نتایج جستجو برای: backup nodes

تعداد نتایج: 136625  

2014
Janusz Furtak Jan Chudzikiewicz

This document describes how to use the Trusted Platform Module (TPM) to authenticate sensors in wireless sensors network which create a sensors’ domain. Model of the wireless sensor network is presented. There are three types of nodes in the domain. The M node is an authentication authority in sensors’ domain – it stores credentials of all nodes of domain. The M node is also the recipient of th...

2015
R. Balasubramaniyan M. Chandrasekaran

Mobile ad hoc network (MANET) is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The routing protocol performance suffers due to resource constraint...

2011
Clinton Carpene

iPhone logical backup files can provide forensic examiners with almost the entire contents of its host phone up until the point that the backup took place. This paper serves to provide an overview of the information attainable via the analysis of an iPhone backup, making references to the applicability of such analysis in the digital forensics field. The paper introduces the backup directories ...

2003
Chao-Tung Yang Yao-Chung Chang

This document describes how to set up a diskless Linux box. As technology is advancing rapidly, network-cards are becoming cheaper and much faster 100 Mbits/s Ethernet is common now and in about 1 year 1000 Mbits/s i.e. 1GigBits Ethernet cards will become a standard. With high-speed network cards, remote access will become as fast as the local disk access which will make diskless nodes a viable...

2006
Jim Lee

Tape backup has traditionally been the mainstay of enterprise data protection when long-term data protection is required. As disk technologies have improved and economies of scale have driven down prices, disk adoption rates have surged and it would appear disk is poised to eclipse tape as the dominant backup platform and relegate tape to a minor archival and disaster recovery role. Numerous su...

2010
S. S. Tyagi

Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre existing fixed infrastructure. Because of highly dynamic in nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability and limited memory resources. ...

2003
Alexander A. Kist Richard J. Harris

The 3rd Generation Partnership Project (3GPP) will use the Session Initiation Protocol (SIP) as a session signalling protocol in the IP Multimedia Subsystem (IMS) of next generation UMTS systems. Certain nodes on the signalling layer have to process a large number of SIP messages. This paper introduces a concept for efficient SIP message routing and user assignment. The SIP Message Overflow Rou...

2005
Georg Gaderer Patrick Loschmidt Thilo Sauter

The widespread clock synchronization standard, IEEE 1588, is purely master-slave based. The inherent disadvantage is, that a failure of the master requires the election of a new one, during which the network nodes cannot be synchronized. The present paper proposes a compatible extension to the standard introducing an architecture for fault-tolerant and seamless distribution of time information....

Journal: :Scalable Computing: Practice and Experience 2010
Renata Slota Darin Nikolow Stanislaw Polak Marcin Kuta Mariusz Kapanowski Kornel Skalkowski Marek Pogoda Jacek Kitowski

National Data Storage is a distributed data storage system intended to provide high quality backup, archiving and data access services. These services guarantee high level of data protection as well as high performance of data storing and retrieval by using replication techniques. Monitoring and data access prediction are necessary for successful deployment of replication. Common Mass Storage S...

2018
M. Waqar Ashraf Sevia M. Idrus Farabi Iqbal

Received Jan 8, 2018 Revised Mar 12, 2018 Accepted Apr 16, 2018 Lightpaths enable end-to-end all-optical transmission between network nodes. For survivable routing, traffic is often carried on a primary lightpath, and rerouted to another disjointed backup lightpath in case of the failure of the primary lightpath. Though both lightpaths can be physically disjointed, they can still fail simultane...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید