The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Internet applications; IPv6; RFID and extended network; next generation service platforms for future mobile systems; ubiquitous networking; and context-aware services
The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The...
The network mobility technology in the Internet area has been discussed for a long time and the specification has been finally published as RFC3963 from IETF. We had created an actual mobile network which contains a few hundreds of nodes to prove the technology works in a real environment. We confirmed that the technology works well basically however, we faced a long service disruption while moving...
Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes...
To leverage location-related information is useful to get an in-depth perspective on environmental circumstances, traffic situations and/or other problems. To handle the large number of information and queries communication devices issue, some scalable mechanism must be required. In this paper, we propose a peer-to-peer network system called "Mill" which can efficiently handle information...
In this paper, we introduce the compressed HDTV over IPv6 system, applications, and its experiment in IPv6 network between Korea and China. We developed the compressed HDTV over IPv6 system which requires 20-25Mbps with MPEG2. The system use 720/30p or 1080i HDTV format and support IPv4/IPv6 and unicast/multicast. The compressed HDTV system provides high quality audio and video with relatively small...
Video communication is being popular by spreading broadband networks. Realization of this kind of communications is important to deploy IPv6. However, many almost of commercial video conference systems do not work in IPv6 networks. We developed an application gateway called as "PTGATE" to extend available scenes of video conferences. PTGATE has three functions: IPv4 over IPv6 tunneling to...
Establishing secure channels between a pair of hosts is an attractive way when the direct exchange of important data is required. IPsec provides various security services for traffic at the IP layer so we can use it to establish secure channels between a pair of hosts. However, IPsec is difficult to use because there are many parameters to set up for secure channels, and the configuration is complicated,...
There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication between...
During the course to deploy IPv6, we found several critical implementation and operational issues which distract user and possibly prevent wider deployment of IPv6. Among the problems we noticed, domain name system (DNS) related issues are significant. Some of the problems cause longer delay during the process to make a connection to a given node. In worst case, the delay is 60 seconds or more. This...
For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas are positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed, trying to address the problem of reader collision and also the problem of RFID devices interfering with other...
The study and analysis of RFID antenna positioning is important for supply chain large-scale deployment. In a dense reader environment, there are multiples of RFID readers and readers interference reduces the reliability and efficiency of the RFID system. In the worst case, the interference would paralyse an entire RFID system. This paper explores antenna positioning in an RFID deployment zone and...
This paper analyzes the power consumption of an RFID tag and presents a new architecture of a low-power baseband-processor for this special passive tag. The tag consists of a power reception system, an emitter/receiver analog module, an EEPROM and a low-power baseband-processor, compatible with the newest EPCtrade C1G2 UHF RFID protocol. Meanwhile some novel and advanced low-power technologies are...
The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme which...
In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach...
A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databases...
The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outline the characteristics of the RFID domain that impact the performance of such transmission schemes and compare four different transmission strategies. A novel technique introduced in this paper that recursively estimates...
Peer-to-peer systems allowing fast and easy search for information shared by the users of a communication network, are considered to have a huge impact on next generation mobile service platforms. To support applications that employ content categories or limit services to certain contexts more efficiently, we describe a hierarchical P2P system in this paper. In particular, our system introduces hierarchies...
This paper describes the implementation and evaluation of a method of multiple path distribution of traffic based on delay-jitter. Multiple path communication is designed to conform to the speed and reliability of wireless communication through the simultaneous use of multiple Internet link mobile hosts and by dispersing the traffic between mobile hosts and a correspondent host. The performance of...
Wireless hotspots and broadband coverage are permeating the globe giving rise to interesting spontaneous networking scenarios. The discovery and delivery of the most relevant and suitable services in a spontaneous network is a problem of paramount importance. In this paper, we propose an architecture that can support context-aware service discovery and delivery for resource-constrained mobile devices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.