Integrating RFID data from various sources in a value chain is an important requirement for leveraging the full potential of the technology. To facilitate this crucial integration, the global standardization organizat...
详细信息
Integrating RFID data from various sources in a value chain is an important requirement for leveraging the full potential of the technology. To facilitate this crucial integration, the global standardization organization GS1 is currently developing a range of service specifications. Yet, the services specified so far do not enable event-based interaction schemes and do not leverage the detection of distributed complex events. In this paper we propose to fill this gap by means of a peer-to-peer based broker network that can realize event-based interaction on top of existing specifications. For this infrastructure we present a new method to improve in-network processing. As shown by our experiments, our method significantly reduces overall system load by exploiting a priori knowledge about the observed processes.
This paper proposes a decentralized algorithm for organizing an ad hoc sensor network into clusters with directional antennas. The proposed autonomous clustering scheme aims to reduce the sensing redundancy and mainta...
详细信息
This paper proposes a decentralized algorithm for organizing an ad hoc sensor network into clusters with directional antennas. The proposed autonomous clustering scheme aims to reduce the sensing redundancy and maintain sufficient sensing coverage and network connectivity in sensor networks. With directional antennas, random waiting timers, and local criterions, cluster performance may be substantially improved and sensing redundancy can be drastically suppressed. The simulation results show that the proposed scheme achieves connected coverage and provides efficient network topology management.
Information technology (IT) services are diverse and complex. Numerous service design methods have been developed for designing and developing products. However, owing to the limited availability of useful tools in IT...
详细信息
ISBN:
(纸本)9781509043149
Information technology (IT) services are diverse and complex. Numerous service design methods have been developed for designing and developing products. However, owing to the limited availability of useful tools in IT service design, these methods are ineffective. This study proposes an innovative three-dimensional method for designing IT services. The proposed method considers user requirements, an organization's business requirements, service providers' management requirements as well as the decision-making criteria of management representatives to ensure a smooth implementation of a designed IT service. Using this method, a prototype system to improve campus wireless local area network services was developed and tested at a university in Taiwan. The prototype system reduced the need for repetitive authentication and the time required to solve service problems and address user complaints. In addition, the service design team observed an approximately 70% reduction in project cycle time. The proposed method provided a systematic means to organize the design and implementation of IT services.
The development of a Broadband Computer Communications network (Breitband-Wissenschaftsnetzes "B-WiN") became increasingly necessary due to the constantly growing need of facilities in research, science and ...
详细信息
Over the last years many technological advances were introduced in Internet television to meet user needs and expectations. However due to an overwhelming bandwidth requirements traditional IP-based television service...
详细信息
ISBN:
(纸本)9780769539676
Over the last years many technological advances were introduced in Internet television to meet user needs and expectations. However due to an overwhelming bandwidth requirements traditional IP-based television service based on simple client-server approach remains restricted to small group of clients. In such situation the use of the peer-to-peer overlay paradigm to deliver live television on the Internet is gaining increasing attention. Unfortunately the current Internet infrastructure provides only best effort services for this kind of applications and do not offer quality of service. This paper is a research proposition which presents potential solutions for efficient IPTV streaming over P2P networks. We assume that the solutions will not directly modify existing P2P IPTV protocols but rather will be dedicated for a network engineer or an Internet service provider which will be able to introduce and configure the proposed mechanisms in network routers.
Beacons are the devices which are connected with any android devices using Bluetooth. This can be utilized to check the presence of a client inside premises. In many schools and colleges, the educator physically recor...
详细信息
ISBN:
(纸本)9781538644911
Beacons are the devices which are connected with any android devices using Bluetooth. This can be utilized to check the presence of a client inside premises. In many schools and colleges, the educator physically records the attendance in the class. In this paper, I am aiming at implementing a Bluetooth low energy based attendance administration framework. When the student reaches into within the range of beacon, the android app will detect the previously registered beacon devices and it establishes connection. The application is used to collect the data from the Bluetooth and store it accordingly. To ensure the credibility of the framework I am utilizing individuals checking framework through video surveillance. This technique not only enhances the use of Bluetooth but also supports the ERP for decision making.
While the Internet was designed with host-oriented networking applications, recent Internet statistics show that content-oriented traffic has become more and more dominant. Even though content-oriented networking, whi...
详细信息
ISBN:
(纸本)9781424444885
While the Internet was designed with host-oriented networking applications, recent Internet statistics show that content-oriented traffic has become more and more dominant. Even though content-oriented networking, which tries to resolve this discordance, has received increasing attention, there have been few comprehensive and quantitative studies on how to realize a content-oriented networking architecture. In this paper, we focus on the design alternatives of the content-oriented networking architecture and evaluate their performance: (i) how to locate contents, (ii) how to cache contents, and (iii) how to deliver contents. There are two major infrastructure alternatives in substantiating these mechanisms: a tree and a distributed hash table (DHT). We carry out comprehensive simulation experiments to compare these alternatives in terms of content transfer latency, cache effectiveness, and failure resilience.
QPACE is a novel massively parallel architecture optimized for lattice QCD simulations. A single QPACE node is based on the IBM PowerXCell 8i processor. The nodes are interconnected by a custom 3-dimensional torus net...
详细信息
QPACE is a novel massively parallel architecture optimized for lattice QCD simulations. A single QPACE node is based on the IBM PowerXCell 8i processor. The nodes are interconnected by a custom 3-dimensional torus network implemented on an FPGA. The compute power of the processor is provided by 8 Synergistic Processing Units. Making efficient use of these accelerator cores in scientific applications is challenging. In this paper we describe our strategies for porting applications to the QPACE architecture and report on performance numbers.
The increased application of wireless technologies including Wireless Sensor Actuator networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy effi...
详细信息
The increased application of wireless technologies including Wireless Sensor Actuator networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-ofthe- art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article is a deployment testing of the Dual-Mode Adaptive MAC (DMAMAC) protocol. DMAMAC is an energy efficient protocol recently proposed for real-time process control applications and is based on Time Division Multiple Access (TDMA) in conjunction with dual-mode operation. A main challenge in implementing DMAMAC is the use of a dynamic superframe structure. We have successfully implemented the protocol on the Zolertia Z1 platform using TinyOS(2x). Our scenario-based evaluation shows minimal packet loss and smooth mode-switch operation, thus indicating a reliable implementation of the DMAMAC protocol. (C) 2016 The Authors. Published by Elsevier B.V.
The Recursive networkarchitecture (RNA) explores the relationship of layering to protocol and networkarchitecture. RNA examines the implications of using a single, tunable protocol, called a metaprotocol, for differ...
详细信息
ISBN:
(纸本)9781424423897
The Recursive networkarchitecture (RNA) explores the relationship of layering to protocol and networkarchitecture. RNA examines the implications of using a single, tunable protocol, called a metaprotocol, for different layers of the protocol stack, reusing basic protocol operations across different protocol layers to avoid reimplementation. Its primary goal is to encourage cleaner cross-layer interaction, to support dynamic service composition, and to gain an understanding of how layering affects architecture. This paper provides a description of RNA and a recently completed initial prototype. The prototype extends the Click modular router with control capabilities including dynamic composition and discovery. These capabilities are used to demonstrate simple but flexible stacks of instances of a metaprotocol that are customizable at runtime.
暂无评论