74 research outputs found

    A layered middleware for ot/it convergence to empower industry 5.0 applications

    Get PDF
    We are still in the midst of Industry 4.0 (I4.0), with more manufacturing lines being labeled as smart thanks to the integration of advanced ICT in Cyber–Physical Systems (CPS). While I4.0 aims to provision cognitive CPS systems, the nascent Industry 5.0 (I5.0) era goes a step beyond, aiming to build cross-border, sustainable, and circular value chains benefiting society as a whole. An enabler of this vision is the integration of data and AI in the industrial decision-making process, which does not exhibit yet a coordination between the Operation and Information Technology domains (OT/IT). This work proposes an architectural approach and an accompanying software prototype addressing the OT/IT convergence problem. The approach is based on a two-layered middleware solution, where each layer aims to better serve the specific differentiated requirements of the OT and IT layers. The proposal is validated in a real testbed, employing actual machine data, showing the capacity of the components to gracefully scale and serve increasing data volumes

    A digital twin decision support system for the urban facility management process

    Get PDF
    The ever increasing pace of IoT deployment is opening the door to concrete implementa-tions of smart city applications, enabling the large-scale sensing and modeling of (near-)real-time digital replicas of physical processes and environments. This digital replica could serve as the basis of a decision support system, providing insights into possible optimizations of resources in a smart city scenario. In this article, we discuss an extension of a prior work, presenting a detailed proof-of-concept implementation of a Digital Twin solution for the Urban Facility Management (UFM) process. The Interactive Planning Platform for City District Adaptive Maintenance Operations (IPPODAMO) is a distributed geographical system, fed with and ingesting heterogeneous data sources originating from different urban data providers. The data are subject to continuous refinements and algorithmic processes, used to quantify and build synthetic indexes measuring the activity level inside an area of interest. IPPODAMO takes into account potential interference from other stakeholders in the urban environment, enabling the informed scheduling of operations, aimed at minimizing interference and the costs of operations

    Smart-RED: A novel congestion control mechanism for high throughput and low queuing delay

    Get PDF
    We consider the scenario in which several TCP connections share the same access point (AP) and a congestion avoidance/control mechanism is adopted with the aim of assigning the available bandwidth to the clients with a certain fairness. When UDP traffic with real-time requirements is present, the problem becomes even more challenging. Very well-known congestion avoidance mechanisms are the Random Early Detection (RED) and the Explicit Congestion Notification (ECN). More recently, the Smart Access Point with Limited Advertised Window (SAP-LAW) has been proposed. Its main idea is that of computing the maximum TCP rate for each connection at the bottleneck, taking into account the UDP traffic to keep a low queue size combined with a reasonable bandwidth utilization. In this paper, we propose a new congestion control mechanism, namely, Smart-RED, inspired by SAP-LAW heuristic formula. We study its performance by using mean field models and compare the behaviours of ECN/RED, SAP-LAW, and Smart-RED under different scenarios. We show that while Smart-RED maintains some of the desirable properties of the SAP-LAW, it solves the problems it may have in case of bursty UDP traffic or TCP connections with very different needs of bandwidth

    Lämmermast mit verschiedenen Rassen auf extensivem Grünland: erste Ergebnisse

    Get PDF
    Ziel dieser Studie ist es, die mögliche Nutzung von extensivem Grünland für die Mast von Merino-Lämmern und reinrassigen Waldschaf-Lämmern unter verschiedenen Besatzraten zu untersuchen. Während der ersten Weidemonate im Jahr 2017 wurden Merino-Lämmer unter Ausnutzung der hohen Graswachstumsintensität geweidet. Die Waldschaf-Lämmer wurden in der zweiten Hälfte der Vegetationsperiode im Jahr 2017 mit geringerer Wachstumsintensität der Weide bis zum Ende dieser Weidezeit geweidet. Beide Rassen wurden in zwei getrennten Paddocks mit unterschiedlichen Besatzraten und Graswachstumshöhen beweidet. Das gleiche Verfahren wird im Jahr 2018 wiederholt. Ergebnisse des ersten Jahres 2017 werden vorgestellt

    Wearable sensor networks: A measurement study

    Get PDF
    Abstract Wearable technology is no longer science fiction. Thanks to the growing capability in the production chain to miniaturize complex electronics, a wide variety of gadgets that can be worn or included in dresses and accessories have emerged. These smart gadgets can collect data about the physical condition of the user and/or the environment providing the basis for innovative and valuable services. The main goal of this paper is to assess this context through field experiments undertaken in a testbed comprised of sensing hardware deployed on open source boards such as Arduino. Moreover, coupled with the sensing tier, we propose a proof-of-concept deployment architecture enabling a wide range of wearable sensors to collect and transmit data to a logically centralized unit

    A Virtual PEP for Web Optimization over a Satellite-Terrestrial Backhaul

    Get PDF
    The availability of network softwarization and virtualization technology in the field of telecommunications has opened the door to a radical review of the applications, protocols, and deployment models. In this evolving framework, old assumptions and constraints specific to satellite communications must be carefully re-assessed. To this aim, we revisit the role of the performance enhancing proxy (PEP), replaced by a chain of custom virtual network functions properly enabled to optimize common web traffic performance over a backhaul dynamically enabled with a supplementary satellite link. The resulting virtual PEP (vPEP) is compliant with the breakthrough virtualization and slicing paradigms and can fruitfully exploit the advanced features of the most recent IETF technologies such as QUIC and MPTCP

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Get PDF
    Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset

    Flying ad-hoc network application scenarios and mobility models

    Get PDF
    [EN] Flying ad-hoc networks are becoming a promising solution for different application scenarios involving unmanned aerial vehicles, like urban surveillance or search and rescue missions. However, such networks present various and very specific communication issues. As a consequence, there are several research studies focused on analyzing their performance via simulation. Correctly modeling mobility is crucial in this context and although many mobility models are already available to reproduce the behavior of mobile nodes in an ad-hoc network, most of these models cannot be used to reliably simulate the motion of unmanned aerial vehicles. In this article, we list the existing mobility models and provide guidance to understand whether they could be actually adopted depending on the specific flying ad-hoc network application scenarios, while discussing their advantages and disadvantages.Bujari, A.; Tavares De Araujo Cesariny Calafate, CM.; Cano, J.; Manzoni, P.; Palazzi, CE.; Ronzani, D. (2017). Flying ad-hoc network application scenarios and mobility models. International Journal of Distributed Sensor Networks. 13(10):1-17. doi:10.1177/1550147717738192S117131

    Analysis of performance in Depth Based Routing for Underwater Wireless Sensor Networks

    Get PDF
    In the last decade, Underwater Wireless Sensor Networks (UWSNs) have been widely studied because of their peculiar aspects that distinguish them from common wireless terrestrial networks. In fact, most UWSNs use acoustic instead of radio-frequency based communications, and nodes are subject to high mobility caused by water currents. As a consequence, specialized routing algorithms have been developed to tackle this challenging scenario. Depth based Routing (DBR) is one of the first protocols that have been developed to this aim, and is still widely adopted in actual implementations of UWSNs. In this paper we propose a stochastic analysis that aims at evaluating the performance of UWSNs using DBR in terms of expected energy consumption and expected end-to-end delay. Under a set of assumptions, we give expressions for these performance indices that can be evaluated efficiently, and hence they can be adopted as the basis for optimizing the configuration parameters of the protocol

    A Network Coverage Algorithm for Message Broadcast in Vehicular Networks

    No full text
    n the recent years, ICT use in vehicular technology has expanded very fast. Inter-vehicle communication (IVC) is seen as the natural next step in this evolution whose availability will give rise to the next generation of smart vehicles. As this technology is deployed, a wide range of services varying from safety to entertainment will become factually accessible to passengers. Many of these envisaged services require a one-to-many communication model which demand for intelligent solutions able to propagate the message in areas of the network where it has not been heard before. To this end, we propose an enhancement of an existent optimal message propagation scheme proposed in the context of one dimensional vehicular networks, namely Fast-Broadcast. Our proposal generalizes the former with the objective of guiding message dissemination to an entire area of interest in generic road topologies. Our proposed scheme exploits bloom filter properties to further advance message propagation into the network. We contrast our approach with the original, lightweight state-of-the-art proposal, showing that it fulfills its design objectives
    • …
    corecore