2 research outputs found

    Prototype of the telematics map cloud service

    Get PDF
    User experience of the vehicles' telematics services depends on quality of bidirectional network connection between the vehicle and stationary high-performance computing system. In this case, there is a task of ensuring continuous data transmission between the vehicle and stationary computing system in the conditions of highly dynamic networks. The answer is to retrieve data about surrounding networks from external sources. The source may be a telematics map - set of low-level methods, which provide management routines for data about available networks. While vehicle moves along the route, these methods handle the data about surrounding networks, generalize them by geographical and temporal principles, execute queries to a database retrieving list of networks available in the area. As a result, we can schedule connections to wireless networks throughout the route. The article covers technical aspects of implementation of the telematics map information system: data collection and generalization technologies, networks list composition rules. The prototype demonstrates ability to solve the task of networks lists management in moving vehicle under real world radio conditions

    Space experiment "Kontur-2": Applied methods and obtained results

    Get PDF
    Space experiment "Kontur-2" aboard the International Space Station is focused on the transfer of information between station and on-ground robot. Station's resources are limited, including communication ones. That is why for the space experiment “Kontur-2” it was decided to use the methods of priority traffic management. New access control mechanisms based on these methods are researched. The usage of the priority traffic processing methods allows using more efficiently the bandwidth of receiving and transmitting equipment onboard the International Space Station through the application of randomized push-out mechanism. The paper considers methods applied for traffic management and access control during international space experiment “Kontur-2” performed aboard the ISS. The obtained results are also presented
    corecore