Wyniki wyszukiwania dla: OSPF QOS ROUTING - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: OSPF QOS ROUTING

Wyniki wyszukiwania dla: OSPF QOS ROUTING

  • Attempt to a Video-Transmission Capability in MV Mine Cable Network Using BPL-PLC Technology

    Publikacja
    • G. Debita
    • P. Falkowski-Gilski
    • M. Habrych
    • B. Miedziński
    • G. Wiśniewski
    • P. Jedlikowski
    • B. Polnik

    - Rok 2020

    This article presents and discusses the attempt to transmit video content using the BPL-PLC (Broadband over Power Line - Power Line Communication) technology. It includes simulation results of a specially developed digital transmitter and receiver, dedicated to a given predefined 6 kV mining power cable. The effect of two different transmission modes (2-7 MHz and 3-7.5 MHz) and two types of coupling (capacitive-inductive and induction-inductive),...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Simulation model of IMS/NGN call processing performance

    In current telecommunications it is assumed that demands of the information society for quickly delivered services will be satisfied by the Next Generation Network (NGN) architecture, which includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS), proper design and dimensioning of NGN is absolutely necessary, for which appropriate models have to be proposed. As the NGN architecture is very complicated,...

  • Call processing performance in multidomain IMS/NGN architecture

    Publikacja

    The Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...

  • The Development of a Combined Method to Quickly Assess Ship Speed and Fuel Consumption at Different Powertrain Load and Sea Conditions

    Decision support systems (DSS) recently have been increasingly in use during ships operation. They require realistic input data regarding different aspects of navigation. To address the optimal weather routing of a ship, which is one of the most promising field of DSS application, it is necessary to accurately predict an actually attainable speed of a ship and corresponding fuel consumption at given loading conditions and predicted...

    Pełny tekst do pobrania w portalu

  • Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes

    Publikacja

    - Rok 2019

    A novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...

    Pełny tekst do pobrania w portalu

  • Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios

    Publikacja
    • T. Gomes
    • L. Jorge
    • R. Girão-Silva
    • J. Yallouz
    • P. Babarczi
    • J. Rak

    - Rok 2020

    Disjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approximation of Message Inter-Arrival and Inter-Departure Time Distributions in IMS/NGN Architecture Using Phase-Type Distributions

    Currently it is assumed that requirements of the information society for delivering multimedia services will be satisfied by the Next Generation Network (NGN) architecture, which includes elements of the IP Multimedia Subsystem (IMS) solution. In order to guarantee Quality of Service (QoS), NGN has to be appropriately designed and dimensioned. Therefore, proper traffic models should be proposed and applied. This requires determination...

    Pełny tekst do pobrania w portalu

  • Universal Augmentation Schemes for Network Navigability

    Publikacja
    • P. Fraigniaud
    • C. Gavoille
    • A. Kosowski
    • E. Lebhar
    • Z. Lotker

    - THEORETICAL COMPUTER SCIENCE - Rok 2009

    Rozważano problem uzupełniania grafu (reprezentującego np. sieci społeczne) poprzez dodanie w każdym węźle jednego dodatkowego skierowanego połączenia (długodystansowego). Dokładniej, dla każdego węzła definiuje się listę prawdopodobieństw istnienia połączenia wychodzącego z danego węzła do wszystkich pozostałych węzłów; wartości tych prawdopodobieństw muszą sumować się do jedności. Routing zachłanny w takiej sieci polega na przekazywaniu...

    Pełny tekst do pobrania w portalu

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publikacja

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Pełny tekst do pobrania w portalu

  • Broker telekomunikacyjny

    Demonopolizacja rynku usług telekomunikacyjnych narzuca konieczność realizacji funkcji wyboru operatora sieci dla obsługi żądania usługi. W pracy przedstawiono koncepcję, realizację oraz wyniki testów i badań Brokera Telekomunikacyjnego BT, który realizuje tą funkcję. Algorytm podejmowania decyzji przez BT uwzględnia parametry poziomu i jakości usług oferowane przez operatorów oraz preferencje klienta dotyczące połączenia. Klient...

  • Traffic model for evaluation of call processing performance parameters in IMS-based NGN

    Publikacja

    - Rok 2012

    In the modern world requirements for accurate and fast information distribution are becoming more and more important, which creates a strong necessity for appropriate telecommunication network architecture. Proposition of such an architecture is the Next Generation Network (NGN) concept, which in order to guarantee Quality of Service (QoS), should be correctly designed and dimensioned. For this reason proper traffic models must...

  • Traffic Model of IMS/NGN Architecture with Transport Stratum Based on MPLS Technology

    Growing expectations for a fast access to information create strong demands for a universal telecommunication network architecture, which provides various services with strictly determined quality. Currently it is assumed that these requirements will be satisfied by Next Generation Network (NGN), which consists of two stratums and includes IP Multimedia Subsystem (IMS) elements. To guarantee Quality of Service (QoS) all NGN stratums...

    Pełny tekst do pobrania w portalu

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu

  • Quality Parameters in IMS/NGN Networks

    Publikacja

    - Rok 2019

    The Next Generation Network (NGN) architecture, including elements of the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of current and future information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design is necessary with respect to among others standardized call processing performance parameters, including expected...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Ensuring the QoE-Related Fairness to Reduce the User Abandonment Ratio

    Publikacja

    These days, it is quite a challenge for app owners to keep users engaged with an app. Currently, the level of user abandonment is one of the key parameters that application owners are interested in. To meet these challenges, we are conducting an extended study of a previously proposed solution that significantly reduces the abandonment rate of a given application. The investigated solution is based on the methods of fairness using...

    Pełny tekst do pobrania w portalu

  • Mobile Cloud computing architecture for massively parallelizablegeometric computation

    Publikacja
    • V. Sánchez Ribes
    • H. Mora-Mora
    • A. Sobecki
    • F. José Mora Gimeno

    - COMPUTERS IN INDUSTRY - Rok 2020

    Cloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...

    Pełny tekst do pobrania w portalu

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publikacja

    - Rok 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS

    Publikacja

    - Rok 2013

    In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Programowy generator strumieni pakietów

    Publikacja

    Testowanie rzeczywistych urządzeń IP QoS wymaga źródeł ruchu o różnych charakterystykach ruchowych i informacyjnych umożliwiających przeprowadzenie badań dla skrajnych obciążeń. Równoznaczne to jest z generowaniem strumieni pakietów o dużych przepływnościach. Profesjonalne generatory sprzętowe są bardzo drogie i często dla pełnego przeprowadzenia badań konieczny jest zestaw większej liczby takich generatorów. Rozwiązaniem może...

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Pełny tekst do pobrania w portalu

  • Cellular network quality evaluation at a university campus on the eve of 5G

    Thanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...

    Pełny tekst do pobrania w portalu

  • Enhancing Availability for Critical Services

    Publikacja
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Rok 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publikacja
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Rok 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Impact of Urbanization on Stormwater Runoff from a Small Urban Catchment: Gdańsk Małomiejska Basin Case Study

    This paper deals with the impact of different forms of urbanization on the basin outflow. The influence of changes in land cover/use, drainage system development, reservoirs, and alternative ways of stormwater management (green roofs, permeable pavements) on basin runoff was presented in the case of a small urban basin in Gdańsk (Poland. Seven variants of area development (in the period of 2000-2012) – three historical and four...

    Pełny tekst do pobrania w portalu

  • How Machine Learning Contributes to Solve Acoustical Problems

    Publikacja
    • M. A. Roch
    • P. Gerstoft
    • B. Kostek
    • Z. Michalopoulou

    - Journal of the Acoustical Society of America - Rok 2021

    Machine learning is the process of learning functional relationships between measured signals (called percepts in the artificial intelligence literature) and some output of interest. In some cases, we wish to learn very specific relationships from signals such as identifying the language of a speaker (e.g. Zissman, 1996) which has direct applications such as in call center routing or performing a music information retrieval task...

    Pełny tekst do pobrania w portalu

  • Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine

    Publikacja

    In order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...

    Pełny tekst do pobrania w portalu

  • Quality Analysis of Audio-Video Transmission in an OFDM-Based Communication System

    Publikacja

    - Rok 2022

    Application of a reliable audio-video communication system, brings many advantages. With the spoken word we can exchange ideas, provide descriptive information, as well as aid to another person. With the availability of visual information one can monitor the surrounding, working environment, etc. As the amount of available bandwidth continues to shrink, researchers focus on novel types of transmission. Currently, orthogonal frequency...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • User experience evaluation study on the quality of 1K, 2K, and 4K H.265/HEVC video content

    Nowadays, most content creators focus on distributing rich media at the highest possible resolution. Currently, the majority of sold consoles, media players, computer hardware, as well as displays and TVs are advertised as 4K-compatible. The same trend is observed in the case of popular online streaming services and terrestrial TV broadcasts. Generally speaking, it is assumed that higher bitrates provide higher subjective judgements....

    Pełny tekst do pobrania w portalu

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publikacja
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Rok 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Clonal selection in discrete optimization

    Publikacja

    - Rok 2009

    W rozprawie zajmujemy się efektywnymi metodami przybliżonego rozwiązywania problemów optymalizacji dyskretnej, a w szczególności algorytmami opartymi na metodzie selekcji klonalnej (SK), należącymi do kategorii sztucznych systemów immunologicznych. Techniki optymalizacji to znaczące pole badań w informatyce, a niektóre ze starszych technik, takie jak algorytmy genetyczne, symulowane wyżarzanie czy przeszukiwanie tabu, stały się...

  • Compact Quasi-Elliptic-Type Inline Waveguide Bandpass Filters With Nonlinear Frequency-Variant Couplings

    Publikacja

    This work presents the design techniques to synthesize a class of compact inline quasi-elliptic-type waveguide cavity bandpass filters based on novel nonlinear frequency-variant couplings (NFVCs). These highly dispersive frequency-variant couplings (FVCs) are realized by means of a pair of partial-height posts that are placed at the junctions between every two cavity resonators. Each NFVC produces a transmission pole in between...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Enhancing Resilience of FSO Networks to Adverse Weather Conditions

    Publikacja

    - IEEE Access - Rok 2021

    Optical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....

    Pełny tekst do pobrania w portalu

  • Realizacja warstwy serwerów sterowania połączeniami dla ASON/GMPLS

    W materiale przedstawiono wyniki prac badawczych wykonanych w ramach projektu PBZ w podprojekcie Architektury i protokoły sieciowe. Obejmują krótką charakterystykę wytworzonych modeli analitycznych i symulacyjnych przeznaczonych do badania sieci pakietowych z gwarancją jakości klas usług dla technologii IP QoS, MPLS, OBS oraz uzyskane wyniki. Jednakże główny punkt ciężkości został położony na sieci z architekturą ASON/GMPLS dla...

  • Analiza i projektowanie wielościeżkowych protokołów wyboru tras dla niskoorbitowych szerokopasmowych systemów satelitarnych

    Publikacja

    - Rok 2010

    W pracy przedstawiono charakterystykę i budowę niskoorbitowych sieci satelitarnych. Pokazano też szeroki wachlarz możliwych sposobów kierowania ruchem w takich sieciach. Przedstawiono metody optymalizujące przepustowość sieci oraz czasy opóźnień wprowadzanych przez sieć. Dla konkretnych sieci satelitarnych przeprowadzono analizę obciążeń łączy międzysatelitarnych i pokazano, że zastosowanie protokołów routingu wielościeżkowego...

  • FLOOD MANAGEMENT IN URBAN BASINS OF THE CITY OF GDAŃSK

    Publikacja

    Over the last years, the City of Gdańsk suffers twice from flash floods. Both events were caused by intense storms which produced significant surface runoff and caused inundation private and cities properties. The first case of July 2001 flood [3], [9] was the turning point for the city authorities, who decide to look close on the flood management in small urban catchments. The aim of research projects was to establish technical...

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Pełny tekst do pobrania w portalu

  • Józef Woźniak prof. dr hab. inż.

    Prof. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Pełny tekst do pobrania w portalu

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Pełny tekst do pobrania w portalu