Department of Computer Communications - Administrative Units - Bridge of Knowledge

Search

Department of Computer Communications

Filters

total: 534

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

  • A survey of strategies for communication networks to protect against large-scale natural disasters
    Publication
    • T. Gomes
    • J. Tapolcai
    • C. Esposito
    • D. Hutchison
    • F. Kuipers
    • J. Rak
    • D. Amaro
    • A. Iossifides
    • R. Travanca
    • J. Andre... and 8 others

    - Year 2016

    Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...

    Full text to download in external service

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
    Publication
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Year 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Full text to download in external service

  • Protection in elastic optical networks
    Publication
    • R. Goścień
    • K. Walkowiak
    • M. Klinkowski
    • J. Rak

    - IEEE NETWORK - Year 2015

    In this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....

    Full text to download in external service

  • Disaster-resilient communication networks: Principles and best practices
    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
    Publication
    • M. Chiesa
    • A. Kamisinski
    • J. Rak
    • G. Retvari
    • S. Schmid

    - IEEE Communications Surveys and Tutorials - Year 2021

    In order to meet their stringent dependability requirements, most modern packet-switched communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic,...

    Full text available to download

  • Resilient Routing in Communication Networks
    Publication

    - Year 2015

    This important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...

    Full text to download in external service

  • Influence of Acute Jugular Vein Compression on the Cerebral Blood Flow Velocity, Pial Artery Pulsation and Width of Subarachnoid Space in Humans
    Publication

    - PLOS ONE - Year 2012

    Celem pracy jest zaprezentowanie wyników badań dotyczących oceny wpływu silnego obustronnego zwężenia żył szyjnych na amplitudę pulsacji i zmiany szerokości przestrzeni podpajęczynówkowej, prędkość przepływu mózgowego krwi, obwodowe ciśnienie krwi oraz możliwe relacje między wymienionymi parametrami.

    Full text available to download

  • Performance Analysis of Multicast Video Streaming in IEEE 802.11 b/g/n Testbed Environment
    Publication

    The aim of the work is to analyse capabilities and limitations of different IEEE 802.11 technologies (IEEE 802.11 b/g/n), utilized for both multicast and unicast video streaming transmissions directed to mobile devices. Our preliminary research showed that results obtained with currently popular simulation tools can be drastically different than these possible in real-world environment, so, in order to correctly evaluate performance...

  • Multiple access in ad-hoc wireless LANs with noncooperative stations
    Publication

    - Year 2002

    A class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...

  • Technical foundations for noninvasive assessment of changes in the width of the subarachnoid space with near-infrared transillumination-backscattering sounding (NIR-TBSS)
    Publication

    - IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING - Year 2002

    Praca opisuje metodę transiluminacji w bliskiej podczerwieni umożliwiającą nieinwazyjne monitorowanie zmian szerokości przestrzeni podpajęczynówkowej oraz amplitudy tętnienia naczyń powierzchniowych mózgu.

  • Future research directions in design of reliable communication systems
    Publication
    • J. Rak
    • M. Pickavet
    • K. S. Trivedi
    • J. A. Lopez
    • A. M. C. A. Koster
    • J. P. Sterbenz
    • E. Çetinkaya
    • T. Gomes
    • M. Gunkel
    • K. Walkowiak
    • D. Staessens

    - TELECOMMUNICATION SYSTEMS - Year 2015

    In this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...

    Full text available to download

  • Information-driven network resilience: Research challenges and perspectives
    Publication
    • J. Rak
    • D. Papadimitriou
    • H. Niedermayer
    • P. Romero

    - Optical Switching and Networking - Year 2017

    Internet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...

    Full text to download in external service

  • Impact of slow breathing on the blood pressure and subarachnoid space width oscillations in humans
    Publication

    - Scientific Reports - Year 2019

    The aim of the study was to assess cardiac and respiratory blood pressure (BP) and subarachnoid space (SAS) width oscillations during the resting state for slow and fast breathing and breathing against inspiratory resistance. Experiments were performed on a group of 20 healthy volunteers (8 males and 12 females; age 25.3 ± 7.9 years; BMI = 22.1 ± 3.2 kg/m2). BP and heart rate (HR) were measured using continuous finger-pulse photoplethysmography....

    Full text available to download

  • Adaptive Positioning Systems Based on Multiple Wireless Interfaces for Industrial IoT in Harsh Manufacturing Environments
    Publication
    • J. Mongay Batalla
    • C. X. Mavromoustakis
    • G. Mastorakis
    • N. Xiong, Naixue
    • J. Woźniak

    - IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS - Year 2020

    As the industrial sector is becoming ever more flexible in order to improve productivity, legacy interfaces for industrial applications must evolve to enhance efficiency and must adapt to achieve higher elasticity and reliability in harsh manufacturing environments. The localization of machines, sensors and workers inside the industrial premises is one of such interfaces used by many applications. Current localization-based systems...

    Full text available to download

  • Disaster Resilience of Optical Networks: State of the Art, Challenges, and Opportunities
    Publication
    • J. Rak
    • R. Girão-Silva
    • T. Gomes
    • G. Ellinas
    • B. Kantarci
    • M. Tornatore

    - Optical Switching and Networking - Year 2021

    For several decades, optical networks, due to their high capacity and long-distance transmission range, have been used as the major communication technology to serve network traffic, especially in the core and metro segments of communication networks. Unfortunately, our society has often experienced how the correct functioning of these critical infrastructures can be substantially hindered by massive failures triggered by natural...

    Full text available to download

  • Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective
    Publication

    - SENSORS - Year 2022

    Currently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...

    Full text available to download

  • On the Origin of Protein Superfamilies and Superfolds
    Publication

    - Scientific Reports - Year 2015

    Distributions of protein families and folds in genomes are highly skewed, having a small number of prevalent superfamiles/superfolds and a large number of families/folds of a small size. Why are the distributions of protein families and folds skewed? Why are there only a limited number of protein families? Here, we employ an information theoretic approach to investigate the protein sequence-structure relationship that leads to...

    Full text available to download

  • A survey on network resiliency methodologies against weather-based disruptions
    Publication
    • M. Tornatore
    • J. Andre
    • P. Babarczi
    • T. Braun
    • E. Folstad
    • P. Heegaard
    • A. Hmaity
    • M. Furdek
    • L. Jorge
    • W. Kmiecik... and 9 others

    - Year 2016

    Due to the increasing dependence on network services of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large-scale failures, as in case of disaster events. The recently-formed EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. In particular, the Working Group (WG) 2 of the...

    Full text to download in external service

  • Human subarachnoid space width oscillations in the resting state
    Publication
    • M. Gruszecki
    • G. Lancaster
    • A. Stefanovska
    • P. J. Neary
    • R. Dech
    • W. Gumiński
    • A. F. Frydrychowski
    • J. Kot
    • P. Winklewski

    - Scientific Reports - Year 2018

    Abnormal cerebrospinal fluid (CSF) pulsatility has been implicated in patients suffering from various diseases, including multiple sclerosis and hypertension. CSF pulsatility results in subarachnoid space (SAS) width changes, which can be measured with near-infrared transillumination backscattering sounding (NIR-T/BSS). The aim of this study was to combine NIR-T/BSS and wavelet analysis methods to characterise the dynamics of the...

    Full text available to download

  • Providing Differentiated Levels of Service Availability in VANET Communications
    Publication

    Inter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...

    Full text to download in external service

  • Fast Service Recovery under Shared Protection in WDM Networks
    Publication

    Niniejszy artykuł dotyczy zagadnienia doboru tras przeżywalnych dla ruchu statycznego w zorientowanych połączeniowo sieciach WDM, przy wykorzystaniu idei współdzielonych ścieżek zabezpieczających. Pierwsza część jest poświęcona warunkom koniecznym oraz charakterystykom typowej metody współdzielenia zasobów ścieżek zabezpieczających, ze szczególnym uwzględnieniem uzyskiwanej średniej długości ścieżek zabezpieczających oraz wartości...

    Full text to download in external service

  • A new approach to design of weather disruption-tolerant wireless mesh networks
    Publication

    Wireless Mesh Networks, offering transmission rates of 1–10 Gb/s per a millimeter-wave link (utilizing the 71–86 GHz band) seem to be a promising alternative to fiber optic backbone metropolitan area networks because of significantly lower costs of deployment and maintenance. However, despite providing high transmission rates in good weather conditions, high-frequency wireless links are very susceptible to weather disruptions....

    Full text available to download

  • Effect of Maximal Apnoea Easy-Going and Struggle Phases on Subarachnoid Width and Pial Artery Pulsation in Elite Breath-Hold Divers
    Publication
    • P. Winklewski
    • O. Barak
    • D. Madden
    • A. Gruszecka
    • M. Gruszecki
    • W. Gumiński
    • J. Kot
    • A. F. Frydrychowski
    • I. Drvis
    • Z. Dujic

    - PLOS ONE - Year 2015

    Purpose: The aim of the study was to assess changes in subarachnoid space width (sas-TQ), the marker of intracranial pressure (ICP), pial artery pulsation (cc-TQ) and cardiac contribution to blood pressure (BP), cerebral blood flow velocity (CBFV) and cc-TQ oscillations throughout the maximal breath hold in elite apnoea divers. Non-invasive assessment of sas-TQ and cc-TQ became possible due to recently developed method based on...

    Full text available to download

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • Practical issues for the implementation of survivability and recovery techniques in optical networks
    Publication
    • G. Ellinas
    • D. Papadimitriou
    • J. Rak
    • D. Staessens
    • J. P. Sterbenz
    • K. Walkowiak

    - Optical Switching and Networking - Year 2014

    Failures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...

    Full text to download in external service

  • Wavelet transform analysis to assess oscillations in pial artery pulsation at the human cardiac frequency
    Publication
    • P. J. Winklewski
    • M. Gruszecki
    • J. Wolf
    • E. Świerblewska
    • K. Kunicka
    • M. Wszędybył-Winklewska
    • W. Gumiński
    • J. Zabulewicz
    • A. F. Frydrychowski
    • L. Bieniaszewski... and 2 others

    - MICROVASCULAR RESEARCH - Year 2015

    Pial artery adjustments to changes in blood pressure (BP)may last only seconds in humans. Using a novelmethod called near-infrared transillumination backscattering sounding (NIR-T/BSS) that allows for the non-invasive measurement of pial artery pulsation (cc-TQ) in humans, we aimed to assess the relationship between spontaneous oscillations in BP and cc-TQ at frequencies between 0.5 Hz and 5 Hz. We hypothesized that analysis of...

    Full text to download in external service

  • Taxonomy of Schemes for Resilient Routing
    Publication

    - Year 2020

    This chapter provides a taxonomy of schemes for resilient routing followed by a discussion of their application to contemporary architectures of communication networks. In particular, a general classification of schemes for resilient routing is first presented followed by a description of the reference schemes for IP networks. The chapter in its later part focuses on the representative techniques of resilient routing for a multi-domain...

    Full text to download in external service

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service

  • Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions
    Publication
    • J. Rak
    • D. Hutchison
    • J. Tapolcai
    • R. Bruzgiene
    • M. Tornatore
    • C. Mas-Machuca
    • M. Furdek
    • P. Smith

    - Year 2020

    Communication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...

    Full text to download in external service

  • Disaster-Resilient Routing Schemes for Regional Failures
    Publication
    • T. Gomes
    • D. Santos
    • R. Girão-Silva
    • L. Martins
    • B. Nedic
    • M. Gunkel
    • B. Vass
    • J. Tapolcai
    • J. Rak

    - Year 2020

    Large-scale natural disasters can have a profound effect on the telecommunication services in the affected geographical area. Hence, it is important to develop routing approaches that may help in circumventing damaged regional areas of a network. This prompted the development of geographically diverse routing schemes and also of disaster-risk aware routing schemes. A minimum-cost geodiverse routing, where a minimum geographical...

    Full text to download in external service

  • Enhancing Availability for Critical Services
    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Resilience of 5G Mobile Communication Systems to Massive Disruptions
    Publication

    - Year 2020

    This chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the remaining part of the network and (c) multi-operator protection to address the resilience...

    Full text to download in external service

  • Design of Resilient Vehicle-to-Infrastructure Systems
    Publication

    - Year 2020

    Vehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...

    Full text to download in external service

  • Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios
    Publication
    • T. Gomes
    • L. Jorge
    • R. Girão-Silva
    • J. Yallouz
    • P. Babarczi
    • J. Rak

    - Year 2020

    Disjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...

    Full text to download in external service

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters
    Publication
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Year 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Full text to download in external service

  • How to provide fair service for V2I communications in VANETs?
    Publication

    In this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...

    Full text to download in external service

  • eFRADIR: An Enhanced FRAmework for DIsaster Resilience
    Publication
    • A. Pasic
    • R. Girao-Silva
    • F. Mogyorosi
    • B. Vass
    • T. Gomes
    • P. Babarczi
    • P. Revisnyei
    • J. Tapolcai
    • J. Rak

    - IEEE Access - Year 2021

    This paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...

    Full text available to download

  • Measures of region failure survivability for wireless mesh networks
    Publication

    - WIRELESS NETWORKS - Year 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Full text available to download

  • Mobility management solutions for current IP and future networks
    Publication

    Enormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...

    Full text available to download

  • Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services
    Publication

    n its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...

    Full text to download in external service

  • A station strategy to deter backoff attacks in IEEE 802.11 LANs
    Publication

    Dla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.

    Full text to download in external service

  • SDN testbed for validation of cross-layer data-centric security policies
    Publication

    - Year 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Full text to download in external service

  • Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs
    Publication

    - Year 2009

    Przedstawiono ramy wymiany informacji reputacyjnej pomiędzy terminalami sieci mobilnej ad hoc lub sensorowej, prowadzące do efektywnej lokalizacji terminali egoistycznych i jednocześnie zapobiegające skutkom fałszywych rekomendacji. Integrację miar zaufania i rekomendacji reputacyjnych oparto na teorii Dempstera-Shafera.

  • Effects of acute hypercapnia on the amplitude of cerebrovascular pulsation in humans registered with a non-invasive method
    Publication
    • A. F. Frydrychowski
    • M. Wszędybył-Winklewska
    • W. Gumiński
    • P. Lass
    • T. Bandurski
    • P. J. Winklewski

    - MICROVASCULAR RESEARCH - Year 2012

    Celem pracy jest przedstawienie wpływu silnego zwiększenia ciśnienia dwutlenku węgla we krwi na amplitudę tętnienia naczyń mózgowych zarejestrowanego metodą bezinwazyjną.

    Full text to download in external service

  • Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
    Publication
    • D. Santos
    • A. de Sousa
    • C. Mas-Machuca
    • J. Rak

    - IEEE Access - Year 2021

    In Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...

    Full text available to download

  • Sympathetic Activation Does Not Affect the Cardiac and Respiratory Contribution to the Relationship between Blood Pressure and Pial Artery Pulsation Oscillations in Healthy Subjects
    Publication

    - PLOS ONE - Year 2015

    Using a novel method called near-infrared transillumination backscattering sounding (NIR-T/BSS) that allows for the non-invasive measurement of pial artery pulsation (cc-TQ) and subarachnoid width (sas-TQ) in humans, we assessed the influence of sympathetic activation on the cardiac and respiratory contribution to blood pressure (BP) cc-TQ oscillations in healthy subjects. The pial artery and subarachnoid width response to handgrip...

    Full text available to download

  • Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles

    As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...

    Full text available to download

  • On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks

    Handover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...

    Full text available to download

  • Acute hypoxia diminishes the relationship between blood pressure and subarachnoid space width oscillations at the human cardiac frequency
    Publication
    • M. Wszędybył-Winklewska
    • J. Wolf
    • E. Świerblewska
    • K. Kunicka
    • A. Gruszecka
    • M. Gruszecki
    • W. Kucharska
    • P. J. Winklewski
    • J. Zabulewicz
    • W. Gumiński... and 5 others

    - PLOS ONE - Year 2017

    Acute hypoxia exerts strong effects on the cardiovascular system. Heart-generated pulsatile cerebrospinal fluid motion is recognised as a key factor ensuring brain homeostasis. We aimed to assess changes in heart-generated coupling between blood pressure and subarachnoid space width oscillations during hypoxic exposure.

    Full text available to download

  • A Survey of Vehicular Network Systems for Road Traffic Management
    Publication

    In this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...

    Full text available to download

  • Pial artery and subarachnoid width response to apnoea in normal humans
    Publication
    • M. Wszędybył-Winklewska
    • J. Wolf
    • E. Świerblewska
    • K. Kunicka
    • M. Gruszecki
    • W. Gumiński
    • P. J. Winklewski
    • A. F. Frydrychowski
    • L. Bieniaszewski
    • K. Narkiewicz
    • K. Narkiewicz

    - JOURNAL OF HYPERTENSION - Year 2015

    Background: Little is known about intracranial pressure (ICP)-cerebral haemodynamic interplay during repetitive apnoea. A recently developed method based on near-infrared transillumination/backscattering sounding (NIR-T/BSS) noninvasively measures changes in pial artery pulsation (cc-TQ) as well as subarachnoid width (sas-TQ) in humans. Method: We tested the complex response of the pial artery and subarachnoid width to apnoea...

    Full text to download in external service

  • QoS/QoE in the Heterogeneous Internet of Things (IoT)
    Publication

    - Year 2017

    Applications provided in the Internet of Things can generally be divided into three categories: audio, video and data. This has given rise to the popular term Triple Play Services. The most important audio applications are VoIP and audio streaming. The most notable video applications are VToIP, IPTV, and video streaming, and the service WWW is the most prominent example of data-type services. This chapter elaborates on the most...

  • Joint optimization of anycast and unicast flows in survivable optical networks
    Publication

    - Year 2010

    Znane z literatury dotychczasowe prace związane z ochroną ruchu przed awarią elementów sieci dotyczą transmisji typu unicast (jeden-do-jednego). Niniejszy artykuł jest pierwszym prezentującym rozwiązanie jednoczesnej ochrony transmisji anycast (jeden-do-jednego-z-wielu) oraz transmisji unicast. Proponowane podejście wykorzystuje model ochrony ścieżki (ang. path protection). Zagadnienie zostało sformułowane w postaci odpowiedniego...

  • Planning a Cost-Effective Delay-Constrained Passive Optical Network for 5G Fronthaul
    Publication

    - Year 2022

    With the rapid growth in the telecommunications industry moving towards 5G and beyond (5GB) and the emergence of data-hungry and time-sensitive applications, Mobile Network Operators (MNOs) are faced with a considerable challenge to keep up with these new demands. Cloud radio access network (CRAN) has emerged as a cost-effective architecture that improves 5GB performance. The fronthaul segment of the CRAN necessitates a high-capacity...

    Full text to download in external service

  • Service-based Resilience for Embedded IoT Networks
    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • A new approach to provide the differentiated levels of network survivability under a double node failure
    Publication

    - Year 2009

    W artykule zaproponowano klasową metodę ochrony strumieni ruchu w sieciach WDM zapewniającą szybkie odtwarzanie połączeń w sytuacji jednoczesnej awarii jej dwóch elementów. Szczególny nacisk położono na zagadnienie zapewnienia zróżnicowanych poziomów przeżywalności w celu ich lepszego dopasowania do zróżnicowanych wymagań użytkowników. Pokazano, że w celu zapenienia ochrony przed awarią dwóch elementów, wymagania dotyczące przepustowości...

    Full text to download in external service

  • Comparison of near infrared spectroscopy (NIRS) and near-infrared transillumination-backscattering sounding (NIR-T/BSS) methods
    Publication

    - Scientific Reports - Year 2020

    The aim of the study was to compare simultaneously recorded a NIR-T/BSS and NIRS signals from healthy volunteers. NIR-T/BSS is a device which give an ability to non-invasively detect and monitor changes in the subarachnoid space width (SAS). Experiments were performed on a group of 30 healthy volunteers (28 males and 2 females, age 30.8 ± 13.4 years, BMI = 24.5 ± 2.3 kg/m2). We analysed recorded signals using analysis methods based...

    Full text available to download

  • Lossless Compression of Binary Trees with Correlated Vertex Names
    Publication

    - Year 2016

    Compression schemes for advanced data structures have become the challenge of today. Information theory has traditionally dealt with conventional data such as text, image, or video. In contrast, most data available today is multitype and context-dependent. To meet this challenge, we have recently initiated a systematic study of advanced data structures such as unlabeled graphs [1]. In this paper, we continue this program by considering...

    Full text to download in external service

  • Routing decisions independent of queuing delays in broadband leo networks
    Publication

    - Year 2009

    This paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...

    Full text to download in external service

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks
    Publication

    - Year 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Full text to download in external service

  • Enhancing Resilience of FSO Networks to Adverse Weather Conditions
    Publication

    - IEEE Access - Year 2021

    Optical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....

    Full text available to download

  • Traffic Remapping Attacks in Ad Hoc Networks
    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • Coupling between Blood Pressure and Subarachnoid Space Width Oscillations during Slow Breathing
    Publication

    - ENTROPY - Year 2021

    The precise mechanisms connecting the cardiovascular system and the cerebrospinal fluid (CSF) are not well understood in detail. This paper investigates the couplings between the cardiac and respiratory components, as extracted from blood pressure (BP) signals and oscillations of the subarachnoid space width (SAS), collected during slow ventilation and ventilation against inspiration resistance. The experiment was performed on...

    Full text available to download

  • Non-Satellite Broadband Maritime Communications for e-Navigation Services

    The development of broadband network access technologies available to users on land has triggered a rapid expansion of a diverse range of services provided by terrestrial networks. However, due to limitations of digital communication technologies in the off-shore area, the maritime ICT systems evolution so far has not followed that trend. Despite the e-navigation initiative defining the set of Maritime Services, the progress in...

    Full text available to download

  • NetBaltic System-Heterogenous Wireless Network for Maritime Communications

    In case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...

    Full text available to download

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Full text to download in external service

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Full text to download in external service

  • A novel class-based protection algorithm providing fast service recovery in IP/WDM networks
    Publication

    - Year 2008

    W artykule rozważa się warstwową strukturę sieci IP-MPLS/WDM. Węzły sieci mają funkcjonalność zarówno optycznych krotnic transferowych (OXC), jak i routerów IP. Dowolne dwa routery IP mogą być ze sobą połączone poprzez logiczne łącze IP realizowane przez ścieżkę optyczną WDM. Zaproponowano metodę klasową doboru tras przeżywalnych zapewniającą szybkie odtwarzanie uszkodzonych strumieni ruchu zarówno w warstwie WDM jak i IP-MPLS....

    Full text to download in external service

  • Capacity efficient shared protection and fast restoration scheme in self-configured optical networks
    Publication

    - Year 2006

    W artykule zaproponowano nową koncepcję optymalizacji rozdziału zasobów dla przeżywalnych sieci rozległych, która gwarantuje szybkie odtwarzanie usług po wystąpieniu awarii. Wykazano, iż proponowany algorytm, wykorzystujący ideę wierzchołkowego kolorowania grafów, nie powoduje wydłużania ścieżek zabezpieczających - zjawiska charakterystycznego dla powszechnie stosowanych algorytmów optymalizacji. Udowodniono, iż powyższa cecha...

  • A Centralized Reputation System for MANETs Based on Observed Path Performance
    Publication

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
    Publication

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Full text available to download

  • Multihomed Wireless Terminals: MAC Configuration and Network Selection Games
    Publication

    - Year 2011

    W artykule rozpatruje się rozdział pasma pomiędzy zbiór racjonalnych terminali bezprzewodowych dołączonych do wielu sieci lokalnych. Przy pomocy narzędzi analitycznych teorii gier pokazuje się, w jaki sposób można zniechęcać terminale do agresywnej konfiguracji protokołu MAC. Analizowana jest ilościowo rola prędkości generacji informacji zwrotnej z sieci w stosunku do częstości generacji żądań dostępu terminala do sieci. Wykazano,...

  • Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
    Publication

    A rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • A Reputation System for MANETs and WSNs Using Traffic Shedding
    Publication

    - Year 2010

    Wymuszanie kooperacji węzłów w ruchomych i sensorowych sieciach pakietowych zwykle wykorzystuje odrębne mechanizmy detekcyjne i penalizacyjne wykluczające węzły egoistyczne z protokołów routingu i ograniczający ich dostęp do sieci. Powoduje to, że ruch tranzytowy musi być przenoszony przez węzły kooperatywne. W pracy zaproponowano system reputacyjny powiązany z wymuszaniem kooperacji poprzez przerzucanie ruchu na węzły egoistyczne....

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
    Publication

    - Year 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • Methods for physical impairment constrained routing with selected protection in all-optical networks
    Publication
    • P. Soproni
    • T. Cinkler
    • J. Rak

    - TELECOMMUNICATION SYSTEMS - Year 2014

    In this paper, we investigate the problem of survivable all-optical routing in WDM networks with physical impairments. One of the recent key issues in survivable optical network design refers to maximization of the ratio of routeable demands while keeping the overall network cost low. In WDM networks, this goal can be achieved by routing as many demands in all-optical way as possible. Based on the latest technical trends driven...

    Full text available to download

  • Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
    Publication

    Abstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...

    Full text to download in external service

  • Coupling of Blood Pressure and Subarachnoid Space Oscillations at Cardiac Frequency Evoked by Handgrip and Cold Tests: A Bispectral Analysis
    Publication
    • M. Gruszecki
    • Y. Tkachenko
    • J. Kot
    • M. Radkowski
    • A. Gruszecka
    • K. Basiński
    • M. Waskow
    • W. Gumiński
    • J. Anand
    • J. Wtorek... and 3 others

    - Advances in Experimental Medicine and Biology - Year 2019

    The aim of the study was to assess blood pressure–subarachnoid space (BP–SAS) width coupling properties using time–frequency bispectral analysis based on wavelet transforms during handgrip and cold tests. The experiments were performed on a group of 16 healthy subjects (F/M; 7/9) of the mean age 27.2 ± 6.8 years and body mass index of 23.8 ± 4.1 kg/m². The sequence of challenges was first handgrip and then cold test. The handgrip...

    Full text to download in external service

  • Effective Data-Centric Reputation Systems for MANETs: A Novel Evaluation Framework
    Publication

    - Year 2011

    Zaprezentowano datacentryczny system reputacyjny dla sieci bezprzewodowej ad hoc z transmisją wieloskokową oraz metodę jego oceny opartą na wskaźniku efektywności. Wskaźnik ten odzwierciedla wymienność pomiędzy odróżnialnością węzłów egoistycznych od pozostałych oraz stopniem wykazywanego przez nie egoizmu. Dla przyjętego modelu sieci przedyskutowano analitycznie znaczenie znajomości tras i metryk reputacyjnych przez węzły.

  • Remote DHCPv6 autoconfiguration for mobile IPv6 nodes
    Publication

    Przedstawiono ideę przełączania międzydomenowego węzłów wspierających protokół IPv6, z wykorzystaniem procedur stanowej (statefull) z użyciem serwerów autokonfiguracji DHCPv6. Dokonano analizy czasu trwania procesów przełączania w warstwach: drugiej i trzeciej. Zaproponowano zmodyfikowaną metodę autokonfiguracji węzła, pozwalającą na wyeliminowanie przerwy w transmisji związanej z wykrywaniem zduplikowanych adresów (Duplicate Address...

  • A Virtualization-Level Future Internet Defense-in-Depth Architecture
    Publication

    - Year 2012

    Projekt Inżynieria Internetu Przyszłości obecnie realizowany w Polsce definiuje trzy równoległw Internety w ramach Systemu IIP. System ma architekturę 4-poziomową,, której częścią składową jest architektura bezpieczeństwa na poziomie 2. Pokazano, w jaki sposób kombinacja mechanizmów ''twardego'' i ''miękkiego'' bezpieczeństwa pozwala wytworzyć metryki zaufania poszczególnych węzłów, co prowadzi do eliminacji węzłów zachowujących...

    Full text available to download

  • A taxonomy of challenges to resilient message dissemination in VANETs
    Publication

    - Year 2016

    Inter-vehicular communications is seen as a promising solution to a number of issues related with public road safety, road congestion management, and infotainment. However, Vehicular Ad-hoc NETworks (VANETs) characterized by high mobility of vehicles and facing a number of other issues related with high frequency wireless communications and network disconnections, encounter major challenges related with reliability of message delivery....

    Full text to download in external service

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
    Publication

    In recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...

    Full text available to download

  • Types of Markov Fields and Tilings
    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2016

    The method of types is one of the most popular techniques in information theory and combinatorics. However, thus far the method has been mostly applied to one-dimensional Markov processes, and it has not been thoroughly studied for general Markov fields. Markov fields over a finite alphabet of size m ≥ 2 can be viewed as models for multi-dimensional systems with local interactions. The locality of these interactions is represented...

    Full text available to download

  • Toward Fast Calculation of Communication Paths for Resilient Routing
    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Impact of WDM Network Topology Characteristics on the Extent of Failure Losses
    Publication

    - Year 2010

    W artykule dokonano oceny wpływu charakterystyk topologicznych sieci na rozmiar strat po awarii węzła/łącza będącej następstwem ataku. W tym celu wprowadzono współczynnik ATRF. Wyniki badań pokazały, że wykorzystanie standardowej metryki odległości do wyznaczania tras podstawowych prowadzi do istotnego zwiększenia liczby połączeń uszkodzonych w wyniku ataku w porównaniu ze skutkami awarii losowej.

    Full text to download in external service

  • An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
    Publication

    - Year 2006

    Dla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...

  • Methods of Network Resource Provisioning for the Future Internet IIP Initiative
    Publication
    • J. Gozdecki
    • M. Kantor
    • K. Wajda
    • J. Rak

    - TELECOMMUNICATION SYSTEMS - Year 2016

    In this paper, we present specification, design and implementation aspects of a network resource provisioning module introduced for the Polish Initiative of Future Internet called System IIP. In particular, we propose a set of novel LP optimization models of network resource provisioning designed to minimize the network resource consumption, either bandwidth or node’s computational power, as well as to maximize the residual capacity....

    Full text available to download

  • Topology Discovery of Hierarchical Ethernet LANs without SNMP support
    Publication

    - Year 2015

    This paper presents an algorithm that allows for discovery of layer-2 hierarchical Ethernet network topology using agents running on selected end nodes. No SNMP, MIB, hardware, firmware, or operating system-level software modification is required. The method is based on transmission of customized Ethernet frames among installed software agents. It can be used to discover the topology of LAN or one VLAN segment as long as no MAC...

  • Evaluation of time-efficiency of disjoint paths calculation schemes
    Publication

    - Year 2015

    The concept of alternate paths has been shown in the literature to provide fast response of a network to failures of its elements (nodes/links) affecting flows along the primary communication paths. Various approaches have been proposed to reduce the time necessary to redirect the respective flows onto the alternate paths. In this paper, we focus on another important objective, that so far has not received much attention, i.e.,...

    Full text to download in external service

  • Extension management of a knowledge base migration process to IPv6

    There are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most indisputable. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed the two applications that supports the migration process. Their main purpose is to help less experienced network administrators facilitate the migration process with a particular...

    Full text to download in external service

  • Wireless Multihoming Modeled as a Multi-WLAN Game
    Publication

    - Year 2009

    Zbadano strategie wieloetapowe dostępu do medium transmisyjnego oparte na tzw. wypłatach wirtualnych, biorąc pod uwagę wybór sieci lokalnej oraz stopień agresji konfiguracji protokołu MAC. Zakładano obecność stacji-agresora o idealnie predykcyjnej strategii dostępu. Wykazano możliwość zniechęcania takiego agresora za cenę niewielkiego spadku wydajności sieci.

  • Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
    Publication

    - Year 2016

    Popularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...

    Full text to download in external service

  • More Just Measure of Fairness for Sharing Network Resources
    Publication

    - Year 2016

    A more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...

    Full text to download in external service