Service oriented network architecture for scalable M2M and sensor network services

Author(s):  
Kazumine Matoba ◽  
Ken-ichi Abiru ◽  
Tomohiro Ishihara
2014 ◽  
Vol 628 ◽  
pp. 218-224 ◽  
Author(s):  
Konstantinos Oikonomou ◽  
George Koufoudakis ◽  
Eleni Kavvadia ◽  
Vassilios Chrissikopoulos

Wireless sensor networks can be beneficial for monitoring ambient vibrations in historical buildings where the installation of traditionally wired system may be either difficult due to wiring difficulties or forbidden due to prohibitive legislation. In this paper, a novel wireless sensor network architecture is presented that is focusing on efficiently monitoring ambient vibrations in historical buildings. Traditional wired monitoring technologies are often difficult to be installed in historical buildings either to high costs for installing the wires or to prohibitive legislations. Employing a wireless system could be beneficial. However, as there is no wireless system of high resolution available in the market, an innovative network architecture is proposed that efficiently combines the benefits of both the wired and wireless systems. The problem of synchronization that this novel architecture introduces, is also discussed in this paper along with a possible solution.


Smart Dust ◽  
2006 ◽  
pp. 8-1-8-19 ◽  
Author(s):  
Jessica Feng ◽  
Farinaz Koushanfar ◽  
Miodrag Potkonjak

2022 ◽  
Author(s):  
K. Sakthisudhan ◽  
P. Sivakamasundari ◽  
M. Revathi ◽  
R. Shamini ◽  
K. Paul Joshua ◽  
...  

Author(s):  
Ankur Dumka ◽  
Hardwari Lal Mandoria ◽  
Anushree Sah

The chapter surveys the analysis of all the security aspects of software-defined network and determines the areas that are prone to security attacks in the given software-defined network architecture. If the fundamental network topology information is poisoned, all the dependent network services will become immediately affected, causing catastrophic problems like host location hijacking attack, link fabrication attack, denial of service attack, man in the middle attack. These attacks affect the following features of SDN: availability, performance, integrity, and security. The flexibility in the programmability of control plane has both acted as a bane as well as a boon to SDN. Like the ARP poisoning in the legacy networks, there are several other vulnerabilities in the SDN architecture as well.


Author(s):  
Andrew Targowski

The enterprise system approach is defined by its evolution and major milestones of architectural planning. The ES architectures are multi-faceted solutions, hence it is defined in the scope of the enterprise organization architecture (EOA), enterprise functional architecture (EFA), enterprise processive architecture (EPA), enterprise information architecture (EIA), enterprise software architecture (ESA), enterprise network architecture (ENA), enterprise service architecture (ESA), business component architecture (BCA), enterprise information infrastructure (EII), and enterprise configurations. A composite ES architecture is presented as a transitional architecture, which is currently practiced by most enterprises. The near future of the ES approach will be rather limited to the ways of delivering ES’ applications within a framework of service-oriented architecture (SOA) and the cloud computing, which satisfies effective large-scale operations. The progressive process of organization/business virtualization and the urgent need for more sustainable enterprise development should lead to new development of enterprise systems.


Sign in / Sign up

Export Citation Format

Share Document