Katedra Teleinformatyki - Jednostki Administracyjne - MOST Wiedzy

Wyszukiwarka

Katedra Teleinformatyki

Filtry

wszystkich: 534

  • Kategoria
  • Rok
  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Katalog Publikacji

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
    Publikacja

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Pełny tekst do pobrania w portalu

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
    Publikacja

    - Rok 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • Methods for physical impairment constrained routing with selected protection in all-optical networks
    Publikacja
    • P. Soproni
    • T. Cinkler
    • J. Rak

    - TELECOMMUNICATION SYSTEMS - Rok 2014

    In this paper, we investigate the problem of survivable all-optical routing in WDM networks with physical impairments. One of the recent key issues in survivable optical network design refers to maximization of the ratio of routeable demands while keeping the overall network cost low. In WDM networks, this goal can be achieved by routing as many demands in all-optical way as possible. Based on the latest technical trends driven...

    Pełny tekst do pobrania w portalu

  • A Reputation System for MANETs and WSNs Using Traffic Shedding
    Publikacja

    - Rok 2010

    Wymuszanie kooperacji węzłów w ruchomych i sensorowych sieciach pakietowych zwykle wykorzystuje odrębne mechanizmy detekcyjne i penalizacyjne wykluczające węzły egoistyczne z protokołów routingu i ograniczający ich dostęp do sieci. Powoduje to, że ruch tranzytowy musi być przenoszony przez węzły kooperatywne. W pracy zaproponowano system reputacyjny powiązany z wymuszaniem kooperacji poprzez przerzucanie ruchu na węzły egoistyczne....

  • Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
    Publikacja

    Abstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Coupling of Blood Pressure and Subarachnoid Space Oscillations at Cardiac Frequency Evoked by Handgrip and Cold Tests: A Bispectral Analysis
    Publikacja
    • M. Gruszecki
    • Y. Tkachenko
    • J. Kot
    • M. Radkowski
    • A. Gruszecka
    • K. Basiński
    • M. Waskow
    • W. Gumiński
    • J. Anand
    • J. Wtorek... i 3 innych

    - Advances in Experimental Medicine and Biology - Rok 2019

    The aim of the study was to assess blood pressure–subarachnoid space (BP–SAS) width coupling properties using time–frequency bispectral analysis based on wavelet transforms during handgrip and cold tests. The experiments were performed on a group of 16 healthy subjects (F/M; 7/9) of the mean age 27.2 ± 6.8 years and body mass index of 23.8 ± 4.1 kg/m². The sequence of challenges was first handgrip and then cold test. The handgrip...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
    Publikacja

    A rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...

  • Multihomed Wireless Terminals: MAC Configuration and Network Selection Games
    Publikacja

    - Rok 2011

    W artykule rozpatruje się rozdział pasma pomiędzy zbiór racjonalnych terminali bezprzewodowych dołączonych do wielu sieci lokalnych. Przy pomocy narzędzi analitycznych teorii gier pokazuje się, w jaki sposób można zniechęcać terminale do agresywnej konfiguracji protokołu MAC. Analizowana jest ilościowo rola prędkości generacji informacji zwrotnej z sieci w stosunku do częstości generacji żądań dostępu terminala do sieci. Wykazano,...

  • A Centralized Reputation System for MANETs Based on Observed Path Performance
    Publikacja

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
    Publikacja

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Pełny tekst do pobrania w portalu

  • NetBaltic System-Heterogenous Wireless Network for Maritime Communications

    In case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...

    Pełny tekst do pobrania w portalu

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • Capacity efficient shared protection and fast restoration scheme in self-configured optical networks
    Publikacja

    - Rok 2006

    W artykule zaproponowano nową koncepcję optymalizacji rozdziału zasobów dla przeżywalnych sieci rozległych, która gwarantuje szybkie odtwarzanie usług po wystąpieniu awarii. Wykazano, iż proponowany algorytm, wykorzystujący ideę wierzchołkowego kolorowania grafów, nie powoduje wydłużania ścieżek zabezpieczających - zjawiska charakterystycznego dla powszechnie stosowanych algorytmów optymalizacji. Udowodniono, iż powyższa cecha...

  • A novel class-based protection algorithm providing fast service recovery in IP/WDM networks
    Publikacja

    - Rok 2008

    W artykule rozważa się warstwową strukturę sieci IP-MPLS/WDM. Węzły sieci mają funkcjonalność zarówno optycznych krotnic transferowych (OXC), jak i routerów IP. Dowolne dwa routery IP mogą być ze sobą połączone poprzez logiczne łącze IP realizowane przez ścieżkę optyczną WDM. Zaproponowano metodę klasową doboru tras przeżywalnych zapewniającą szybkie odtwarzanie uszkodzonych strumieni ruchu zarówno w warstwie WDM jak i IP-MPLS....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Non-Satellite Broadband Maritime Communications for e-Navigation Services

    The development of broadband network access technologies available to users on land has triggered a rapid expansion of a diverse range of services provided by terrestrial networks. However, due to limitations of digital communication technologies in the off-shore area, the maritime ICT systems evolution so far has not followed that trend. Despite the e-navigation initiative defining the set of Maritime Services, the progress in...

    Pełny tekst do pobrania w portalu

  • Traffic Remapping Attacks in Ad Hoc Networks
    Publikacja

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Pełny tekst do pobrania w portalu

  • Coupling between Blood Pressure and Subarachnoid Space Width Oscillations during Slow Breathing
    Publikacja

    - ENTROPY - Rok 2021

    The precise mechanisms connecting the cardiovascular system and the cerebrospinal fluid (CSF) are not well understood in detail. This paper investigates the couplings between the cardiac and respiratory components, as extracted from blood pressure (BP) signals and oscillations of the subarachnoid space width (SAS), collected during slow ventilation and ventilation against inspiration resistance. The experiment was performed on...

    Pełny tekst do pobrania w portalu

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
    Publikacja

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Pełny tekst do pobrania w portalu

  • Routing decisions independent of queuing delays in broadband leo networks
    Publikacja

    - Rok 2009

    This paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Reliable routing and resource allocation scheme for hybrid RF/FSO networks
    Publikacja

    - Rok 2014

    Significant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Lossless Compression of Binary Trees with Correlated Vertex Names
    Publikacja

    - Rok 2016

    Compression schemes for advanced data structures have become the challenge of today. Information theory has traditionally dealt with conventional data such as text, image, or video. In contrast, most data available today is multitype and context-dependent. To meet this challenge, we have recently initiated a systematic study of advanced data structures such as unlabeled graphs [1]. In this paper, we continue this program by considering...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Enhancing Resilience of FSO Networks to Adverse Weather Conditions
    Publikacja

    - IEEE Access - Rok 2021

    Optical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....

    Pełny tekst do pobrania w portalu

  • Comparison of near infrared spectroscopy (NIRS) and near-infrared transillumination-backscattering sounding (NIR-T/BSS) methods
    Publikacja

    - Scientific Reports - Rok 2020

    The aim of the study was to compare simultaneously recorded a NIR-T/BSS and NIRS signals from healthy volunteers. NIR-T/BSS is a device which give an ability to non-invasively detect and monitor changes in the subarachnoid space width (SAS). Experiments were performed on a group of 30 healthy volunteers (28 males and 2 females, age 30.8 ± 13.4 years, BMI = 24.5 ± 2.3 kg/m2). We analysed recorded signals using analysis methods based...

    Pełny tekst do pobrania w portalu

  • A new approach to provide the differentiated levels of network survivability under a double node failure
    Publikacja

    - Rok 2009

    W artykule zaproponowano klasową metodę ochrony strumieni ruchu w sieciach WDM zapewniającą szybkie odtwarzanie połączeń w sytuacji jednoczesnej awarii jej dwóch elementów. Szczególny nacisk położono na zagadnienie zapewnienia zróżnicowanych poziomów przeżywalności w celu ich lepszego dopasowania do zróżnicowanych wymagań użytkowników. Pokazano, że w celu zapenienia ochrony przed awarią dwóch elementów, wymagania dotyczące przepustowości...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Joint optimization of anycast and unicast flows in survivable optical networks
    Publikacja

    - Rok 2010

    Znane z literatury dotychczasowe prace związane z ochroną ruchu przed awarią elementów sieci dotyczą transmisji typu unicast (jeden-do-jednego). Niniejszy artykuł jest pierwszym prezentującym rozwiązanie jednoczesnej ochrony transmisji anycast (jeden-do-jednego-z-wielu) oraz transmisji unicast. Proponowane podejście wykorzystuje model ochrony ścieżki (ang. path protection). Zagadnienie zostało sformułowane w postaci odpowiedniego...

  • Service-based Resilience for Embedded IoT Networks
    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Planning a Cost-Effective Delay-Constrained Passive Optical Network for 5G Fronthaul
    Publikacja

    - Rok 2022

    With the rapid growth in the telecommunications industry moving towards 5G and beyond (5GB) and the emergence of data-hungry and time-sensitive applications, Mobile Network Operators (MNOs) are faced with a considerable challenge to keep up with these new demands. Cloud radio access network (CRAN) has emerged as a cost-effective architecture that improves 5GB performance. The fronthaul segment of the CRAN necessitates a high-capacity...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Pial artery and subarachnoid width response to apnoea in normal humans
    Publikacja
    • M. Wszędybył-Winklewska
    • J. Wolf
    • E. Świerblewska
    • K. Kunicka
    • M. Gruszecki
    • W. Gumiński
    • P. J. Winklewski
    • A. F. Frydrychowski
    • L. Bieniaszewski
    • K. Narkiewicz
    • K. Narkiewicz

    - JOURNAL OF HYPERTENSION - Rok 2015

    Background: Little is known about intracranial pressure (ICP)-cerebral haemodynamic interplay during repetitive apnoea. A recently developed method based on near-infrared transillumination/backscattering sounding (NIR-T/BSS) noninvasively measures changes in pial artery pulsation (cc-TQ) as well as subarachnoid width (sas-TQ) in humans. Method: We tested the complex response of the pial artery and subarachnoid width to apnoea...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • QoS/QoE in the Heterogeneous Internet of Things (IoT)
    Publikacja

    - Rok 2017

    Applications provided in the Internet of Things can generally be divided into three categories: audio, video and data. This has given rise to the popular term Triple Play Services. The most important audio applications are VoIP and audio streaming. The most notable video applications are VToIP, IPTV, and video streaming, and the service WWW is the most prominent example of data-type services. This chapter elaborates on the most...

  • A Survey of Vehicular Network Systems for Road Traffic Management
    Publikacja

    In this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...

    Pełny tekst do pobrania w portalu

  • Acute hypoxia diminishes the relationship between blood pressure and subarachnoid space width oscillations at the human cardiac frequency
    Publikacja
    • M. Wszędybył-Winklewska
    • J. Wolf
    • E. Świerblewska
    • K. Kunicka
    • A. Gruszecka
    • M. Gruszecki
    • W. Kucharska
    • P. J. Winklewski
    • J. Zabulewicz
    • W. Gumiński... i 5 innych

    - PLOS ONE - Rok 2017

    Acute hypoxia exerts strong effects on the cardiovascular system. Heart-generated pulsatile cerebrospinal fluid motion is recognised as a key factor ensuring brain homeostasis. We aimed to assess changes in heart-generated coupling between blood pressure and subarachnoid space width oscillations during hypoxic exposure.

    Pełny tekst do pobrania w portalu

  • On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks

    Handover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Sympathetic Activation Does Not Affect the Cardiac and Respiratory Contribution to the Relationship between Blood Pressure and Pial Artery Pulsation Oscillations in Healthy Subjects
    Publikacja

    - PLOS ONE - Rok 2015

    Using a novel method called near-infrared transillumination backscattering sounding (NIR-T/BSS) that allows for the non-invasive measurement of pial artery pulsation (cc-TQ) and subarachnoid width (sas-TQ) in humans, we assessed the influence of sympathetic activation on the cardiac and respiratory contribution to blood pressure (BP) cc-TQ oscillations in healthy subjects. The pial artery and subarachnoid width response to handgrip...

    Pełny tekst do pobrania w portalu

  • Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles

    As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication...

    Pełny tekst do pobrania w portalu

  • Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
    Publikacja
    • D. Santos
    • A. de Sousa
    • C. Mas-Machuca
    • J. Rak

    - IEEE Access - Rok 2021

    In Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...

    Pełny tekst do pobrania w portalu

  • Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs
    Publikacja

    - Rok 2009

    Przedstawiono ramy wymiany informacji reputacyjnej pomiędzy terminalami sieci mobilnej ad hoc lub sensorowej, prowadzące do efektywnej lokalizacji terminali egoistycznych i jednocześnie zapobiegające skutkom fałszywych rekomendacji. Integrację miar zaufania i rekomendacji reputacyjnych oparto na teorii Dempstera-Shafera.

  • SDN testbed for validation of cross-layer data-centric security policies
    Publikacja

    - Rok 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Effects of acute hypercapnia on the amplitude of cerebrovascular pulsation in humans registered with a non-invasive method
    Publikacja
    • A. F. Frydrychowski
    • M. Wszędybył-Winklewska
    • W. Gumiński
    • P. Lass
    • T. Bandurski
    • P. J. Winklewski

    - MICROVASCULAR RESEARCH - Rok 2012

    Celem pracy jest przedstawienie wpływu silnego zwiększenia ciśnienia dwutlenku węgla we krwi na amplitudę tętnienia naczyń mózgowych zarejestrowanego metodą bezinwazyjną.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A station strategy to deter backoff attacks in IEEE 802.11 LANs

    Dla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services
    Publikacja

    n its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mobility management solutions for current IP and future networks
    Publikacja

    Enormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...

    Pełny tekst do pobrania w portalu

  • Measures of region failure survivability for wireless mesh networks
    Publikacja

    - WIRELESS NETWORKS - Rok 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Pełny tekst do pobrania w portalu

  • How to provide fair service for V2I communications in VANETs?
    Publikacja

    In this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • eFRADIR: An Enhanced FRAmework for DIsaster Resilience
    Publikacja
    • A. Pasic
    • R. Girao-Silva
    • F. Mogyorosi
    • B. Vass
    • T. Gomes
    • P. Babarczi
    • P. Revisnyei
    • J. Tapolcai
    • J. Rak

    - IEEE Access - Rok 2021

    This paper focuses on how to increase the availability of a backbone network with minimal cost. In particular, the new framework focuses on resilience against natural disasters and is an evolution of the FRADIR/FRADIR-II framework. It targets three different directions, namely: network planning, failure modeling, and survivable routing. The steady state network planning is tackled by upgrading a sub-network (a set of links termed...

    Pełny tekst do pobrania w portalu

  • Taxonomy of Schemes for Resilient Routing
    Publikacja

    - Rok 2020

    This chapter provides a taxonomy of schemes for resilient routing followed by a discussion of their application to contemporary architectures of communication networks. In particular, a general classification of schemes for resilient routing is first presented followed by a description of the reference schemes for IP networks. The chapter in its later part focuses on the representative techniques of resilient routing for a multi-domain...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions
    Publikacja
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Rok 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Pełny tekst do pobrania w serwisie zewnętrznym