417 resultados para protocolli, trasporto, ipv6


Relevância:

10.00% 10.00%

Publicador:

Resumo:

视频监控系统在城市安全,公路交通,银行柜台交易方面都得到了广泛的应用。视频监控系统经历了从模拟系统到本地数字系统,然后到远程网络系统的发展历程,数字化、网络化、智能化正成为视频监控系统中的重要研究内容。 论文作者参与了国家发改委项目“IPv4/IPv6双协议栈、集中式可大规模部署的运营级多模视频监控业务服务系统”的实施,设计并实现了其中的业务管理子系统,论文以此为背景展开。 论文介绍了网络视频监控的特征和它的发展历程,论述了视频监控业务服务系统的结构与原理,提出了多路视频流下的转发和负载均衡策略,提出了基于无线传感器网络的报警调度策略,讨论了业务管理子系统中的控制服务器、转发服务器和存储服务器的软件设计,测试了转发服务器的性能。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The future convergence of voice, video and data applications on the Internet requires that next generation technology provides bandwidth and delay guarantees. Current technology trends are moving towards scalable aggregate-based systems where applications are grouped together and guarantees are provided at the aggregate level only. This solution alone is not enough for interactive video applications with sub-second delay bounds. This paper introduces a novel packet marking scheme that controls the end-to-end delay of an individual flow as it traverses a network enabled to supply aggregate- granularity Quality of Service (QoS). IPv6 Hop-by-Hop extension header fields are used to track the packet delay encountered at each network node and autonomous decisions are made on the best queuing strategy to employ. The results of network simulations are presented and it is shown that when the proposed mechanism is employed the requested delay bound is met with a 20% reduction in resource reservation and no packet loss in the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2014

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L’activité rythmique des muscles masticateurs (ARMM) pendant le sommeil se retrouve chez environ 60% de la population générale adulte. L'étiologie de ce mouvement n'est pas encore complètement élucidée. Il est cependant démontré que l’augmentation de la fréquence des ARMM peut avoir des conséquences négatives sur le système masticatoire. Dans ce cas, l'ARMM est considérée en tant que manifestation d'un trouble moteur du sommeil connue sous le nom de bruxisme. Selon la Classification Internationale des Troubles du Sommeil, le bruxisme est décrit comme le serrement et grincement des dents pendant le sommeil. La survenue des épisodes d’ARMM est associée à une augmentation du tonus du système nerveux sympathique, du rythme cardiaque, de la pression artérielle et elle est souvent en association avec une amplitude respiratoire accrue. Tous ces événements peuvent être décrits dans le contexte d’un micro-éveil du sommeil. Cette thèse comprend quatre articles de recherche visant à étudier i) l'étiologie de l’ARMM pendant le sommeil en relation aux micro-éveils, et à évaluer ii) les aspects cliniques du bruxisme du sommeil, du point de vue diagnostique et thérapeutique. Pour approfondir l'étiologie de l’ARMM et son association avec la fluctuation des micro-éveils, nous avons analysé le patron cyclique alternant (ou cyclic alternating pattern (CAP) en anglais), qui est une méthode d’analyse qui permet d’évaluer l'instabilité du sommeil et de décrire la puissance des micro-éveils. Le CAP a été étudié chez des sujets bruxeurs et des sujets contrôles qui ont participé à deux protocoles expérimentaux, dans lesquels la structure et la stabilité du sommeil ont été modifiées par l'administration d'un médicament (la clonidine), ou avec l'application de stimulations sensorielles (de type vibratoire/auditif) pendant le sommeil. Dans ces deux conditions expérimentales caractérisées par une instabilité accrue du sommeil, nous étions en mesure de démontrer que les micro-éveils ne sont pas la cause ou le déclencheur de l’ARMM, mais ils représentent plutôt la «fenêtre permissive» qui facilite l'apparition de ces mouvements rythmiques au cours du sommeil. Pour évaluer la pertinence clinique du bruxisme, la prévalence et les facteurs de risque, nous avons effectué une étude épidémiologique dans une population pédiatrique (7-17 ans) qui était vue en consultation en orthodontie. Nous avons constaté que le bruxisme est un trouble du sommeil très fréquent chez les enfants (avec une prévalence de 15%), et il est un facteur de risque pour l'usure des dents (risque relatif rapproché, RRR 8,8), la fatigue des muscles masticateurs (RRR 10,5), les maux de tête fréquents (RRR 4,3), la respiration bruyante pendant le sommeil (RRR 3,1), et divers symptômes liés au sommeil, tels que la somnolence diurne (RRR 7,4). Ces résultats nous ont amenés à développer une étude expérimentale pour évaluer l'efficacité d'un appareil d'avancement mandibulaire (AAM) chez un groupe d'adolescents qui présentaient à la fois du bruxisme, du ronflement et des maux de tête fréquents. L'hypothèse est que dans la pathogenèse de ces comorbidités, il y a un mécanisme commun, probablement lié à la respiration pendant le sommeil, et que l'utilisation d'un AAM peut donc agir sur plusieurs aspects liés. À court terme, le traitement avec un AAM semble diminuer l'ARMM (jusqu'à 60% de diminution), et améliorer le ronflement et les maux de tête chez les adolescents. Cependant, le mécanisme d'action exact des AAM demeure incertain; leur efficacité peut être liée à l'amélioration de la respiration pendant le sommeil, mais aussi à l'influence que ces appareils pourraient avoir sur le système masticatoire. Les interactions entre le bruxisme du sommeil, la respiration et les maux de tête, ainsi que l'efficacité et la sécurité à long terme des AAM chez les adolescents, nécessitent des études plus approfondies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Extending IPv6 to IEEE 802.15.4-based Low power Wireless Personal Area Networks requires efficient header compression mechanisms to adapt to their limited bandwidth, memory and energy constraints. This paper presents an experimental evaluation of an improved header compression scheme which provides better compression of IPv6 multicast addresses and UDP port numbers compared to existing mechanisms. This scheme outperforms the existing compression mechanism in terms of data throughput of the network and energy consumption of nodes. It enhances throughput by up to 8% and reduces transmission energy of nodes by about 5%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anycast is a new service in IPv6, and there are some open issues about the anycast service. In this paper, we focus on efficient and reliable aspects of application layer anycast. We apply the requirement based probing routing algorithm to replace the previous period based probing routingalgorithm for anycast resolvers. We employ the twin server model among the anycast servers, therefore, try to present a reliable service in the Internet environment. Our theoretical analysis shows that the proposed architecture works well, and it offers a more efficient routing performance and fault tolerance capability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anycast is defined as a service in IPv6, which provides stateless best effort delivery of an anycast datagram to at least one, and preferably only one host. It is a topic of increasing interest. This paper is an attempt to gather and report on the work done on anycast. There are two main categories at present: network-layer anycast and application-layer anycast. Both involve anycast architectures, routing algorithms, metrics, applications, etc. We also present an efficient algorithm for application-layer anycast, and point out possible research directions based on our research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anycasting communication is proposed in IPv6, and it is designed to support server replication by allowing applications to select and communicate with the “best” server, according to some performance or policy criteria, among the replicated servers. Originally any-cast researchers focus on network layer. In this paper we pay more attention to application-layer anycasting, because at application layer we can obtain more flexibility and scalability. First of all, we describe the application-layer anycast model, and then summarize the previous work in application-layer anycasting, especially the periodical probing algorithms for updating the database of anycast resolver. After that, we present our algorithm, the requirement-based probing algorithm, an efficient and practical algorithm. In the end, we analyse the algorithms using the queuing theory and the statistics characteristics of Internet traffic. The results show that the requirement-base probing algorithm has better performance not only in the average waiting time for all anycast queries, but also in the average time used for an anycast query.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IP source address spoofing exploits a fundamental weakness in the Internet Protocol. It is exploited in many types of network-based attacks such as session hijacking and Denial of Service (DoS). Ingress and egress filtering is aimed at preventing IP spoofing. Techniques such as History based filtering are being used during DoS attacks to filter out attack packets. Packet marking techniques are being used to trace IP packets to a point that is close as possible to their actual source. Present IP spoofing  countermeasures are hindered by compatibility issues between IPv4 and IPv6, implementation issues and their effectiveness under different types of attacks. We propose a topology based packet marking method that builds on the flexibility of packet marking as an IP trace back method while overcoming most of the shortcomings of present packet marking techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Service-oriented wireless sensor networks (WSNs) are being paid more and more attention because service computing can hide complexity of WSNs and enables simple and transparent access to individual sensor nodes. Existing WSNs mainly use IEEE 802.15.4 as their communication specification, however, this protocol suite cannot support IP-based routing and service-oriented access because it only specifies a set of physical- and MAC-layer protocols. For inosculating WSNs with IP networks, IEEE proposed a 6LoWPAN (IPv6 over LoW Power wireless Area Networks) as the adaptation layer between IP and MAC layers. However, it is still a challenging task how to discover and manage sensor resources, guarantee the security of WSNs and route messages over resource-restricted sensor nodes. This paper is set to address such three key issues. Firstly, we propose a service-oriented WSN architectural model based on 6LoWPAN and design a lightweight service middleware SOWAM (service-oriented WSN architecture middleware), where each sensor node provides a collection of services and is managed by our SOWAM. Secondly, we develop a security mechanism for the authentication and secure connection among users and sensor nodes. Finally, we propose an energyaware mesh routing protocol (EAMR) for message transmission in a WSN with multiple mobile sinks, aiming at prolonging the lifetime of WSNs as long as possible. In our EAMR, sensor nodes with the residual energy lower than a threshold do not forward messages for other nodes until the threshold is leveled down. As a result, the energy consumption is evened over sensor nodes significantly. The experimental results demonstrate the feasibility of our service-oriented approach and lightweight middleware SOWAM, as well as the effectiveness of our routing algorithm EAMR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A execução de testes é um passo essencial na adoção de novos protocolos de comunicação e sistemas distribuídos. A forma com que estes se comportam na presença de falhas, tão comuns em ambientes geograficamente distribuídos, deve ser conhecida e considerada. Testes sob condições de falha devem ser realizados e as implementações devem trabalhar dentro de sua especificação nestas condições, garantindo explicitamente o funcionamento dos seus mecanismos de detecção e recuperação de erros. Para a realização de tais testes, uma técnica poderosa é a injeção de falhas. Ferramentas de injeção de falhas permitem ao projetista ou engenheiro de testes medir a eficiência dos mecanismos de um sistema antes que o mesmo seja colocado em operação efetiva. Este trabalho apresenta o projeto, desenvolvimento e teste do injetor de falhas FIRMAMENT. Esta ferramenta executa, dentro do núcleo do sistema operacional, microprogramas, ou faultlets, sobre cada mensagem processada para a emulação de situações de falha de comunicação, utilizando uma abordagem de scripts. A ferramenta é implementada como um módulo de núcleo do sistema operacional Linux, tendo acesso total aos fluxos de entrada e saída de pacotes de forma limpa e não intrusiva, permitindo o teste de sistemas baseados nos protocolos IPv4 e IPv6. Seu desempenho é significativo, já que a ferramenta evita que os mecanismos de injeção de falhas sejam invocados nos fluxos que não sejam de interesse aos testes, bem como dispensa a cópia de dados dos pacotes de comunicação a serem inspecionados e manipulados. A aplicabilidade da ferramenta, dada pela sua facilidade de integração a um ambiente de produção, é conseqüência de sua disponibilidade como um módulo de núcleo, podendo ser carregada como um plugin em um núcleo não modificado. As instruções por FIRMAMENT suportadas lhe dão alto poder de expressão dos cenários de falhas. Estas instruções permitem a inspeção e seleção de mensagens de forma determinística ou estatística. Além disso, fornecem diversas ações a serem realizadas sobre os pacotes de comunicação e sobre as variáveis internas do injetor, fazendo-o imitar o comportamento de falhas reais, como descarte e duplicação de mensagens, atraso na sua entrega e modificação de seu conteúdo. Estas características tornam a ferramenta apropriada para a realização de experimentos sobre protocolos e sistemas distribuídos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La banda ancha como servicio público universal para potenciar el desarrollo de la región. Columna del coordinador temático para acceso e infraestructura. Lanzan Red Regional y Academia Chilena de Telecentros. Columna del coordinador del Grupo de Trabajo eLAC sobre infraestructura. Asegurando el acceso a las TIC para los discapacitados. Pasos alentadores en la migración hacia el Protocolo de Internet IPv6. Campus Party bautiza y capacita con Programa de Inclusión Digital. Impulsando las infraestructuras de Datos Espaciales en América Latina y el Caribe. El rol de la participación público-privada: entrevistas con el sector privado: INTEL y CISCO. Noticias breves de la CEPAL. Últimas publicaciones sobre infraestructura y acceso.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet of Things is a new paradigm where smart embedded devices and systems are connected to the Internet. In this context, Wireless Sensor Networks (WSN) are becoming an important alternative for sensing and actuating critical applications like industrial automation, remote patient monitoring and domotics. The IEEE 802.15.4 protocol has been adopted as a standard for WSN and the 6LoWPAN protocol has been proposed to overcome the challenges of integrating WSN and Internet protocols. In this paper, the mechanisms of header compression and fragmentation of IPv6 datagrams proposed in the 6LoWPAN standard were evaluated through field experiments using a gateway prototype and IEEE 802.15.4 nodes.