The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Linking the communication and the information technology infrastructures forms the new Machine-to-machine (M2M) communication trend. We aim to exploit available standard protocols to support smart cities applications. In this paper, we report the work of implementing and evaluating the performance of using request/response protocols for M2M communications. The paper also introduces a mechanism to...
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where...
As migration to IPv6 occurs slowly, IPv4 and IPv6 hosts will coexist for many years. We consider a specific scenario where the legacy IPv4 systems can not be upgraded and also the new systems are IPv6. The mix of IPv4 and IPv6 machines exist in the same network and both need to interoperate. We propose a novel Translator called SBIIT (Socket identifier Based IPv4/IPv6 Translator), which is based on...
With the advent of LED lights as well as lighting systems that have communication capabilities, new lighting setups and scenarios have become possible. New standards of the ZigBee Cluster Library (ZCL) in lighting systems describe the protocols for controlling and monitoring devices in such systems. In this paper we examine the problem of bridging this ZigBee domain to the IP domain such as allowing...
This article presents an approach towards aggregating bandwidths of multiple physical layers i.e. transmitting and receiving data simultaneously through the multiple physical interfaces of a fixed computing system. The data over physical layers can communicate over both wired and wireless communication medium at the same time. This proposed bandwidth-aggregation-system (BWA) enhances the download...
Rogue wireless access points (RWAPs) bypass physical endpoint security of local area networks and present significant security threats by creating network attack vectors behind firewalls, exposing confidential information, and allowing unauthorized utilization of network resources. A family of more promising methods detects RWAPs indirectly by identifying unauthorized wireless hosts through using...
Random Early Detection (RED) algorithm, a framework of active queue management (AQM), has been proposed in order to improve the performance of congestion routers due to the increased use of Internet. But, the basic problem of a lag between congestion's occurrence and its remedy remained. To overcome this problem of RED, Explicit Congestion Notification (ECN) proposed by the IETF that allows end-to-end...
Airborne telemetry networks are an example of a wireless network domain with much higher mobility than either the Internet or MANET protocols were designed to cope with. The very high speeds and distances covered, combined with limited radio transmission power contribute to making fully-connected operation impossible in this environment. We present challenges specific to highly-dynamic airborne networks...
In order to solve the problem that wireless sensor network gateway which is arranged in forest environment can not automatically restart on power, a new-style gateway node is designed. The gateway takes NB100 launched by Crossbow as core, Debian Linux as embedded real time operating system, together with GPRS module with the built-in TCP / IP protocol and coordination node. The written Linux script...
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in network nodes. In its two-layered architecture, the General Internet Signaling Transport (GIST) protocol is responsible for the transport and routing of signaling messages. The strong presence of Network Address Translation (NAT)...
The presence of IPv4/IPv6 translation gateway provides transparent routing mechanism to IPv4-only nodes and IPv6-only nodes which trying to establish communication from disparate address realms. However, the mechanism breaks TCP/IP intrinsic functionalities that results in IPSec cannot be applied in this environment. The existing solutions to address the compatibility issues between translation gateway...
The detection of nitrite ion concentration is an important parameter of water quality testing. The nitrite ion concentration detection system based on Ethernet is designed to realise accurate and remote measurement of nitrite ion concentration. The intelligent detection node consists of electrochemical three-electrode sensor, optimizing design of constant potential detection circuit, MCU MSP430 processor...
With the fast growth of Internet, IPv4 address exhaustion is an imminent problem. IPv6 is proposed to resolve this issue. It is identified that the deployment of IPv6 will be progressive. This leads to the coexistence of IPv4 and IPv6 networks during the transition time. It is important to study how to enable communication between IPv4 only hosts and IPv6 only hosts. In this paper, we propose a new...
The TCP/IP network interface is considered a luxury feature in many embedded devices because it is expensive to implement. It requires additional hardware and complex software to enable the device to be accessible on the local area network or over the Internet. This paper describes a simple way of integrating a simplified TCP/IP stack with the Romantiki operating system. Our approach allows the user...
Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is...
Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhead and therefore wastes network bandwidth. This paper proposed the use of a novel multiplexing technique, Delta-Multiplexing, to save the wasted bandwidth. In the Delta-Multiplexing technique,...
IP multicast has proved to be the best approach for large scale multimedia communications enhancing video transmissions for applications like IPTV, video conferencing or other best-effort real-time audio/video applications. IP multicast connectivity, unfortunately, relays on certain network technologies and protocols and is present only in some areas of the Internet, while the majority of hosts lack...
With the development of computer technology, embedded TCP/IP protocol stack has become an important part of the network information intelligence. Considering the structure features of the embedded TCP/IP protocol stack, this paper discusses the specific implementation procedure of the protocol stack network interface layer. The datagram module of RTL8019AS controller and the Ethernet data sending...
The security of data which is transferred in E-business and E-Government is becoming more and more important. Using of IP security protocol can solve the reality and reliability problem, greatly improves the security of transmitted data. An IP security gateway realization is introduced in this paper.
In order to improve the efficiency of transmission for anti-virus gateway, this paper presents a new HTTP anti-virus gateway, which is called semi-proxy and based on protocol analysis. Based on the analysis of the principle of the current anti-virus gateway, this paper introduces the design principles and the key implementation techniques in detail, and finally verifies them by experiments. Experimental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.