approved and subsequently recorded on all the machines participating in the blockchain. This work demonstrates how users, which are nodes of the energy and digital networks, exchange energy supported by a customized blockchain based on Tendermint. We focus on the procedures for generating blocks and defining data structures for stori…
Convergence Analysis of Distributed Set-Valued Information Systems
2016
This paper focuses on the convergence of information in distributed systems of agents communicating over a network. The information on which the convergence is sought is not rep- resented by real numbers, as often in the literature, rather by sets. The dynamics of the evolution of information across the net- work is accordingly described by set-valued iterative maps. While the study of convergence of set-valued iterative maps is highly complex in general, this paper focuses on Boolean maps, which are comprised of arbitrary combinations of unions, intersections, and complements of sets. For these important class of systems, we provide tools to study both global and local convergence. A distr…
A Power Sector in Transition Understanding Transition Towards a Cleaner Grid and how Distributed Energy Resources Affect the Design and Operation of …
2018
Important changes in the supply and the demand side of electricity apparatus are now underway, triggered by a combination of drivers dramatically affecting the transmission sector of power systems: greenhouse gas emissions, distributed generation, energy efficiency and the full integration of the European energy market. A variety of accelerating factors - including active consumer, aggregators, energy storage, e-vehicles, etc..- are creating a new era for the many stakeholders, incl. system operators, regional entities, industry and consumer organizations, producers or their trade bodies, Regulators, public decision makers and the society at large. Entraining this background, ENTSO-E and th…
Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding
2009
Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures
2015
Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…
Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems
2009
Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication systems. These drawbacks are related to ID assignment, the relation between ID and physical location, the routing styles and lack of cache, etc. In this paper, we investigate several approaches that can improve the efficiency of the peer/resource lookup algorithm. After that, we simulate two sys…