Spelling suggestions: "subject:"ehe internet off things"" "subject:"ehe internet oof things""
581 |
FairyBox:具個人化空間設置能力的桌上型智慧容器 / FairyBox: a customizable personal desktop container廖云瑄, Liao, Yun-Hsuan Unknown Date (has links)
近年來隨著人口往都市集中,且高房價的時代來臨,導致生活空間更形狹小,而在狹小的生活空間中,桌子扮演了各式日常活動不可或缺的角色,不同種類、大小、高低的桌子輔助人們從事不同活動。其中,工作桌為使用情境最複雜的桌面環境,工作桌使用情境多卻又受限於狹小桌面環境,易導致工作空間不足、桌面堆滿許多物品。堆積雜亂的物品不但影響工作效率,在從事特定活動時看到不相干的物品,也會對使用者的情緒產生影響,干擾思緒。此外,放置在桌上的物品數量越多,重配置就越困難,所以無形中也限縮了使用者對桌面空間配置權。基於上述的觀察,本論文提出「FairyBox」桌上型智慧容器概念與原形實作,此裝置讓使用者將不同活動會用到的物品放在不同的容器中,從事特定活動時,配置相關物品的容器,並依照自己的喜好放置於桌面特定位置。這些容器將記得使用者所放置的位置,在往後從事該活動時,自動行進到桌面上的固定位置,類似桌面上的自走車。透過「FairyBox」,即使在狹小桌面從事多種活動,也可以避免影響情緒與專注力,並重拾對桌面的配置權,打造客製化的理想桌面空間。 / The workspace is one of the most complicated spaces in a living environment. One that works in a small workspace typically use a small table to handle tasks and activities. Thus, objects spread over the table in short time. Because objects arouse emotions, one’s thinking often interferes when a user observes many irrelevant objects spread on the table. Moreover, human creativity and efficiency are usually restricted because of the losing of the right of deploying things. This study aims to develop a device called “FairyBox,” which is a customizable personal desktop container. A user can put the objects into the FairyBox. Before a user is going to perform an activity, needing some objects previously placed in the FairyBox, the user just deploys FairyBox on the table wherever one wants. Then, when the activity is performed, the FairyBox goes to the deployed location autonomously. Using FairyBox, the user has more space when performing the activities in the workspace and thus is more focused on the activities.
|
582 |
Digitale Geschäftsmodelle in der Industrie 4.0Lange, Hergen Eilert 22 March 2017 (has links) (PDF)
Die Industrie 4.0 führt aktuell zu revolutionären Veränderungen und Herausforderungen im Industriesektor, auf die Unternehmen mit neuen Geschäftsmodellen reagieren müssen. Die Masterarbeit gibt mit Hilfe einer Status-Quo Analyse eine Bestandsaufnahme über die aktuellen digitalen Geschäftsmodelle deutscher Industrieunternehmen. Die Erkenntnisse wurden auf Basis von 71 \"Mini-Cases\" erhoben. Dabei wurden Anbieter, sowie Anwender von Industrie 4.0 Technologien untersucht und in neun Muster kategorisiert. Auf Grundlage dieser Ergebnisse wurde ein inkrementeller Transformationsprozess konzipiert, der zur Entwicklung von digitalen Geschäftsmodellen in der Industrie 4.0 genutzt werden kann.
|
583 |
探討Beacon在台灣的創新擴散歷程 - 以燦坤作為創新先鋒為例 / The Study of Implementing Beacon From the Perspective of Innovation Diffusion - A Case Study of Tsann Kuen Enterprise彭怡翔 Unknown Date (has links)
在行動寬頻、雲端及網際網路等產業的帶動下,全球行動裝置如智慧型手機及平板電腦蓬勃發展,其衍生之行動經濟及應用更為全球經濟成長帶來高度動能。在連網裝置逐年成長之下,物聯網產業應運而生,而其中感測器技術更為物聯網基礎建設中最為核心的關鍵項目。繼蘋果於西元2013年WWDC大會發佈iBeacon技術後,全球零售業掀起微定位熱潮,而Forbes更預估企業利用Beacon搭配APP蒐集消費者資訊為未來物聯網重要趨勢之一。在實體零售店逐漸「展示店化」趨勢下,如何藉由ICT科技、物聯網技術、行動裝置應用來加強與消費者間的連結及提升購物體驗,為實體零售業者急需面對的課題。
本論文研究主要的目的在於探討Beacon於台灣零售業者燦坤的創新擴散歷程,以及使Beacon能夠於燦坤導入每階段快速擴散的關鍵因素,而其中以創新擴散模型之認知、說服、決策、實行、確認五階段構面進行研究與分析。此外,更探討燦坤如何運用Beacon進行O2O虛實整合。
本研究所得到的主要結論包括:(1)在創新擴散的流程中,擁有與導入科技相關的組織團隊背景以及根據創新需求調整組織架構,為Beacon於燦坤之認知階段中能夠快速擴散的關鍵因素。(2)在創新擴散的流程中,鼓勵創新的企業文化為Beacon於燦坤之說服階段中能夠快速擴散的關鍵因素。(3)在創新擴散的流程中,將非核心能力專案外包以及對於外包廠商的選擇,為Beacon於燦坤之決策階段中能夠快速擴散的關鍵因素。(4)在創新擴散的流程中,高階主管對於專案的參與支持以及選擇場域面積、營業額、人流數較大的門市進行首波產品曝光測試,為Beacon於燦坤之實行階段中能夠快速擴散的關鍵因素。(5)在創新擴散的流程中,進行產品的成效評估和顧客滿意度調查,以及尋求產品穩定的獲利模式來源,為Beacon於燦坤之確認階段中能夠快速擴散的關鍵因素。(6)燦坤以Beacon為技術核心打造燦坤黃金傳說APP,以門市尋寶及APP推播的方式,連結燦坤3C實體門市及快3網路商城,使虛實能夠結合及互利。本文最後並提出對於實務上及後續研究的建議。
|
584 |
CoEP: uma camada para comunicação segura para dispositivos computacionais de grão fino em redes de sensores sem fio. / CoEP: a layer for secure communication for fine grain computational devices in wireless sensor networks.Manini, Matheus Barros 20 May 2019 (has links)
O trabalho desenvolvido nessa dissertação é a concepção de uma camada de segurança nomeada de CoEP (Constrained Extensible Protocol), nome similar à camada de aplicação CoAP (Constrained Aplication Protocol), por razões de sua compatibilidade em utilização, como apresentado em detalhes no texto. Essa camada, por sua vez, é criada por conta da identificação de lacuna de prover tecnologia de segurança adequada e compacta em dispositivos restritos; isto é, dispositivos com baixa capacidade de processamento, comunicação e armazenamento, mas alto volume de dipositivos em rede que, como justificado posteriormente, chamamos de dispositivo de grão fino. Além disso, esses volumes, que são de dezenas a centenas de dispositivos, se dão em sistemas conhecidos como redes de sensores sem fio, onde processamento paralelo e distribuído ocorre de forma autônoma e de forma a criar-se uma rede de comunicação. Enquanto diversas tecnologias habilitadoras permitiram que redes de sensores sem fio se tornassem cada vez mais possíveis tecnicamente e economicamente - devido ao avanço da tecnologia em áreas como baterias, supercapacitores, circuitos de consumo ultra-baixo, sensores mais econômicos e com novas técnicas de medição, e outras -, o mesmo tem sido feito em questões de software e implementação de protocolos e padrões para que se utilize todo esse avanço de hardware de forma inteligente e eficiente. Isto foi feito através de reestruturação e adaptação de protocolos para esses dispositivos, porém percebe-se que foram feitas poucas contribuições para implementar-se segurança de forma eficiente; como identificado na dissertação, esses dispositivos têm utilizado versões parcialmente implementadas do protocolo DTLS, um protocolo extenso e que foi desenvolvido para dispositivos de recursos abundantes, isto é, que possuem recursos de sobra para a tecnologia. O CoEP é, nesse contexto, uma camada de segurança que substituiria o DTLS em dispositivos de grão fino para realizar tarefas de segurança para protocolos de aplicação de forma inteligente e eficiente. Além do CoEP realizar sua tarefa de segurança, a camada também foi arquitetada para utilizar recursos de forma eficiente e prover segurança como um serviço para protocolos, retirando necessidades de implementação de segurança individualmente em cada protocolo e demais trabalhos de desenvolvimento. Como resultado, a camada foi implementada em sistema restrito e pode reduzir consideravelmente a utilização de seus recursos, bem como sua utilização obriga todos dispositivos conectados nessa mesma rede a utilizem segurança, o que é essencial para redes de sensores sem fio, que tem o potencial de ter o mesmo impacto na sociedade que a própria Internet teve, como detalhado no texto. / The developed work in this dissertation is the design of a security layer named Constrained Extensible Protocol (CoEP), similar name to the Constrained Application Protocol (CoAP) application layer, for reasons of its compatibility in use, as presented in detail in the text. This layer, on the other hand, is created because of the identification of the gap to provide adequate and lean security technology in restricted devices; that is, with low processing, communication and storage capacity, but with high volume which, as justified later, we call fine grain device. In addition, these device volumes are reachable in systems known as wireless sensor networks, where parallel and distributed processing occurs autonomously and in a way to create a communication network. While several enabling technologies have made wireless sensor networks to become increasingly possible technically and economically - due to the advancement of technology, areas such as batteries, supercapacitors, ultra-low consumption circuits, more economical sensors and new measurement techniques, and more -, the same has been done in software, protocols and standards implementation so that all this advance of hardware can be used intelligently and efficiently. This was done through the restructuring and adaptation of protocols for these devices, but it is noticed that few contributions were made to implement security efficiently; as identified in the dissertation, these devices have used partially implemented versions of the DTLS protocol, an extensive protocol that was developed for relatively unlimited resource devices. CoEP is, in this context, a security layer that would replace DTLS in fine grain devices to perform security tasks for application protocols in an intelligent and efficient manner. In addition to CoEP performing its security task, the layer was also architected to efficiently utilize resources and provide security as a service for protocols, removing individual security implementation needs in each protocol and other development work. As a result, the layer has been deployed on a lean system and can greatly reduce the utilization of its resources, as well as its use obliges all connected devices to use security, which is essential for wireless sensor networks, which has the potential to have the same impact on society that the Internet itself had, as detailed in the text.
|
585 |
Approche de gestion orientée service pour l'Internet des objets (IoT) considérant la Qualité de Service (QoS) / Service oriented approach for the Internet of Things (IoT) Quality of Service (QoS) awareGarzone, Guillaume 30 November 2018 (has links)
L’Internet des Objets (IoT) est déjà omniprésent aujourd’hui : domotique, bâtiments connectés ou ville intelligente, beaucoup d’initiatives et d’innovations sont en cours et à venir. Le nombre d’objets connectés ne cesse de croître à tel point que des milliards d’objets sont attendus dans un futur proche.L’approche de cette thèse met en place un système de gestion autonomique pour des systèmes à base d’objets connectés, en les combinant avec d’autres services comme par exemple des services météo accessibles sur internet. Les modèles proposés permettent une prise de décision autonome basée sur l’analyse d’évènements et la planification d’actions exécutées automatiquement. Des paramètres comme le temps d’exécution ou l’énergie consommée sont aussi considérés afin d’optimiser les choix d’actions à effectuer et de services utilisés. Un prototype concret a été réalisé dans un scénario de ville intelligente et de bus connectés dans le projet investissement d'avenir S2C2. / The Internet of Things (IoT) is already everywhere today: home automation, connected buildings or smart city, many initiatives and innovations are ongoing and yet to come. The number of connected objects continues to grow to the point that billions of objects are expected in the near future.The approach of this thesis sets up an autonomic management architecture for systems based on connected objects, combining them with other services such as weather services accessible on the Internet. The proposed models enable an autonomous decision making based on the analysis of events and the planning of actions executed automatically. Parameters such as execution time or consumed energy are also considered in order to optimize the choices of actions to be performed and of services used. A concrete prototype was realized in a smart city scenario with connected buses in the investment for future project: S2C2.
|
586 |
Protecting Bare-metal Systems from Remote ExploitationAbraham Anthony Clements (6618926) 15 May 2019 (has links)
The Internet of Things is deploying large numbers of bare-metal systems that have no protection against memory corruption and control-flow hijacking attacks. These attacks have enabled unauthorized entry to hotel rooms, malicious control of unmanned aerial vehicles, and invasions of privacy. Using static and dynamic analysis these systems can utilize state-of-the-art testing techniques to identify and<br>prevent memory-corruption errors and employ defenses against memory corruption and control-flow hijacking attacks in bare-metal systems that match or exceed those currently employed on desktop systems. This is shown using three case studies.<br><br>(1) EPOXY which, automatically applies data execution prevention, diversity, stack defenses, and separating privileged code from unprivileged code using a novel<br>technique called privileged overlaying. These protections prevent code injection attacks, and reduce the number of privileged instruction to 0.06% verses an unprotected<br>application.<br><br>(2) Automatic Compartments for Embedded Systems (ACES), which automatically creates compartments that enforce data integrity and code isolation within bare-metal applications. ACES enables exploring policies to best meet security and performance requirements for individual applications. Results show ACES' can form 10s of compartments within a single thread and has a 15% runtime overhead on average.<br><br><div>(3) HALucinator breaks the requirement for specialized hardware to perform bare-metal system testing. This enables state-of-the-art testing techniques –e.g., coverage based fuzzing – to scale with the availability of commodity computers, leading to the discovery of exploitable vulnerabilities in bare-metal systems. <br></div><div><br></div><div>Combined, these case studies advance the security of embedded system several decades and provide essential protections for today’s connected devices.</div>
|
587 |
Energy efficiency optimization in 28 nm FD-SOI : circuit design for adaptive clocking and power-temperature aware digital SoCs / Optimisation de l'efficacité énergétique en 28 nm-FD-SOI : conception de circuits d'horloge adaptative et de mesure puissance-température pour systèmes numériques sur pucesCochet, Martin 06 December 2016 (has links)
L'efficacité énergétique est devenue une métrique clé de la performance des systèmes sur puce numériques, en particulier pour les applications tirant leur énergie de batteries ou de l'environnement. La miniaturisation technologique n'est plus suffisante pour atteindre les niveaux de consommation requis. Ce travail de recherche propose ainsi de nouvelles conceptions de circuits pour la génération d'horloge flexible, la mesure de puissance et de température ainsi que l'intégration de ces blocs au sein de systèmes sur puce complets.Le multiplieur de fréquence innovant en boucle ouverte proposé permet l'adaptation rapide de la fréquence générée (53MHz 0.5V - 889MHz 0.9 V). Sa surface réduite (981µm2) et faible consommation (0.45pJ/cycle à 0.5 V) facilitent son intégration dans des systèmes à basse consommation. Le capteur de puissance instrumente un convertisseur de tension switched-capacitor; validé sur deux architectures différentes, il permet une mesure de la puissance d'entrée et de sortie avec une précision de 2.5% à 6%. Enfin, un nouveau principe de capteur de température est proposé. Il exploite une méthode de calibration par body-biasing sur caisson n et un système numérique intégré pour la compensation de non-linéarité. Enfin, cette thèse illustre la manière dont ces circuits peuvent être intégrés pour assurer la gestion de consommation de systèmes complexes. Un travail de modélisation du body-biasing est proposé, illustrant sa complémentarité avec la gestion de tension d'alimentation. Puis trois exemples de stratégies de gestion de la consommation sont proposées au sein de systèmes complets. / Energy efficiency has become a key metric for digital SoC, especially for applications relying on batteries or energy harvesting. Hence, this work proposes new designs for on-chip flexible clock generator, power monitor and temperature sensor as well as the integration of those blocks within complete SoC.The novel open-loop clock multiplier architecture enables fast frequency scaling and is implemented to operate on the same voltage-frequency range as a digital core ((53MHz 0.5V - 889MHz 0.9 V). The achieved extremely low area (981µm2) and power consumption 0.45pJ/cycle 0.5 V) also ease its integration within low power SoC. The proposed power monitor instruments switched capacitor DC-DC converters, which are standard components of low voltage SoCs. The monitor has been demonstrated over two different converters topologies and provides a measurement of both the converter input and output power within 2.5% to 6% accuracy. Last, a new principle of temperature sensor is proposed. It leverages single n well body-biasing for calibration and integrated digital logic for large non-linearity correction. It is expected to achieve within 1C accuracy 0.1nJ / sample and 225 µm2 probe area. Then, this work illustrates how those circuits can be integrated within complex SoCs power management strategies. First, a modeling study of body biasing highlights the benefits it can provide in complement to voltage scaling, accounting for a wide temperature range. Last, three example of power management are proposed at SoC level.
|
588 |
Integration framework for artifact-centric processes in the internet of things / Cadre d'intégration pour les processus centrés artéfacts dans l'Internet des objetsAbi Assaf, Maroun 09 July 2018 (has links)
La démocratisation des objets communicants fixes ou mobiles pose de nombreux défis concernant leur intégration dans des processus métiers afin de développer des services intelligents. Dans le contexte de l’Internet des objets, les objets connectés sont des entités hétérogènes et dynamiques qui englobent des fonctionnalités et propriétés cyber-physiques et interagissent via différents protocoles de communication. Pour pallier aux défis d’interopérabilité et d’intégration, il est primordial d’avoir une vue unifiée et logique des différents objets connectés afin de définir un ensemble de langages, outils et architectures permettant leur intégration et manipulation à grande échelle. L'artéfact métier a récemment émergé comme un modèle d’objet (métier) autonome qui encapsule ses données, un ensemble de services, et manipulant ses données ainsi qu'un cycle de vie à base d’états. Le cycle de vie désigne le comportement de l’objet et son évolution à travers ses différents états pour atteindre son objectif métier. La modélisation des objets connectés sous forme d’artéfact métier étendu nous permet de construire un paradigme intuitif pour exprimer facilement des processus d’intégration d’objets connectés dirigés par leurs données. Face aux changements contextuels et à la réutilisation des objets connectés dans différentes applications, les processus dirigés par les données, (appelés aussi « artifacts » au sens large) restent relativement invariants vu que leurs structures de données ne changent pas. Or, les processus centrés sur les services requièrent souvent des changements dans leurs flux d'exécution. Cette thèse propose un cadre d'intégration de processus centré sur les artifacts et leur application aux objets connectés. Pour cela, nous avons construit une vue logique unifiée et globale d’artéfact permettant de spécifier, définir et interroger un très grand nombre d'artifacts distribués, ayant des fonctionnalités similaires (maisons intelligentes ou voitures connectées, …). Le cadre d'intégration comprend une méthode de modélisation conceptuelle des processus centrés artifacts, des des algorithmes d'appariement inter-artifacts et une algèbre de définition et de manipulation d’artifacts. Le langage déclaratif, appelé AQL (Artifact Query Language) permet en particulier d’interroger des flux continus d’artifacts. Il s'appuie sur une syntaxe de type SQL pour réduire les efforts d'apprentissage. Nous avons également développé un prototype pour valider nos contributions et mener des expériences dans le contexte de l’Internet des objets. / The emergence of fixed or mobile communicating objects poses many challenges regarding their integration into business processes in order to develop smart services. In the context of the Internet of Things, connected devices are heterogeneous and dynamic entities that encompass cyber-physical features and properties and interact through different communication protocols. To overcome the challenges related to interoperability and integration, it is essential to build a unified and logical view of different connected devices in order to define a set of languages, tools and architectures allowing their integrations and manipulations at a large scale. Business artifact has recently emerged as an autonomous (business) object model that encapsulates attribute-value pairs, a set of services manipulating its attribute data, and a state-based lifecycle. The lifecycle represents the behavior of the object and its evolution through its different states in order to achieve its business objective. Modeling connected devices and smart objects as an extended business artifact allows us to build an intuitive paradigm to easily express integration data-driven processes of connected objects. In order to handle contextual changes and reusability of connected devices in different applications, data-driven processes (or artifact processes in the broad sense) remain relatively invariant as their data structures do not change. However, service-centric or activity-based processes often require changes in their execution flows. This thesis proposes a framework for integrating artifact-centric processes and their application to connected devices. To this end, we introduce a logical and unified view of a "global" artifact allowing the specification, definition and interrogation of a very large number of distributed artifacts, with similar functionalities (smart homes or connected cars, ...). The framework includes a conceptual modeling method for artifact-centric processes, inter-artifact mapping algorithms, and artifact definition and manipulation algebra. A declarative language, called AQL (Artifact Query Language) aims in particular to query continuous streams of artifacts. The AQL relies on a syntax similar to the SQL in relational databases in order to reduce its learning curve. We have also developed a prototype to validate our contributions and conducted experimentations in the context of the Internet of Things.
|
589 |
Towards smart services with reusable and adaptable connected objects : An application to wearable non-invasive biomedical sensors / Des services intelligents à partir d’objets connectés réutilisables et adaptables : Applications aux réseaux non-intrusifs de capteurs biomédicaux portablesGatouillat, Arthur 20 December 2018 (has links)
La prolifération des objets communicants fixes et mobiles soulève la question de leur intégration dans les environnements quotidiens, par exemple dans le cadre de la e-santé ou de la domotique. Les principaux défis soulevés relèvent de l’interconnexion et de la gestion de la masse de donnée produite par ces objets intelligents. Notre premier objectif est d’adopter une démarche des couches basses vers les couches hautes pour faciliter l’intégration de ces objets à des services intelligents. Afin de développer celle-ci, il est nécessaire de d’étudier le processus de conception des objets intelligents indépendamment de considérations matérielles et logicielles, au travers de la considération de leur propriétés cyber-physiques. Pour mener à bien la réalisation de services intelligents à partir d’objets connectés, les deux axes de recherche suivant seront développés : la définition d’une méthode de conception orientée service pour les objets connectés intégrant une dimension formelle ainsi de valider le comportement de ceux-ci, l’auto-adaptation intelligente dans un contexte évolutif permettant aux objets de raisonner sur eux même au travers d’un langage déclaratif pour spécifier les stratégies d’adaptation. La validation de ces contributions s’effectuera par le biais du développement et de l’expérimentation à grandeur nature d’un service de diagnostic médical continu basé sur la collecte de données médicales en masse par des réseaux non-intrusifs de capteurs biomédicaux portables sur le corps humain. / The rapid growth of fixed and mobile smart objects raises the issue of their integration in everyday environment, e.g. in e-health or home-automation contexts. The main challenges of these objects are the interoperability, the handling of the massive amount of data that they generate, and their limited resources. Our goal is to take a bottom-up approach in order to improve the integration of smart devices to smart services. To ensure the efficient development of our approach, we start with the study of the design process of such devices regardless of specific hardware or software through the consideration of their cyber-physical properties. We thus develop two research directions: the specification of a service-oriented design method for smart devices with formal considerations in order to validate their behavior, and the proposal of a self-adaptation framework in order to handle changing operating context through self-reasoning and the definition of a declarative self-adaptation objectives specification language. The testing of these contributions will be realized through the development of a large-scale experimental framework based on a remote diagnostics case-study relying on non-invasive wearable biomedical sensors.
|
590 |
Hantering av nätverkscache i DNSLindqvist, Hans January 2019 (has links)
The Domain Name System, DNS, is a fundamental part in the usability of the Internet, but its caching function is challenged by the increase of address size, number of addresses and automation. Meanwhile, there are limits in the memory capacity of certain devices at the Internet’s edge towards the Internet of Things. This study has taken a closer look at concurrent needs of DNS resolution and considered how DNS is affected by IPv6 address propagation, mobile devices, content delivery networks and web browser functions. The investigation has, in two freely available DNS resolver implementations, searched for the optimal cache memory management in constrained devices on, or at the border of, the Internet of Things. By means of open source access to the programs, Unbound and PowerDNS Recursor, each of their structures have been interpreted in order to approximate and compare memory requirements. Afterwards a laboratory simulation has been made using fictitious DNS data with real-world characteristics to measure the actual memory consumption at the server process. The simulation avoided individual adaption of program settings, involvement of DNSSEC data and imposing memory constraints on the test environment. The source code analysis estimated that Unbound handled A+AAAA records more optimally while PowerDNS Recursor was more efficient for PTR records. When using both record types as a whole the measurements in the simulation showed that Unbound was able to store DNS data more densely than PowerDNS Recursor. The result has shown that the standardized wireformat for DNS data used in Unbound is less optimal than the object-based of PowerDNS Recursor. On the other hand, the study showed that Unbound which was procedurally written in the C language was able to manage the cache more sparingly than the object- oriented PowerDNS Recursor which was developed in C++. / Domännamnsystemet, DNS, utgör en fundamental del av användbarheten för Internet, men dess cachefunktion utmanas av adressers ökande storlek, antal och automatisering. Parallellt råder begränsad minneskapacitet hos vissa enheter i Internets utkant mot Internet of Things. Studien har tittat närmare på nutida behov av namnuppslagning och har då betraktat hur DNS påverkats av IPv6- adressutbredning, mobila enheter, innehållsleveransnätverk och webbläsarfunktioner. Undersökningen har i två fritt tillgängliga serverprogramvaror för DNS-uppslag sökt efter den optimala hanteringen av cache hos begränsade enheter i, eller på gränsen till, Sakernas Internet. Med hjälp av tillgången till öppen källkod för programmen, Unbound och PowerDNS Recursor, har dess respektive strukturer tolkats för att uppskatta och jämföra minnesbehov. Därefter har en simulering gjorts i en laborativ miljö med fiktiva DNS-data av verklighetstrogen karaktär för att mäta den faktiska förbrukningen av minne på DNS-serverns process. Vid simuleringen undveks att individuellt anpassa programmens inställningar, att blanda in data för DNSSEC, samt att införa minnesbegränsningar i testmiljön. Undersökningen av källkod beräknade att Unbound var mer optimalt för posttyperna A+AAAA medan PowerDNS Recursor var effektivare för posttypen PTR. För båda posttyperna som helhet visade mätningarna i simuleringen att Unbound kunde lagra DNS-data tätare än PowerDNS Recursor. Resultatet har visat att det standardiserade meddelandeformatet för DNS-data som används i Unbound är mindre optimalt än det objektbaserade i PowerDNS Recursor. Å andra sidan visades att Unbound som var procedurellt skrivet i programspråket C lyckades hushålla med cacheminnet bättre än det objektorienterade PowerDNS Recursor som utvecklats i C++.
|
Page generated in 0.1508 seconds