network protocols
Recently Published Documents


TOTAL DOCUMENTS

589
(FIVE YEARS 94)

H-INDEX

29
(FIVE YEARS 4)

2022 ◽  
pp. 207-221
Author(s):  
Alamelu J. V. ◽  
Priscilla Dinkar Moyya ◽  
Mythili Asaithambi

The transformations through technological innovations have influenced the medical field. There are significant developments in medical devices in their usage. The utilization of the devices is automated in a local, remote environment. The medical devices used in the remote cyber environment uses different network protocols. These devices comprise micro, nanofabricated sensors and actuators which have the facility to communicate using network protocols. The devices that have network capability to integrate into cyberspace through physical methods are typical medical cyber physical systems (MCPS). In MCPS, medical device modelling is an important aspect. Several medical devices are available, and here in the current research, emphasis is focused on smart medical pumps in the MCPS environment. This chapter highlights the essential concepts of the smart medical drug delivery device, its architecture, control, actuation, communication, and analysis in the cyber environment.


2021 ◽  
Author(s):  
Md Arifur Rahman ◽  
Adam Flizikowski ◽  
Slawomir Pietrzyk ◽  
Md Munjure Mowla

The main aspects of this paper are to show the involvement towards coordination strategies amongst multiple RATs and integration of parametric control of higher MAC and upper layer network protocols. Moreover, we also evaluate and examine the possibility to take advantage of the fact of using interworking concepts such as lightweight Internet protocol (LWIP) and LTE-WLAN aggregation (LWA) while making the scheduling decisions. Such a solution would contribute to the software-defined networking (SDN) approach, where multi-RAT aware scheduler adapts to dynamic channel conditions to provide robustness against severe real-time channel conditions. Finally, we provide comparative analysis of multi- RAT scenarios and evaluate the QoE performance of different scheduling algorithms with SINR based information centric LWA switching and QoE-aware LWA switching by using RANC.


2021 ◽  
Author(s):  
Md Arifur Rahman ◽  
Adam Flizikowski ◽  
Slawomir Pietrzyk ◽  
Md Munjure Mowla

The main aspects of this paper are to show the involvement towards coordination strategies amongst multiple RATs and integration of parametric control of higher MAC and upper layer network protocols. Moreover, we also evaluate and examine the possibility to take advantage of the fact of using interworking concepts such as lightweight Internet protocol (LWIP) and LTE-WLAN aggregation (LWA) while making the scheduling decisions. Such a solution would contribute to the software-defined networking (SDN) approach, where multi-RAT aware scheduler adapts to dynamic channel conditions to provide robustness against severe real-time channel conditions. Finally, we provide comparative analysis of multi- RAT scenarios and evaluate the QoE performance of different scheduling algorithms with SINR based information centric LWA switching and QoE-aware LWA switching by using RANC.


Author(s):  
Eugene Tikhonov ◽  
Donat Schneps-Schneppe ◽  
Dmitry Namiot

The paper is devoted to the analysis of the effectiveness of the DTN (delay tolerant network) system in a communication network on a railway line. Trains act as moving objects that are sending and receiving messages to/from an external network. Trains may also transmit telemetry collected during movement. The article presents data on the effectiveness of the DTN network with various protocols in terms of reducing the delay in the message and telemetry delivery and in increasing the total number of delivered messages in the railway scenario. An analysis of railway lines with various loads and different coverage of mobile networks was made. These models are based on real railway maps and train schedules. The effectiveness of DTN during migration to networks of a higher data rate (5G) and networks with satellite connection of trains is discussed.


Author(s):  
Kayla Hilstob

Internet scholars are uncovering and connecting military, political and cultural histories of early internets across the globe, including in the US, (Abbate 1999), Chile (Medina 2011) and France (Mailland & Driscoll 2016), respectively. All three approaches inform this history, exploring the Canadian context. On the recommendation of US counterparts at NORAD, a top-secret whitepaper recommended Canada develop a distributed communications network (NORAD 1965), which became SAMSON: Strategic Automatic Message Switching Operational Network. SAMSON developed into an internet, though riddled with a series of setbacks beginning almost immediately, until it was disbanded in 1984. (Canadian Armed Forces 1985). This paper investigates Canada’s internet infrastructural technopolitics through Larkin’s framework of questioning how they “emerge out of and store within them forms of desire and fantasy” (2013, 329). Specifically, it asks how the design, equipment, and network protocols of this Canadian internet embodied the imaginary of Canadian independence from 1965 to 1984, drawing on primary sources from the unpublished documents of the Canadian Armed Forces that have since been declassified. The emergence of the early Canadian internet occurred during a political renewal. At a time of pushback against American and British influence, the Canadian military rejected cooperation with the US, and focused on internal threats over Cold War rivalries (Hatt 1984). By design the Canadian internet was a security apparatus, but the technopolitics embedded in the system dictate who is to be secured against whom. This paper asks how this history persists in Canada’s internet infrastructure today.


2021 ◽  
Vol 3 (3) ◽  
Author(s):  
Fatima Isiaka ◽  
Zainab Adamu

In network settings, one of the major disadvantages that threaten the network protocols is the insecurity. In most cases, unscrupulous people or bad actors can access information through unsecured connections by planting software or what we call malicious software otherwise anomalies. The presence of anomalies is also one of the disadvantages, internet users are constantly plagued by virus on their system and get activated when a harmless link is clicked on, this a case of true benign detected as false. Deep learning is very adept at dealing with such cases, but sometimes it has its own faults when dealing benign cases. Here we tend to adopt a dynamic control system (DCSYS) that addresses data packets based on benign scenario to truly report on false benign and exclude anomalies. Its performance is compared with artificial neural network auto-encoders to define its predictive power. Results show that though physical systems can adapt securely, it can be used for network data packets to identify true benign cases.


Sign in / Sign up

Export Citation Format

Share Document