918 resultados para mobile mesh network
Resumo:
A segment selection method controlled by Quality of Experience (QoE) factors for Dynamic Adaptive Streaming over HTTP (DASH) is presented in this paper. Current rate adaption algorithms aim to eliminate buffer underrun events by significantly reducing the code rate when experiencing pauses in replay. In reality, however, viewers may choose to accept a level of buffer underrun in order to achieve an improved level of picture fidelity or to accept the degradation in picture fidelity in order to maintain the service continuity. The proposed rate adaption scheme in our work can maximize the user QoE in terms of both continuity and fidelity (picture quality) in DASH applications. It is shown that using this scheme a high level of quality for streaming services, especially at low packet loss rates, can be achieved. Our scheme can also maintain a best trade-off between continuity-based quality and fidelity-based quality, by determining proper threshold values for the level of quality intended by clients with different quality requirements. In addition, the integration of the rate adaptation mechanism with the scheduling process is investigated in the context of a mobile communication network and related performances are analyzed.
Resumo:
Introdução – Os serviços de comunicação móvel para tablets, smartphones, e-book readers desenvolveram-se de forma extremamente rápida nos últimos anos assumindo-se como uma rede de aprendizagem privilegiada para os estudantes. Em 2012, 55% dos estudantes do ensino superior possuíam um smarthphone, 62% dispunham de um ipod e 21% tinham de um tablet. 67% usavam-nos em contexto académico. Objetivo – Apresentar de forma sucinta a resposta das bibliotecas de ensino superior ao crescimento da utilização dos dispositivos móveis e como é que os parceiros das bibliotecas, em especial os editores, estão a potenciar essa utilização. Métodos – A partir de uma seleção e análise de bibliografia sobre a temática realizou-se uma pesquisa na internet, nos sites de bibliotecas de ensino superior e nas páginas dos editores que permitisse aferir evidências. Resultados – Identificaram-se cinco serviços e 23 recursos. Discussão – Um primeiro serviço prende-se com a adaptação dos conteúdos dos websites das bibliotecas de forma a serem lidos por qualquer tipo de dispositivos. Outro serviço identificado foi a disponibilização do catálogo da biblioteca online tornando-o acessível aos dispositivos móveis, permitindo a pesquisa e a localização de informação, a reserva ou a renovação de documentos. Identificou-se o desenvolvimento de algumas coleções especificamente para os dispositivos móveis. Constatou-se a utilização de códigos QR para divulgar normas de funcionamento da biblioteca, recursos, o mapa, o contacto do serviço de referência e para geolocalização. Por fim verificou-se a utilização de SMS para informar os utilizadores sobre reservas, prazos de empréstimo, entre outras informações. O recurso mais comum na maioria dos sites analisados foi a disponibilização de uma versão do website para dispositivos móveis de que são exemplos a Cambridge Journals Online mobile, o EBSCOhost mobile, o SpringerLink, a OVIDToday, o UpToDate, a PubChase e a BrowZine. Com o objetivo de tornar os seus produtos acessíveis on-the go, oferecem inúmeras possibilidades, nomeadamente de pesquisa, de acesso a textos integrais, de elaboração de listas de interesse personalizadas, de leitura offline, entre outras que podemos encontrar na aplicação da EBSCOhost mobile, na JAMA Network, na OVIDToday, no portal de Periódicos CAPES ou na plataforma Ebrary da ProQuest. Em ferramentas como a UpToDate ou os aplicativos da Elsevier e da Micromedex é disponibilizada informação baseada na evidência e recomendações que podem ser aplicadas em consulta. Os gestores de referências bibliográficas como o Mendeley e o Zotero também acompanharam esta tendência e desenvolveram aplicações para dispositivos móveis. Para além disso funcionam de forma integrada com outras aplicações como a Browzine e a Pubchase. Conclusão – O recurso às tecnologias móveis é uma forma das bibliotecas manterem canais de comunicação com os utilizadores, mas embora existam muitas vantagens no uso das tecnologias móveis a implementação destes serviços implica um esforço financeiro e humano que nem todas as bibliotecas serão capazes de cumprir. Encontrar a forma de gerir este processo é o desafio que se impõe no futuro.
Resumo:
The Internet of Things (IoT) has grown rapidly in recent years, leading to an increased need for efficient and secure communication between connected devices. Wireless Sensor Networks (WSNs) are composed of small, low-power devices that are capable of sensing and exchanging data, and are often used in IoT applications. In addition, Mesh WSNs involve intermediate nodes forwarding data to ensure more robust communication. The integration of Unmanned Aerial Vehicles (UAVs) in Mesh WSNs has emerged as a promising solution for increasing the effectiveness of data collection, as UAVs can act as mobile relays, providing extended communication range and reducing energy consumption. However, the integration of UAVs and Mesh WSNs still poses new challenges, such as the design of efficient control and communication strategies. This thesis explores the networking capabilities of WSNs and investigates how the integration of UAVs can enhance their performance. The research focuses on three main objectives: (1) Ground Wireless Mesh Sensor Networks, (2) Aerial Wireless Mesh Sensor Networks, and (3) Ground/Aerial WMSN integration. For the first objective, we investigate the use of the Bluetooth Mesh standard for IoT monitoring in different environments. The second objective focuses on deploying aerial nodes to maximize data collection effectiveness and QoS of UAV-to-UAV links while maintaining the aerial mesh connectivity. The third objective investigates hybrid WMSN scenarios with air-to-ground communication links. One of the main contribution of the thesis consists in the design and implementation of a software framework called "Uhura", which enables the creation of Hybrid Wireless Mesh Sensor Networks and abstracts and handles multiple M2M communication stacks on both ground and aerial links. The operations of Uhura have been validated through simulations and small-scale testbeds involving ground and aerial devices.
Resumo:
Uudet palvelut ovat tarkeinta, mita asiakkaat odottavat uudelta teknologialta.Se on paaasiallinen syy siihen, etta asiakkaat ovat valmiita maksamaan uudesta teknologiasta ja kayttamaan sita. Sen vuoksi uuden verkon tuoma uusi palveluarkkitehtuuri on tarkea koko projektin onnistumiselle. Tama dokumentti keskittyy kolmannen sukupolven matkapuhelinverkkojen palveluarkkitehtuuriin, jonka viitemallista annetaan kuvaus. Verkon palvelut esitellaan ja kuvaillaan. Toteutukseen liittyvia asioita selostetaan. USA:n markkinoilla tarvittava WIN konsepti kuvataan ja sen toteutuksesta annetaan myos kuvaus. Lopussa kuvataan Pre-Paid tilaajien laskutustietojen kasittelya WIN konseptissa elvytystilanteessa.
Resumo:
Tässä diplomityössä on oletettu että neljännen sukupolven mobiiliverkko on saumaton yhdistelmä olemassa olevia toisen ja kolmannen sukupolven langattomia verkkoja sekä lyhyen kantaman WLAN- ja Bluetooth-radiotekniikoita. Näiden tekniikoiden on myös oletettu olevan niin yhteensopivia ettei käyttäjä havaitse saanti verkon muuttumista. Työ esittelee neljännen sukupolven mobiiliverkkoihin liittyvien tärkeimpien langattomien tekniikoiden arkkitehtuurin ja perustoiminta-periaatteet. Työ kuvaa eri tekniikoita ja käytäntöjä tiedon mittaamiseen ja keräämiseen. Saatuja transaktiomittauksia voidaan käyttää tarjottaessa erilaistettuja palvelutasoja sekä verkko- ja palvelukapasiteetin optimoimisessa. Lisäksi työssä esitellään Internet Business Information Manager joka on ohjelmistokehys hajautetun tiedon keräämiseen. Sen keräämää mittaustietoa voidaan käyttää palvelun tason seurannassa j a raportoinnissa sekä laskutuksessa. Työn käytännön osuudessa piti kehittää langattoman verkon liikennettä seuraava agentti joka tarkkailisi palvelun laatua. Agentti sijaitsisi matkapuhelimessa mitaten verkon liikennettä. Agenttia ei kuitenkaan voitu toteuttaa koska ohjelmistoympäristö todettiin vajaaksi. Joka tapauksessa työ osoitti että käyttäjän näkökulmasta tietoa kerääville agenteille on todellinen tarve.
Resumo:
The fact that most of new Personal Data Assistant (PDA) devices and smartphones have the ability to communicate via different wireless technologies has made several new applications possible. While traditional network model is based on the idea of static hosts, mobile devices can create decentralized, self-organizing ad-hoc networks and act as peers in the network. This kind of adapting network is suitable for mobile devices which can freely join and leave the networks. Because several different wireless communication technologies are involved, flexible changing of the networking technology must be handled in order to enable seamless communication between these networks. This thesis presents a transparent network interface to mobile Peer-to-Peer environment which is named as Virtual PeerHood. Different wireless technologies and aspects of providing a seamless connectivity between these technologies are explored. The result is a middleware platform for mobile Peer-to-Peer environment, capable of handling several networking technologies.
Resumo:
Neljännen sukupolven mobiiliverkot yhdistävät saumattomasti televerkot, Internetin ja niiden palvelut. Alkuperin Internetiä käytettiin vain paikallaan pysyviltä tietokoneilta perinteisten televerkkojen tarjotessa puhelin- ja datapalveluita. Neljännen sukupolven mobiiliverkkojen käyttäjät voivat käyttää sekä Internetiin perustuvia että perinteisten televerkkojen palveluita liikkuessaankin. Tämä diplomityö esittelee neljännen sukupolven mobiiliverkon yleisen arkkitehtuurin. Arkkitehtuurin perusosat kuvaillaan ja arkkitehtuuria verrataan toisen ja kolmannen sukupolven mobiiliverkkoihin. Aiheeseen liittyvät Internet-standardit esitellään ja niiden soveltuvuutta mobiiliverkkoihin pohditaan. Langattomia, lyhyen kantaman nopeita liitäntäverkkotekniikoita esitellään. Neljännen sukupolven mobiiliverkoissa tarvittavia päätelaitteiden ja käyttäjien liikkuvuuden hallintamenetelmiä esitellään. Esitelty arkkitehtuuri perustuu langattomiin, lyhyen kantaman nopeisiin liitäntäverkkotekniikoihin ja Internet-standardeihin. Arkkitehtuuri mahdollistaa yhteydet toisiin käyttäjiin ilman tietoa heidän senhetkisestä päätelaitteesta tai sijainnista. Internetin palveluitavoidaan käyttää missä tahansa neljännen sukupolven mobiiliverkon alueella. Yleiskäytöistä liikkuvuuden hallintamenetelmää yhden verkon alueelle ehdotetaan. Menetelmää voidaan käyttää yhdessä esitellyn arkkitehtuurin kanssa.
Resumo:
Viimeaikainen langattomien teknologioiden kehitys ja evoluutio johtaa uusiin mahdollisuuksiin business-to-business-teollisuussovellusten laatimisessa. Tämän työn tavoite on tutkia teknisten puitteiden ja perustan sekä teknologisen ennustamisen prosessia innovatiivisten langattomien sovellusten kehitysprosessissa. Työ keskittyy langattomiin teknologioihin - verkkoihin ja päätelaitteisiin. Työssä selvitetään saatavilla olevia ja tulevia langattomia verkkoteknologioita ja mobiilipäätelaitteita, arvioidaan niiden päätyypit, ominaisuudet, rajoitteet ja kehitystrendit, sekä määritellään pääasialliset tekniset ominaisuudet, jotka on huomioitava luotaessa langatonta ratkaisua. Tämä tieto vedetään yhteen jatkokäyttöä varten langattomien sovellusten päätelaitetietokantaan rakentamisen aikana. Työ tarjoaa kuvauksen päätelaitetietokannan suunnittelusta ja rakentamisesta sekä tutkii tietokantaa innovatiivisen esimerkkisovelluksen - Reaaliaikaisen On-Line Asiakaspalvelun - avulla.
Resumo:
Neljännen sukupolven mobiiliverkot kokoaa kaikki tietoliikenneverkot ja palvelut Internetin ympärille. Tämä mullistus muuttaa vanhat vertikaaliset tietoliikenneverkot joissa yhden tietoliikenneverkon palvelut ovat saatavissa vain kyseisen verkon päätelaitteille horisontaaliseksi malliksi jossa päätelaitteet käyttävät omaa verkkoansa pääsynä Internetin palveluihin. Tämä diplomityö esittelee idean paikallisista palveluista neljännen sukupolven mobiiliverkossa. Neljännen sukupolven mobiiliverkko yhdistää perinteiset televerkkojen palvelut ja Internet palvelut sekä mahdollistaa uuden tyyppisten palveluiden luonnin. TCP/IP protokollien ja Internetin evoluutio on esitelty. Laajakaistaiset, lyhyen kantaman radiotekniikat joita käytetään langattomana yhteytenä Internetiin on käsitelty. Evoluutio kohti neljännen sukupolven mobiiliverkkoja on kuvattu esittelemällä vanhat, nykyiset ja tulevat mobiiliverkot sekä niiden palvelut. Ennustukset palveluiden ja markkinoiden tulevaisuuden kehityksestä on käsitelty. Neljännen sukupolven mobiiliverkon arkkitehtuuri mahdollistaa paikalliset palvelut jotka ovat saatavilla vain yhdessä paikallisessa 4G verkossa. Paikalliset palvelut voidaan muunnella jokaiselle käyttäjälle erikseen käyttäen profiili-informaatiota ja paikkatietoa. Työssä on pohdittu paikallisten palveluiden käyttökelpoisuutta ja mahdollisuuksia käyttäen Lappeenrannan teknillisen korkeakoulun 4G projektin palvelupilotin tuloksia.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
One of the major applications of underwater acoustic sensor networks (UWASN) is ocean environment monitoring. Employing data mules is an energy efficient way of data collection from the underwater sensor nodes in such a network. A data mule node such as an autonomous underwater vehicle (AUV) periodically visits the stationary nodes to download data. By conserving the power required for data transmission over long distances to a remote data sink, this approach extends the network life time. In this paper we propose a new MAC protocol to support a single mobile data mule node to collect the data sensed by the sensor nodes in periodic runs through the network. In this approach, the nodes need to perform only short distance, single hop transmission to the data mule. The protocol design discussed in this paper is motivated to support such an application. The proposed protocol is a hybrid protocol, which employs a combination of schedule based access among the stationary nodes along with handshake based access to support mobile data mules. The new protocol, RMAC-M is developed as an extension to the energy efficient MAC protocol R-MAC by extending the slot time of R-MAC to include a contention part for a hand shake based data transfer. The mobile node makes use of a beacon to signal its presence to all the nearby nodes, which can then hand-shake with the mobile node for data transfer. Simulation results show that the new protocol provides efficient support for a mobile data mule node while preserving the advantages of R-MAC such as energy efficiency and fairness.
Resumo:
The intelligent controlling mechanism of a typical mobile robot is usually a computer system. Research is however now ongoing in which biological neural networks are being cultured and trained to act as the brain of an interactive real world robot – thereby either completely replacing or operating in a cooperative fashion with a computer system. Studying such neural systems can give a distinct insight into biological neural structures and therefore such research has immediate medical implications. The principal aims of the present research are to assess the computational and learning capacity of dissociated cultured neuronal networks with a view to advancing network level processing of artificial neural networks. This will be approached by the creation of an artificial hybrid system (animat) involving closed loop control of a mobile robot by a dissociated culture of rat neurons. This paper details the components of the overall animat closed loop system architecture and reports on the evaluation of the results from preliminary real-life and simulated robot experiments.