Filtry
wszystkich: 147
wybranych: 142
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: FAILURES OF NETWORK NODES/LINKS
-
Multi-agent systems registration and maintenance of address mapping without agent self-registation
PublikacjaMonitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
An approach to improve the time efficiency of disjoint paths calculation
PublikacjaFailures of network elements can be appropriately dealt with by utilization of alternate disjoint paths to provide redirection of flows affected by failures of the respective working paths. Known approaches can be broadly divided by decision on backup paths installation into proactive and reactive mechanisms, as well as based on the scope of recovery actions into local and global rerouting. There are several important scenarios...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublikacjaThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
PublikacjaIn this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublikacjaWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublikacjaMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns
PublikacjaIn this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
The Methodology of identifying the place to install shunt compensators in the transmission network
PublikacjaThis methodology of selection and localization of static com- paper presents pensators in wide network. Proposed method is based on analysis of voltage area power profiles in the nodes of the power grid, and designating locations, In Which Voltages ex- cessively tend to change in time. Practical way of modeling the SVC device in PLANS program you Presented, as well as some example results of research.
-
A concept of measurement system based on the Z-Wave standard
PublikacjaIn the paper a new concept of measurement system based on the Z-Wave standard is presented. This standard is dedicated to use mainly in home automation systems, but its properties enable to use it in dispersed measurement systems and support wireless communication between measurement nodes in a mesh-type network. In the paper basic metrological aspects of the Z-Wave standard and an example of impedance measurement system are discussed.
-
Optimizing FSO networks resilient to adverse weather conditions by means of enhanced uncertainty sets
PublikacjaThis work deals with dimensioning of wireless mesh networks (WMN) composed of FSO (free space optics) links. Although FSO links realize broadband transmission at low cost, their drawback is sensitivity to adverse weather conditions causing transmission degradation on multiple links. Hence, designing such FSO networks requires an optimization model to find the cheapest configuration of link capacities that will be able to carry...
-
Gossiping by energy-constrained mobile agents in tree networks
PublikacjaEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
A survey on network resiliency methodologies against weather-based disruptions
PublikacjaDue to the increasing dependence on network services of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large-scale failures, as in case of disaster events. The recently-formed EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. In particular, the Working Group (WG) 2 of the...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Disciplines and measures of information resilience
PublikacjaCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
The realization of ASON/GMPLS control plane
PublikacjaASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
A new approach to design of weather disruption-tolerant wireless mesh networks
PublikacjaWireless Mesh Networks, offering transmission rates of 1–10 Gb/s per a millimeter-wave link (utilizing the 71–86 GHz band) seem to be a promising alternative to fiber optic backbone metropolitan area networks because of significantly lower costs of deployment and maintenance. However, despite providing high transmission rates in good weather conditions, high-frequency wireless links are very susceptible to weather disruptions....
-
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublikacjaIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Measures of region failure survivability for wireless mesh networks
PublikacjaWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Performance Models of a Multidomain IMS/NGN Service Stratum
PublikacjaThis paper quantifies call processing performance (CPP) of a multidomain IMS/NGN architecture, which was proposed to deliver current and future telecommunication services with strict quality requirements, independently of the transport network technologies. A realistic simulation model is used as a reference for evaluation of the analytical results, in which vari-ous types of queuing systems are applied to model the opera-tion...
-
Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm
PublikacjaIn this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...
-
Enhancing Availability for Critical Services
PublikacjaTraditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...
-
THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS
PublikacjaPurpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...
-
Topology Discovery of Hierarchical Ethernet LANs without SNMP support
PublikacjaThis paper presents an algorithm that allows for discovery of layer-2 hierarchical Ethernet network topology using agents running on selected end nodes. No SNMP, MIB, hardware, firmware, or operating system-level software modification is required. The method is based on transmission of customized Ethernet frames among installed software agents. It can be used to discover the topology of LAN or one VLAN segment as long as no MAC...
-
Computer-aided analysis of resonance risk in power system with Static Var Compensators
PublikacjaStatic Var Compensators operation in a power system may significantly improve voltage profiles in nodes and the reactive power balance, as well as ensure greater system stability in emergency conditions. However these devices may be a cause of a resonance in the system. The aim of this paper is to call attention to the need to include resonance phenomena in a compensator’s location evaluation process. The analysis performed in...
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublikacjaThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublikacjaNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
Tryton Supercomputer Capabilities for Analysis of Massive Data Streams
PublikacjaThe recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...
-
Supply current signal and artificial neural networks in the induction motor bearings diagnostics
PublikacjaThis paper contains research results of the diagnostics of induction motor bearings based on measurement of the supply current with usage of artificial neural networks. Bearing failure amount is greater than 40% of all engine failures, which makes their damage-free operation crucial. Tests were performed on motors with intentionally made bearings defects. Chapter 2 introduces the concept of artificial neural networks. It presents...
-
Metaheuristic algorithms for optimization of resilient overlay computing systems
PublikacjaThe idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublikacjaIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Diagnosing wind turbine condition employing a neural network to the analysis of vibroacoustic signals
PublikacjaIt is important from the economic point of view to detect damage early in the wind turbines before failures occur. For this purpose, a monitoring device was built that analyzes both acoustic signals acquired from the built-in non-contact acoustic intensity probe, as well as from the accelerometers, mounted on the internal devices in the nacelle. The signals collected in this way are used for long-term training of the autoencoder...
-
On-line Search in Two-Dimensional Environment
PublikacjaWe consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...
-
Leader election for anonymous asynchronous agents in arbitrary networks
PublikacjaWe consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublikacjaRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
RNDM 2016 Workshop and 2nd Meeting of COST CA15127-RECODIS: Highlights from the Resilience Week in Halmstad, Sweden
PublikacjaLeading network resilience researchers took part in the Resilience Week on Sept. 12-15, 2016 at Halmstad University, SE by Prof. Magnus Jonsson from the Centre for Research on Embedded Systems (CERES), Halmstad University, SE, and Prof. Jacek Rak from Gdansk University of Technology, PL. It included two major events: - The 2nd Meeting of COST CA15127–RECODIS Action (Resilient Communication Services Protecting End-user Applications...
-
Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks
PublikacjaIn this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...
-
A Development of a Capacitive Voltage Divider for High Voltage Measurement as Part of a Combined Current and Voltage Sensor
PublikacjaThis article deals with the development of capacitive voltage divider for high voltage measurements and presents a method of analysis and optimization of its parameters. This divider is a part of a combined voltage and current sensor for measurements in high voltage power networks. The sensor allows continuous monitoring of the network distribution status and performs a quick diagnosis and location of possible network failures....
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Application of commercial microwave links (CMLs) attenuation for quantitative estimation of precipitation
PublikacjaPrecipitation estimation models are typically sourced by rain gauges, weather radars and satellite observations. A relatively new technique of precipitation estimation relies on the network of Commercial Microwave Links (CMLs) employed for cellular communication networks: the rain-inducted attenuation in the links enables the precipitation estimation. In the paper, it is analysed to what extent the precipitation derived from CML...
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublikacjaIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
The selected hydrotechnical conditions of the Dnieper – Bug Channel and the Pripyat River in the development of the International Waterway E40
PublikacjaInternational waterway E40 (MDW E40) is included in the network of inland waterways of transnational importance. It is a link between two areas: the Baltic Sea and the Black Sea. E40 route runs through three countries: Poland, Belarus and Ukraine. The article presents the results of the study on the analysis of two very important sections of the MDW E40 on the Belarusian section, it is:. the Dnieper – Bug Channel and the Pripy...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublikacjaIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...