901 resultados para Wireless communication systems -- Security measures


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the past few years, a significant amount of work has been devoted to the timing analysis of Ethernet-based technologies. However, none of these address the problem of timeliness evaluation at a holistic level. This paper describes a research framework embracing this objective. It is advocated that, simulation models can be a powerful tool, not only for timeliness evaluation, but also to enable the introduction of less pessimistic assumptions in an analytical response time approach, which, most often, are afflicted with simplifications leading to pessimistic assumptions and, therefore, delusive results. To this end, we address a few inter-linked research topics with the purpose of setting a framework for developing tools suitable to extract temporal properties of commercial-off-the-shelf (COTS) factory-floor communication systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This technical report describes the Repeater-Based Hybrid Wired/Wireless PROFIBUS Network Simulator that implements a simulation model of the repeater-based approach. This approach defines the mechanism to extend the PROFIBUS protocol to supprot wireless communication, in which the interconnection of the wired and wireless segments is done by a intermediate system operating at Physical Layer, as repeater.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia de Redes de Comunicações e Multimédia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we introduce a formation control loop that maximizes the performance of the cooperative perception of a tracked target by a team of mobile robots, while maintaining the team in formation, with a dynamically adjustable geometry which is a function of the quality of the target perception by the team. In the formation control loop, the controller module is a distributed non-linear model predictive controller and the estimator module fuses local estimates of the target state, obtained by a particle filter at each robot. The two modules and their integration are described in detail, including a real-time database associated to a wireless communication protocol that facilitates the exchange of state data while reducing collisions among team members. Simulation and real robot results for indoor and outdoor teams of different robots are presented. The results highlight how our method successfully enables a team of homogeneous robots to minimize the total uncertainty of the tracked target cooperative estimate while complying with performance criteria such as keeping a pre-set distance between the teammates and the target, avoiding collisions with teammates and/or surrounding obstacles.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The global and increasingly technological society requires the States to adopt security measures that can maintain the balance between the freedom, on the one hand, and the security and the respect for fundamental rights of a democratic state, on the other. A State can only achieve this aim if it has an effective judicial system and in particular a criminal procedure adequate to the new criminogenic realities. In this context, the national legislator has adopted, following other international legal systems, special means of obtaining proof more stringent of rights. Within those special means are included the covert actions, that, being a means to use sparingly, is a key element to fight against violent and highly organized crime. Therefore, the undercover agent, voluntary by nature, develops a set of activities that enables the investigation to use other means of taking evidence and/or probationary diligences itself, with the purpose of providing sufficient proof to the case file. In this milieu, given the high risks involved during the investigation, as well as after its completion, the undercover agent can act upon fictitious identity. This measure can be maintained during the evidentiary phase of the trial. Similarly, given the latent threat that the undercover agent suffers by its inclusion in criminal organizations, as well as the need for his inclusion in future covert actions it is crucial that his participation as a witness in the trial is properly shielded. Thus, when the undercover agent provides, exceptionally, statements in the trial, he shall do so always through videoconference with voice and image distortion. This measure can guarantee the anonymity of the undercover agent and concomitantly, that the adversarial principle and the right of the accused to a fair trial is not prejudiced since, in those circumstances, the diligence will be supervised in its entirety (in the audience and with the undercover agent) by a judge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless Sensor Networks(WSN) are networks of devices used to sense and act that applies wireless radios to communicate. To achieve a successful implementation of a wireless device it is necessary to take in consideration the existence of a wide variety of radios available, a large number of communication parameters (payload, duty cycle, etc.) and environmental conditions that may affect the device’s behaviour. However, to evaluate a specific radio towards a unique application it might be necessary to conduct trial experiments, with such a vast amount of devices, communication parameters and environmental conditions to take into consideration the number of trial cases generated can be surprisingly high. Thus, making trial experiments to achieve manual validation of wireless communication technologies becomes unsuitable due to the existence of a high number of trial cases on the field. To overcome this technological issue an automated test methodology was introduced, presenting the possibility to acquire data regarding the device’s behaviour when testing several technologies and parameters that care for a specific analysis. Therefore, this method advances the validation and analysis process of the wireless radios and allows the validation to be done without the need of specific and in depth knowledge about wireless devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

QoS, MANET, Ad-hoc networks, Simulation, wireless communication

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'evolució que la tecnologia de les comunicacions sense fils ha experimentat en els darrers anys permet que avui en dia els dispositius mòbils proporcionin una resposta més que acceptable. Ja s'han superat molts dels problemes de mobilitat, d'infraestructura i d'ample de banda que fins ara dificultaven l'ús d'aquests dispositius. Aquest fet ha fomentat l'expansió de diferents sistemes dels que es pot destacar Android, iPhone OS i Windows Mobile/Windows Phone 7. Els dos primers són els que actualment es disputen el lideratge del mercat dels dispositius i aplicacions mòbils i és Android el que ha experimentat el major creixement els darrers anys. Paral·lelament, la constant introducció de programari d'e-learning destinat a activitats de formació no presencial basades en Internet ha permès arribar a milions d'usuaris en diferents àmbits, com ara universitats, empreses i institucions d'arreu del món. D'aquest conjunt de programari destaca Moodle, suite de codi obert que permet crear llocs web de formació en línia de forma senzilla i eficaç.Aquest Projecte de Final de Carrera, emmarcat en l'àrea de Xarxes de Computadors, conjugaaquests tres conceptes mitjançant el desenvolupament d'una aplicació per a dispositius mòbils Android que connecta a un servidor Moodle. La comunicació entre ells utilitza intensivament les xarxes sense fils i fa crides als serveis que aquest ofereix gràcies als Web Services, mètode de comunicacions composat d'un conjunt de protocols i de programari que permet la comunicació entre dos dispositius a través de la xarxa.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El present treball està basat en el desenvolupament d¿un sistema que permeti fer una demostració pràctica i útil amb els materials que l¿àrea de sistemes encastats posa a la nostra disposició. De forma resumida es tracta de motes/nodes amb possibilitat de comunicació inhalàmbrica entre ells i un sistema operatiu TinyOS programable amb el llenguatge nesC.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes a multicast implementation based on adaptive routing with anticipated calculation. Three different cost measures for a point-to-multipoint connection: bandwidth cost, connection establishment cost and switching cost can be considered. The application of the method based on pre-evaluated routing tables makes possible the reduction of bandwidth cost and connection establishment cost individually

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article originates from a panel with the above title, held at IEEE VTC Spring 2009, in which the authors took part. The enthusiastic response it received prompted us to discuss for a wider audience whether research at the physical layer (PHY) is still relevant to the field of wireless communications. Using cellular systems as the axis of our exposition, we exemplify areas where PHY research has indeed hit a performance wall and where any improvements are expected to be marginal. We then discuss whether the research directions taken in the past have always been the right choice and how lessons learned could influence future policy decisions. Several of the raised issues are subsequently discussed in greater details, e.g., the growing divergence between academia and industry. With this argumentation at hand, we identify areas that are either under-developed or likely to be of impact in coming years - hence corroborating the relevance and importance of PHY research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims at illustrating some applications of Finite Random Set (FRS) theory to the design and analysis of wireless communication receivers, and at pointing out similarities and differences between this scenario and that pertaining to multi-target tracking, where the use of FRS has been traditionally advocated. Two case studies are considered, l.e., multiuser detection in a dynamic environment, and multicarrier (OFDM) transmission on a frequency-selective channel. Detector designand performance evaluation are discussed, along with the advantages of importing FRS-based estimation techniques to the context of wireless communications.