Wyniki wyszukiwania dla: COMMUNICATION NETWORK - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: COMMUNICATION NETWORK

Wyniki wyszukiwania dla: COMMUNICATION NETWORK

  • Low-Power WSN System for Honey Bee Monitoring

    Publikacja

    - Rok 2019

    The paper presents a universal low-power system for biosensory data acquisition in scope of bees monitoring. We describe the architecture of the system, energy-saving components as well as we discuss the selection of used sensors. The work focuses on energy optimization in a scope of wireless communication. A custom protocol was implemented, which is the basis for presented energy-efficient devices. Data exchange process during...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quality Modeling in Grid and Volunteer-Computing Systems

    Publikacja

    - Rok 2013

    A model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...

  • A Highly Scalable, Modular Architecture for Computer Aided Assessment e-Learning Systems

    Publikacja

    In this chapter, the authors propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. The authors' research proved that such architecture, while well suited for didactic content distribution systems is ill-suited for knowledge...

  • Loosely-Tied Distributed Architecture for Highly Scalable E-Learning System

    Publikacja

    Vast majority of modern e-learning products are based on client-server architecture and utilization of web-based technologies (WBT). Such approach permits easy creation of e-learning systems that do not require a complex, operating system dependant client software. Unfortunately there are also drawbacks of such solution. Because of the majority of mechanisms are located on the server, its usage levels trend to build up quickly...

  • RNDM 2016 Workshop and 2nd Meeting of COST CA15127-RECODIS: Highlights from the Resilience Week in Halmstad, Sweden

    Publikacja
    • M. Jonsson
    • J. Rak
    • D. Papadimitriou
    • A. Somani

    - IEEE COMMUNICATIONS MAGAZINE - Rok 2017

    Leading network resilience researchers took part in the Resilience Week on Sept. 12-15, 2016 at Halmstad University, SE by Prof. Magnus Jonsson from the Centre for Research on Embedded Systems (CERES), Halmstad University, SE, and Prof. Jacek Rak from Gdansk University of Technology, PL. It included two major events: - The 2nd Meeting of COST CA15127–RECODIS Action (Resilient Communication Services Protecting End-user Applications...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Selection of an artificial pre-training neural network for the classification of inland vessels based on their images

    Publikacja

    - Zeszyty Naukowe Akademii Morskiej w Szczecinie - Rok 2021

    Artificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...

    Pełny tekst do pobrania w portalu

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publikacja
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Rok 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks

    Publikacja

    - Rok 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Stanowisko wizualizacji zdarzeń w systemie STRADAR – realizacja i funkcje dla operatora

    It is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The system, with the use of a network of sensors located in both stationary and mobile...

    Pełny tekst do pobrania w portalu

  • Resilience of 5G Mobile Communication Systems to Massive Disruptions

    Publikacja

    - Rok 2020

    This chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the remaining part of the network and (c) multi-operator protection to address the resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluation of time-efficiency of disjoint paths calculation schemes

    Publikacja

    - Rok 2015

    The concept of alternate paths has been shown in the literature to provide fast response of a network to failures of its elements (nodes/links) affecting flows along the primary communication paths. Various approaches have been proposed to reduce the time necessary to redirect the respective flows onto the alternate paths. In this paper, we focus on another important objective, that so far has not received much attention, i.e.,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mechanizmy bezpieczeństwa w strefie C systemu netBaltic

    W artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Path Loss Analysis for the IoT Applications in the Urban and Indoor Environments

    The Internet of Things (IoT) networks concept implies their presence in a various and untypical locations, usually with a disturbed radio signals propagation. In the presented paper an investigation of an additional path loss observed in an underground environment was described. The proposed measurement locations correspond to the operation areas of rapidly growing narrowband IoT (NBIoT) networks, the ones using the Long Term Evolution...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wideband Channel Measurements for Polarised Indoor Off-Body Communications

    Publikacja

    - Rok 2018

    This paper presents the initial results of wideband channel measurements for polarised off-body communication at 5.8 GHz, in an indoor environment. Channel Impulse Response measurements were performed simultaneously for two orthogonal polarisations of the wearable antenna, and repeated for vertical and horizontal orientations of the off-body one. Four types of measurement scenarios were considered in order to investigate the influence...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analiza symulacyjna wybranych algorytmów dostarczania paczek wiadomości w sieci DTN na Bałtyku

    Jedną z dróg zwiększania bezpieczeństwa żeglugi morskiej jest zapewnienie powszechnej dostępności usług e-nawigacji na obszarach morskich pozbawionych dostępu do Internetu. W artykule opisano wyniki symulacji wybranych algorytmów przekazywania wiadomości usług niewrażliwych na opóźnienia w znacznej odległości od lądu, w sieci o nieciągłej i sporadycznej łączności.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Jerzy Proficz dr hab. inż.

    Jerzy Proficz – dyrektor Centrum Informatycznego Trójmiejskiej Akademickiej Sieci Komputerowej (CI TASK) na Politechnice Gdańskiej. Uzyskał stopień naukowy doktora habilitowanego (2022) w dyscyplinie: Informatyka techniczna i telekomunikacja. Autor i współautor ponad 50 artykułów w czasopismach i na konferencjach naukowych związanych głównie z równoległym przetwarzaniem danych na komputerach dużej mocy (HPC, chmura obliczeniowa). Udział...

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Technological substitution in Asia

    Publikacja

    - Rok 2018

    This book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Routing Method for Interplanetary Satellite Communication in IoT Networks Based on IPv6

    Publikacja

    - Rok 2023

    The matter of interplanetary network (IPN) connection is a complex and sophisticated topic. Space missions are aimed inter alia at studying the outer planets of our solar system. Data transmission itself, as well as receiving data from satellites located on the borders of the solar system, was only possible thanks to the use of powerful deep space network (DSN) receivers, located in various places on the surface of the Earth. In...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Advanced surveillance and operational communication system employing mobile terminals

    Publikacja

    Distributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...

  • DATABASE AND BIGDATA PROCESSING SYSTEM FOR ANALYSIS OF AIS MESSAGES IN THE NETBALTIC RESEARCH PROJECT

    Publikacja

    - TASK Quarterly - Rok 2017

    A specialized database and a software tool for graphical and numerical presentation of maritime measurement results has been designed and implemented as part of the research conducted under the netBaltic project (Internet over the Baltic Sea – the implementation of a multi-system, self-organizing broadband communications network over the sea for enhancing navigation safety through the development of e-navigation services.) The...

    Pełny tekst do pobrania w portalu

  • User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning

    Publikacja

    - SENSORS - Rok 2024

    In this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...

    Pełny tekst do pobrania w portalu

  • A heterogenous wireless system for maritime communication - the netBaltic system architecture

    Publikacja

    - Rok 2017

    In the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Web-based real-time simulation system

    Publikacja

    - Rok 2018

    The paper presents the development of a simulation system composed of a real-time plant simulator with real-time controller included in the software-in-the-loop structure using web-based communication. The client-server architecture build in a TCP/IP network environment was introduced, where the server is a computing unit for real-time high temporal resolution plant simulation (and optionally also as controllers' platform) and...

    Pełny tekst do pobrania w portalu

  • Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010

    Dane Badawcze
    open access

    A university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...

  • Design and Evaluation of the Compact and Autonomous Energy Subsystem of a Wave Energy Converter

    Publikacja

    This paper presents the results of the design process focused on the development of the energy subsystem (ES) of a wave energy converter (WEC). The ES is an important electrical part that significantly affects the energy reliability and energy efficiency of the entire WEC device. The designed ES was intended for compact WECs powering IoT network devices working in the distributed grid. The developed ES is an electronic circuit...

    Pełny tekst do pobrania w portalu

  • A system of visualization of operational situation on digital maps for mobile units of the Border Guards

    Publikacja

    Border guards have to be equipped with technology enabling a communication, an acquisition, an exchange, and a visualization of data in different operational situations. This also applies to the staff, which is located on mobile units such as ground vehicles, aircrafts and vessels. Within the project realized for the Polish Border Guard and financed by The National Centre for Research and Development, a system was designed and...

  • Study on CPU and RAM Resource Consumption of Mobile Devices using Streaming Services

    Publikacja

    Streaming multimedia services have become very popular in recent years, due to the development of wireless networks. With the growing number of mobile devices worldwide, service providers offer dedicated applications that allow to deliver on-demand audio and video content anytime and everywhere. The aim of this study was to compare different streaming services and investigate their impact on the CPU and RAM resources, with respect...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mobile Cloud computing architecture for massively parallelizablegeometric computation

    Publikacja
    • V. Sánchez Ribes
    • H. Mora-Mora
    • A. Sobecki
    • F. José Mora Gimeno

    - COMPUTERS IN INDUSTRY - Rok 2020

    Cloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...

    Pełny tekst do pobrania w portalu

  • Scanning networks with cactus topology

    Publikacja
    • Ł. Wrona

    - Rok 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • Subjective and Objective Quality Evaluation Study of BPL -PLC Wired Medium

    Publikacja

    - Elektronika Ir Elektrotechnika - Rok 2020

    This paper presents results of research on the effectiveness of bi-directional voice transmission in a 6 kV mine cable network using BPL-PLC (Broadband over Power Line - Power Line Communication) technology. It concerns both emergency cable state (supply outage with cable shorted at both ends) and loaded with distorted current waveforms. The narrowband (0.5 MHz–15 MHz) and broadband (two different modes, frequency range of 3 MHz–7.5...

    Pełny tekst do pobrania w portalu

  • An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments

    Publikacja

    - SENSORS - Rok 2017

    The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...

    Pełny tekst do pobrania w portalu

  • Complementarity between entanglement-assisted and quantum distributed random access code

    Publikacja

    - PHYSICAL REVIEW A - Rok 2017

    Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific...

    Pełny tekst do pobrania w portalu

  • Sieć sensorowa do rejestracji drgań górnej sieci trakcyjnej w celach diagnostyki eksploatacyjnej

    Wraz ze wzrostem prędkości kolejowych pojazdów elektrycznych zwiększają się wymagania utrzymania sieci trakcyjnej w odpowiednim stanie technicznym. Ciągły monitoring i diagnostyka pozwalają wykrywać pogarszającą się jakość odbioru prądu z sieci jezdnej. Jedną z metod jest umieszczenie czujników przyspieszenia na przewodzie jezdnym. Analiza przebiegu przyspieszenia pozwala określić jakość współpracy sieci jezdnej z pantografem....

    Pełny tekst do pobrania w portalu

  • Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks

    Publikacja

    - IEEE Access - Rok 2022

    Object detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...

    Pełny tekst do pobrania w portalu

  • Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter

    This paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...

    Pełny tekst do pobrania w portalu

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Impact of Information and Communication Technology on the Rise of Urban Social Movements in Poland

    Publikacja

    - Rok 2015

    The chapter examines the relationship between the use of Information and Communications Technology (ITC) and the emergence of social movements focused on urban agenda in Poland. The aim is to investigate how and to what extent a growing body of smaller activist groups use opportunities provided by the ITC to achieve their political objectives. The research results indicate that Web-based media have helped to raise the profile...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The reliability of tree and star networks.

    Publikacja

    - Rok 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks

    Publikacja

    - ENTROPY - Rok 2023

    The rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs....

    Pełny tekst do pobrania w portalu

  • An integrated e-learning services management system providing HD videoconferencing and CAA services

    Publikacja

    - Rok 2012

    In this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Badanie i analiza efektywności alokacji strumieni danych w heterogenicznej sieci WBAN

    Publikacja

    - Rok 2017

    W niniejszej dysertacji doktorskiej poddano dyskusji efektywność alokacji strumieni danych w heterogenicznej radiowej sieci WBAN (Wireless Body Area Networks). Biorąc pod uwagę dynamiczny rozwój nowoczesnych sieci radiokomunikacyjnych piątej generacji (5G), którego część stanowią radiowe sieci działające w obrębie ciała człowieka, bardzo ważnym aspektem są metody maksymalizujące wykorzystanie dostępnych zasobów czasowo –częstotliwościowych...

    Pełny tekst do pobrania w portalu

  • The reliability of any-hop star networks with respect to failures of communication nodes.

    Publikacja

    - Rok 2009

    This paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...

  • Testy platformy SAN dla sektora elektroenergetycznego

    Współczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...

    Pełny tekst do pobrania w portalu

  • Communication: Inside the water wheel: Intrinsic differences between hydrated tetraphenylphosphonium and tetraphenylborate ions

    Tetraphenylphosphonium tetraphenylborate (TPTB) is a common reference electrolyte in physical chemistry of solutions allowing for a convenient partitioning of thermodynamic properties into single-ion contributions. Here, we compute on the basis of ab initio molecular dynamics simulations the infrared (IR) spectra for hydrated constituent ions of the TPTB assumption. Using spectral decomposition techniques, we extract important...

    Pełny tekst do pobrania w portalu

  • Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection

    Publikacja

    During interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...

  • Cooperative control in production and logistics

    Publikacja
    • L. Monostori
    • P. Valckenaers
    • A. Dolgui
    • H. Panetto
    • M. Brdyś
    • B. Csáji

    - ANNUAL REVIEWS IN CONTROL - Rok 2015

    Classical applications of control engineering and information and communication technology (ICT) in production and logistics are often done in a rigid, centralized and hierarchical way. These inflexible approaches are typically not able to cope with the complexities of the manufacturing environment, such as the instabilities, uncertainties and abrupt changes caused by internal and external disturbances, or a large number and variety...

    Pełny tekst do pobrania w serwisie zewnętrznym