The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We established a regional cooperative emergency care system of ST-elevation myocardial infarction patients based on the internet of things. In this article, the current status and problems of ST-elevation myocardial infarction patient emergency care have been studied and key influence factors are found. As the results, a shorter time from symptom onset to reperfusion is achieved with improved outcomes...
It is well known that the Internet infrastructure is experiencing an ever growing demand for large file/data transfers. To date, Delay Tolerant Networking (DTN) seems as the only economically viable over-the-sea communications paradigm to support bulk data transfers between seagoing vessels and the fixed Internet. In this work, we construct an architectural prototype of this DTN overlay to connect...
The ZigBee wireless sensor network is an important supporting technology of IoT (Internet of Things). For the reason that various applications of IoT may incur heavy traffic on the network of ZigBee, and the existing methods of constructing ZigBee topology routing tree fail to consider both the link configuration and the busy-degree of the node, so the existing routing algorithm should be optimized...
As the world is moving towards the “Internet of Things” [1], Internet Protocol enabled wireless sensor network is becoming an important research area. In order to make it possible and to facilitate transmission of IPv6 packets over low powered networks, 6LoWPAN [9,11] has been introduced. 6LoWPAN incorporates an adaptation layer between network and data link layers. Two routing schemes are used in...
Many Internet users use P2P live streaming services which deliver live video contents to many users. In the services, the video content is sliced into small pieces called chunks. The peers not only receive but also send the chunks to watch the video contents. Source's load for delivering is reduced. In an Offer Select method, each peer offers sendable chunks to it's neighbors. The neighbors select...
Recently, it has been noted that the inefficiencies in peer-to-peer (P2P) overlay networks result in a large quantity of traffic among internet service providers (ISPs) or autonomous systems (ASes). To optimize cross-ISP/AS traffic, the existing approaches introduce network-aware strategies in which peers select geographically close peers as neighbors using topological information. However, each P2P...
With an increase in number of vehicles on road, applications and services offered by Intelligent Transportation System are growing in demand. However, there are still coverage and capacity limitation of wireless links that support such services. In this work, we address a new and novel concept that leverages 4G network for vehicle-to-infrastructure communications. Instead of considering on-board units...
In networked control systems, the network uncertainties can degrade the control performance and even result in instability, especially for the Internet-based control system with wireless communication in which the transmission delay could be many times of the sampling period of control systems. NPC (Networked Predictive Control) is an active method to compensate for the effects of network uncertainty...
VoIP is replacing traditional telephony system over PSTN as a more affordable communication tool on account of convergence of networks. Meanwhile, security issue brings more attention and becomes more important. SIP is based on text message. This makes the protocol easy to implement but also creates opportunity for hackers to steal or modify the messages. There exist a various approaches to secure...
There have been a number of network monitoring projects launched to cope with cyber threats in the Internet. In those projects, several types of sensors such as black hole sensor, low and high interaction honey pot, and web crawlers are deployed to analyze characteristics of attackers from various perspectives. However, there are some problems of deployment and operation of network monitoring systems,...
Predictive methods for learning network distances are often more desirable than direct performance measurements between end hosts. Yet, predicting network distances remains an open and difficult problem, as the results from a number of comparative and analytical studies have shown. From an application requirements perspective, there is significant room for improvement in achieving prediction accuracies...
Data center networks are characterized by high link speeds, low propagation delays, small switch buffers, and temporally clustered arrivals of many concurrent TCP flows fulfilling data transfer requests. However, the combination of these features can lead to transient buffer overflow and bursty packet losses, which in turn lead to TCP retransmission timeouts that degrade the performance of short-lived...
In real-time networked control systems, the end-to-end path delays on the communication network should be bounded in order to satisfy the stringent timing constraints of physical system. While the packet delivery on a single path could be significantly affected by network congestion levels, transmitting duplicate packets along multiple paths can overcome fluctuations of the time delay on a specific...
Due to diverse network latencies, participants in a Distributed Virtual Environment (DVE) may observe different inconsistency levels of the simulated virtual world, which can seriously affect fair competition among them. In this paper, we investigate how to disseminate Dead Reckoning (DR)-based updates with the objectives of achieving fairness among participants and reducing inconsistency as much...
In this paper, the fuzzy logic-based decision algorithm is proposed for queue scheduling. This algorithm is employed to determine the optimal values for achieving fairness control for each queue-type serviced. It takes into account the dynamic nature of the internet traffic as regards to its time-varying packet arrival process that affects the network states and performance. In order that the fairness...
Near Field Communication (NFC) is one of the technologies, in conjunction with Bluetooth and 6LoWPAN, which makes feasible the wireless transmission of information from small objects and sensors to Internet-enabled devices. This presents a new technological generation, denominated Internet of Things (IoT), which is able to integrate in Internet the sensors and objects located surround us. Our research...
Future Internet research activities try to increase the flexibility of the Internet. A well known approach in this area is to build protocol graphs by connecting functional blocks together. The protocol graph that should be used is the one most suitable to the application's requirements. This paper presents a Multistep Process Model to find the most suitable protocol graph. We evaluate our proposed...
Over 40 research projects are currently on-going worldwide aimed at designing the new architecture of the Internet. One of these projects — System IIP led in Poland — covers a wide spectrum of issues including network technologies, architectures, virtualization aspects, and applications. In this paper, we focus on implementation issues of network resource provisioning in System IIP, as well as on...
Optical networks have been pointed out as strong candidates to ensure energy-efficiency in the Internet backbone, as well as the distributed applications such as computational grids. In this paper, we propose a distributed framework to address energy-efficient lightpath establishment problem for computational grids over the optical WDM backbone. Each backbone node maintains two thresholds to determine...
Content Centric Networking (CCN) Architecture has been suggested to overcome weaknesses of current Internet architecture. This architecture is based on the concept of decoupling data from location and retrieving contents by name instead of location. Transport layer protocol i.e. CCNx has been proposed for use with CCN. CCNx performs longest prefix match between requested content name and entries stored...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.