networking technology
Recently Published Documents


TOTAL DOCUMENTS

303
(FIVE YEARS 77)

H-INDEX

15
(FIVE YEARS 3)

Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 113
Author(s):  
Minyue Wang ◽  
Yeming Li ◽  
Jiamei Lv ◽  
Yi Gao ◽  
Cheng Qiao ◽  
...  

The Internet of Things (IoT) interconnects massive cyber-physical devices (CPD) to provide various applications, such as smart home and smart building. Bluetooth Mesh is an emerging networking technology, which can be used to organize a massive network with Bluetooth Low Energy (BLE) devices. Managed-flooding protocol is used in Bluetooth Mesh to route the data packets. Although it is a highly desirable option when data transmission is urgent, it is inefficient in a larger and denser mesh network due to the collisions of broadcast data packets. In this paper, we introduce ACE: a Routing Algorithm based on Autonomous Channel Scheduling for Bluetooth Mesh Network. ACE relies on the existing Bluetooth Mesh messages to distribute routes without additional traffic overhead and conducts a beacon-aware routing update adaptively as the topology evolves. In ACE, BLE channel resources can be efficiently utilized by a channel scheduling scheme for each node locally and autonomously without any neighborly negotiation. We implement ACE on the nRF52840 from Nordic Semiconductor and evaluate its effectiveness on our testbed. Compared to the Bluetooth Mesh, our experiments proved that ACE could reduce the end-to-end latency by 16%, alleviate packets collisions issues, and increase the packet delivery ratio (PDR) by 30% under heavy traffic. Moreover, simulation results verified that ACE has better scalability when the size and density of networks become larger and denser.


2021 ◽  
pp. 27-31
Author(s):  
N. KOVALEVSKA

The article reveals the peculiarities of forming preschool children’s ideas about professions in the process of interaction of educators of preschool education institutions with families. The modern scientists’ research analysis gives the chance to emphasize that a kindergarten teacher needs to constantly improve the level of the pedagogical skill and to carry out a creative search of methods and forms of families’ involvement in the educational process of preschool institutions.Peculiarities of realization of modern forms of interaction of preschool educational institutions teachers with families in the process of formation of ideas about professions are covered. Various methods and forms of pedagogical education and cooperation with parents are considered, namely traditional one, which are widely and long used in the practice of preschool educational institutions, and innovative, non-traditional one.It is determined that during the formation of ideas about the profession it is necessary to follow the stages in working with parents. At the first stage, parents acquire theoretical knowledge. At the second stage, the objectives are to form parents’ pedagogical skills and abilities, to provide actualization of a family’s pedagogical potential, to help parents in education, training, and development of the child by disclosure of the maintenance, forms, methods, means of training and education. At the third stage, the analysis of efficiency of the offered system of interaction of preschool educational institutions with a family is provided.The implementation of traditional and non-traditional forms of interaction, in particular modern ICT technologies, is characterized. There is networking technology (feedback technology); educators’ personal blogs about the organization of the community of users (members of the children’s family), dissemination of educational information for children through social networks (the Facebook, the Instagram); instant messaging (Viber, WhatsApp, Skype, ICQ, Telegram); sms-mailings for informing about a certain event (for example, about the planned event) of those parents who do not have access to e-mail; online meetings of the parent committee (family club, parent conference) in the format of a Zoom conference.The effectiveness of non-traditional forms of interaction is determined. They are the following: weekend excursions, excursions into the profession during which preschool children get acquainted with new professions.


Network ◽  
2021 ◽  
Vol 1 (3) ◽  
pp. 315-334
Author(s):  
Yuan Cao ◽  
Harsha Kandula ◽  
Xinrong Li

Bluetooth low energy (BLE)-based location service technology has become one of the fastest growing applications for Bluetooth. Received signal strength (RSS) is often used in localization techniques for ranging or location fingerprinting. However, RSS-based localization solutions have poor performance in multipath environments. In this paper, we present a measurement system designed using multiple ESP32 BLE modules and the Bluetooth mesh networking technology, which is capable of exploiting the space, time, and frequency diversities in measurements. To enable channel-aware multi-device RSS measurements, we also designed a communication protocol to associate channel ID information to advertising messages. Based on channel measurement and analysis, we demonstrate that with a six-receiver configuration and space-time-frequency diversity combining, we can significantly reduce the residual linear regression fitting errors in path loss models. Such a reduction leads to more accurately correlating RSS measurements to the distance between the transmitter and receiver devices and thus to achieving improved performance with the RSS-based localization techniques. More importantly, the reduction in the fitting errors is achieved without differentiating the three advertising channels, making it possible to conveniently implement the proposed six-receiver configuration using commercially available BLE devices and the standard Bluetooth mesh networking protocol stack.


2021 ◽  
Vol 8 (10) ◽  
pp. 3228
Author(s):  
Vethunan Tamalvanan

Advancement in tele surgery or long distance telerobotic surgery is an intriguing prospect achieve equitable reach of global surgical services. In realization of this dream there are multiple of challenges as to telesurgery establishment and operation in low-and middle-income countries (LMIC). As of current market status, telesurgery is costly and not practical for the austere settings in these countries. “Telesurgery for a truly global surgery” is a realisable dream for the fore coming future. Affordable robotic surgical platforms, assistance from manufacturing companies to establish robotic platforms, introduction of 5G networking technology, international collaboration to unify efforts in telesurgery, and secure networking framework for a hassle free telesurgery network; are few formidable suggestions for implementing telesurgery in a global scale.


Author(s):  
Mitesh Chanodiya* ◽  
◽  
Dr. Manish Potey ◽  

Cloud computing facilities have become an increasing rise in demand for presenting computing sources. Various programs like monetary transactions, fitness care systems, video streaming, IoT programs want on-call for provisioning of cloud sources to guarantee timeliness and excessive availability. A shared culture for data interchange has evolved as a result of the fast progress of networking technology. The data security has become a difficult issue as a result of the vast volume of data that is exchanged via the internet. Thus there is a requirement for security to protect data that is transmitted across an insecure connection. In our proposed work, privacy, confidentiality, availability, integrity, and accountability that contribute to the security of information are ensured by cryptographic technique. This paper also describes an exhaustive study on the usage of hybrid algorithms i.e. the combination of Advanced Encryption Standards (AES) and Elliptical Curve Cryptography (ECC) to protect data leakage and protect the privacy of end-users and SHA256 algorithm to ensure data integrity. This type of hybrid encryption will help not only in concentrating software as well as physical attacks but also provide the model to deal with and prevent the application from these types of attacks; thus making the cloud application system more secure. The implemented web application can be used as a defence system for privacy and security in organizations as well as institutions where members of the organization can share the file or confidential data to other team members or colleagues without data leakage thus providing data privacy and security.


2021 ◽  
Vol 22 (2) ◽  
pp. 178-187
Author(s):  
Mutaz Hamed Hussien Khairi ◽  
PM. IR. DR. Sharifah Hafizah Syed Ariffin ◽  
PROF. MADYA DR. Nurul Muazzah Abdul Latiff ◽  
DR. Kamaludin Mohamad Yusof ◽  
Mohamed Khalalfalla Hassan

 Software Defined Networks (SDN) are a modern networking technology introduced to simplify network management via the separation of the data and control planes. Characteristically, flow entries are propagated between the control plane layer and application or data plane layers respectively while following flow table instructions through open flow protocol. More often than not, conflicts in flows occur as a result of traffic load and priority of instructions in the data plane. Several research works have been conducted on flow conflicts in SDN to reduce the effect of conflict. The flow conflict solutions in SDN have three main limitations. First, the OpenFlow table may still cause a defect in the security module according to the priority and action matching in the open flow in the control plane. Second, flow conflict detection requires more time for flow tracking and incremental update, whereas in such a case, delay affects the efficiency of SDN. Besides, the SDN algorithm and mechanism have substantially high memory requirement for instruction and proper functioning. Third, most of the available algorithms and detection methods used to avoid flow conflicts have not fully covered the security model policy. This study reviews these limitations and suggest solutions as future open research directions. ABSTRAK: Rangkaian Perisian Tertentu (SDN) adalah teknologi rangkaian moden yang diperkenalkan bagi memudahkan pengurusan rangkaian melalui pecahan data dan kawalan permukaan. Seperti biasa, aliran kemasukan disebar luas antara lapisan permukaan kawalan dan aplikasi atau lapisan permukaan data masing-masing, sambil mengikuti arahan meja melebar melalui protokol aliran terbuka. Kebiasaannya konflik dalam aliran berlaku disebabkan oleh beban trafik dan keutamaan arahan pada permukaan data. Beberapa kajian dibuat terhadap konflik aliran SDN bagi mengurangkan kesan konflik. Solusi konflik aliran dalam SDN mempunyai tiga kekurangan besar. Pertama, jadual Aliran Terbuka mungkin masih menyebabkan  kekurangan dalam modul keselamatan berdasarkan keutamaan dan tindakan persamaan dalam aliran terbuka permukaan kawalan. Kedua, pengesanan aliran konflik memerlukan lebih masa bagi pengesanan aliran dan peningkatan kemaskini, kerana setiap penangguhan memberi kesan terhadap kecekapan SDN. Selain itu, algoritma SDN dan mekanisme memerlukan memori yang agak besar bagi memproses arahan dan berfungsi dengan baik. Ketiga, kebanyakan algoritma dan kaedah pengesanan yang digunakan bagi mengelak konflik pengaliran tidak sepenuhnya dilindungi polisi model keselamatan. Oleh itu, kajian ini meneliti kekurangan dan memberi cadangan penambahbaikan bagi arah tuju kajian masa depan yang terbuka.


Author(s):  
Ahamat Ahamat ◽  
◽  
Amiruddin Amiruddin ◽  
Mohamad Sharif ◽  
Sabri Sabri ◽  
...  

With resources of MYR 564 million being invested on research and development in 2020 by the Malaysia government, it is crucial for Malaysian universities to develop an entrepreneurial ecosystem among academia. This is more significant among technical driven universities. The aim of this study is to examine the various factors that lead technology researchers to recognise and create opportunities. The case study is derived from one of Malaysia’s technology driven universities. This research adopts a qualitative method in which the data were collected from nine lecturers and researchers who were actively involved in creating innovative products and services. Semi-structured interviews and observational methods were employed with six of the respondents. In this study, an exploratory research is selected to ask open questions, in order to find out the challenges and processes of academia in shaping entrepreneurial characteristics. Qualified respondents that is directly involved in the subject of study is selected. These participants are selected academics and researchers from technology management and engineering academic backgrounds. The findings show that networking was used to get resources, and opportunities were from the policy or government interventions and events such as seminars and conferences. Most of the respondents indicate that events are great opportunities to connect with the industry and external parties. Through extensive networking, technology researchers can build various programs for new researchers so that they realize the importance of opportunities, especially in the field of technology, as it is now booming. The implication of this study reflects the university’s effort that can be viewed from the case, where self-efficacy and risk taking can be further promoted among academics who are moving from research to business venture. For the study to be conducted in the future, the researcher suggests the need to obtain a better understanding of conditions of uncertainty which shape opportunity creation and the scope of the research must be extended to other aspects. Future research should also include other institutions to see clearly the role of opportunity creation and the challenges faced by them.


Sign in / Sign up

Export Citation Format

Share Document