Sample records for internet protocol ip-based

  1. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...

  2. Internet and Intranet Use with a PC: Effects of Adapter Cards, Windows Versions and TCP/IP Software on Networking Performance.

    ERIC Educational Resources Information Center

    Nieuwenhuysen, Paul

    1997-01-01

    Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…

  3. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...

  4. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  5. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  6. 78 FR 54201 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...

  7. 47 CFR 64.613 - Numbering directory for Internet-based TRS users.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the user's Internet Protocol (IP) address. For each record associated with an IP Relay user, the URI... a VRS user's geographically appropriate NANP telephone number, the URI shall contain the IP address of the user's device. For each record associated with an IP Relay user's geographically appropriate...

  8. Aerospace physiology.

    DOT National Transportation Integrated Search

    2004-01-01

    This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...

  9. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...

  10. Bandwidth Management in Resource Constrained Networks

    DTIC Science & Technology

    2012-03-01

    Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching

  11. Internet-Based Partner Services in US Sexually Transmitted Disease Prevention Programs: 2009-2013.

    PubMed

    Moody, Victoria; Hogben, Matthew; Kroeger, Karen; Johnson, James

    2015-01-01

    Social networking sites have become increasingly popular venues for meeting sex partners. Today, some sexually transmitted disease (STD) programs conduct Internet-based partner services (IPS). The purpose of the study was to explore how the Internet is being used by STD prevention programs to perform partner services. We assessed US STD prevention programs receiving funds through the 2008-2013 Comprehensive STD Prevention Systems cooperative agreement. We (1) reviewed 2009 IPS protocols in 57 funding applications against a benchmark of national guidelines and (2) surveyed persons who conducted IPS in jurisdictions conducting IPS in 2012. Of the 57 project areas receiving Comprehensive STD Prevention Systems funds, 74% provided an IPS protocol. States with IPS protocols had larger populations and more gonorrhea and syphilis cases (t = 2.2-2.6; all Ps < .05), although not higher rates of infection. Most protocols included staffing (92%) and IPS documentation (87%) requirements, but fewer had evaluation plans (29%) or social networking site engagement strategies (16%). Authority to perform a complete range of IPS activities (send e-mail, use social networking sites) was associated with contacting more partners via IPSs (P < .05). This study provides a snapshot of IPS activities in STD programs in the United States. Further research is needed to move from assessment to generating data that can assist training efforts and program action and, finally, to enable efficient IPS programs that are integrated into STD prevention and control efforts.

  12. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  13. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  14. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  15. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  16. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  17. Internet Telephony

    DTIC Science & Technology

    1999-12-01

    compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- 󈨞s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not

  18. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...

  19. Space Internet-Embedded Web Technologies Demonstration

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2001-01-01

    The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.

  20. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  1. Continued Development of Internet Protocols under the IBM OS/MVS Operating System

    DTIC Science & Technology

    1985-01-25

    developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP

  2. 78 FR 55696 - Request for Comment on Petition Filed by Purple Communications, Inc. Regarding the Provision of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...

  3. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  4. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    ERIC Educational Resources Information Center

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  5. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...

  6. 106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink

    DTIC Science & Technology

    2017-07-31

    Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit

  7. 75 FR 26701 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... Services (CTS), Internet Protocol (IP) CTS, IP Relay, and Video Relay Services (VRS), for the 2010-2011... comment on NECA's proposed compensation rates for TRS, STS, CTS, IP CTS, IP Relay, and VRS, for the 2010... interstate traditional TRS; $3.1566 for STS; $1.6951 for CTS and IP CTS; $1.2985 for IP Relay. Based on these...

  8. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    ERIC Educational Resources Information Center

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  9. Experience with Delay-Tolerant Networking from Orbit

    NASA Technical Reports Server (NTRS)

    Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.

    2010-01-01

    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol

  10. Open Source Cybersecurity for the 21st Century

    DTIC Science & Technology

    2013-03-01

    would eventually develop into Transmission Control Protocol/Internet Protocol ( TCP /IP) based on the following ground rules:12  Each distinct...The internet’s design permits any device conforming to modern day protocol standards ( TCP /IP being the most prevalent) to communicate across the... factors , coupled with the internet’s global reach and low cost of entry, are what make securing the cyber domain one of the most complex challenges we

  11. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  12. Use of IPsec by Manned Space Missions

    NASA Technical Reports Server (NTRS)

    Pajevski, Michael J.

    2009-01-01

    NASA's Constellation Program is developing its next generation manned space systems for missions to the International Space Station (ISS) and the Moon. The Program is embarking on a path towards standards based Internet Protocol (IP) networking for space systems communication. The IP based communications will be paired with industry standard security mechanisms such as Internet Protocol Security (IPsec) to ensure the integrity of information exchanges and prevent unauthorized release of sensitive information in-transit. IPsec has been tested in simulations on the ground and on at least one Earth orbiting satellite, but the technology is still unproven in manned space mission situations and significant obstacles remain.

  13. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  14. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  15. Running TCP/IP over ATM Networks.

    ERIC Educational Resources Information Center

    Witt, Michael

    1995-01-01

    Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)

  16. Telemedicine using free voice over internet protocol (VoIP) technology.

    PubMed

    Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H

    2011-01-01

    Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.

  17. 78 FR 76097 - Request for Comment on Petition Filed by Sprint Corporation for Reconsideration of Certain Rules...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...

  18. Impact of VoIP and QoS on Open and Distance Learning

    ERIC Educational Resources Information Center

    Saxena, P. C.; Jasola, Sanjay; Sharma, Ramesh C.

    2006-01-01

    Voice over Internet Protocol (VoIP) is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support…

  19. Network Analysis with SiLK

    DTIC Science & Technology

    2015-01-06

    Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol

  20. Improving Service Management in the Internet of Things

    PubMed Central

    Sammarco, Chiara; Iera, Antonio

    2012-01-01

    In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).

  1. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    PubMed Central

    Watzlaf, Valerie R.; Ondich, Briana

    2012-01-01

    Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194

  2. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  3. Effects of the Voice over Internet Protocol on Perturbation Analysis of Normal and Pathological Phonation

    PubMed Central

    Zhu, Yanmei; Witt, Rachel E.; MacCallum, Julia K.; Jiang, Jack J.

    2010-01-01

    Objective In this study, a Voice over Internet Protocol (VoIP) communication based on G.729 protocol was simulated to determine the effects of this system on acoustic perturbation parameters of normal and pathological voice signals. Patients and Methods: Fifty recordings of normal voice and 48 recordings of pathological voice affected by laryngeal paralysis were transmitted through a VoIP communication system. The acoustic analysis programs of CSpeech and MDVP were used to determine the percent jitter and percent shimmer from the voice samples before and after VoIP transmission. The effects of three frequently used audio compression protocols (MP3, WMA, and FLAC) on the perturbation measures were also studied. Results It was found that VoIP transmission disrupts the waveform and increases the percent jitter and percent shimmer of voice samples. However, after VoIP transmission, significant discrimination between normal and pathological voices affected by laryngeal paralysis was still possible. It was found that the lossless compression method FLAC does not exert any influence on the perturbation measures. The lossy compression methods MP3 and WMA increase percent jitter and percent shimmer values. Conclusion This study validates the feasibility of these transmission and compression protocols in developing remote voice signal data collection and assessment systems. PMID:20588051

  4. How To: Be VoIP-Savvy

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2005-01-01

    Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…

  5. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  6. 76 FR 14662 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... (STS) based on the Multi-state Average Rate Structure (MARS) plan proposed by Hamilton Relay, Inc., (2... intrastate Internet-Protocol (IP) Captioned Telephone Service (IP CTS) based on the MARS plan, (3) a cost... with the MARS plan cost recovery methodology for compensation from the Fund. Specifically, TRS...

  7. The Internet and Education: Some Lessons on Privacy and Pitfalls.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1997-01-01

    Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…

  8. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  9. Adaptation technology between IP layer and optical layer in optical Internet

    NASA Astrophysics Data System (ADS)

    Ji, Yuefeng; Li, Hua; Sun, Yongmei

    2001-10-01

    Wavelength division multiplexing (WDM) optical network provides a platform with high bandwidth capacity and is supposed to be the backbone infrastructure supporting the next-generation high-speed multi-service networks (ATM, IP, etc.). In the foreseeable future, IP will be the predominant data traffic, to make fully use of the bandwidth of the WDM optical network, many attentions have been focused on IP over WDM, which has been proposed as the most promising technology for new kind of network, so-called Optical Internet. According to OSI model, IP is in the 3rd layer (network layer) and optical network is in the 1st layer (physical layer), so the key issue is what adaptation technology should be used in the 2nd layer (data link layer). In this paper, firstly, we analyze and compare the current adaptation technologies used in backbone network nowadays. Secondly, aiming at the drawbacks of above technologies, we present a novel adaptation protocol (DONA) between IP layer and optical layer in Optical Internet and describe it in details. Thirdly, the gigabit transmission adapter (GTA) we accomplished based on the novel protocol is described. Finally, we set up an experiment platform to apply and verify the DONA and GTA, the results and conclusions of the experiment are given.

  10. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  11. Network Quality of Service Monitoring for IP Telephony.

    ERIC Educational Resources Information Center

    Ghita, B. V.; Furnell, S. M.; Lines, B. M.; Le-Foll, D.; Ifeachor, E. C.

    2001-01-01

    Discusses the development of real-time applications on the Internet for telecommunications and presents a non-intrusive way of determining network performance parameters for voice packet flows within a voice over IP (Internet Protocol), or Internet telephony call. Considers measurement of quality of service and describes results of a preliminary…

  12. VoIP to the Rescue

    ERIC Educational Resources Information Center

    Milner, Jacob

    2005-01-01

    Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…

  13. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  14. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.

  15. On Representative Spaceflight Instrument and Associated Instrument Sensor Web Framework

    NASA Technical Reports Server (NTRS)

    Kizhner, Semion; Patel, Umeshkumar; Vootukuru, Meg

    2007-01-01

    Sensor Web-based adaptation and sharing of space flight mission resources, including those of the Space-Ground and Control-User communication segment, could greatly benefit from utilization of heritage Internet Protocols and devices applied for Spaceflight (SpaceIP). This had been successfully demonstrated by a few recent spaceflight experiments. However, while terrestrial applications of Internet protocols are well developed and understood (mostly due to billions of dollars in investments by the military and industry), the spaceflight application of Internet protocols is still in its infancy. Progress in the developments of SpaceIP-enabled instrument components will largely determine the SpaceIP utilization of those investments and acceptance in years to come. Likewise SpaceIP, the development of commercial real-time and instrument colocated computational resources, data compression and storage, can be enabled on-board a spacecraft and, in turn, support a powerful application to Sensor Web-based design of a spaceflight instrument. Sensor Web-enabled reconfiguration and adaptation of structures for hardware resources and information systems will commence application of Field Programmable Arrays (FPGA) and other aerospace programmable logic devices for what this technology was intended. These are a few obvious potential benefits of Sensor Web technologies for spaceflight applications. However, they are still waiting to be explored. This is because there is a need for a new approach to spaceflight instrumentation in order to make these mature sensor web technologies applicable for spaceflight. In this paper we present an approach in developing related and enabling spaceflight instrument-level technologies based on the new concept of a representative spaceflight Instrument Sensor Web (ISW).

  16. A decentralized software bus based on IP multicas ting

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd

    1995-01-01

    We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.

  17. The Effects of Pushing the Digital Divide to the Fighting Hole

    DTIC Science & Technology

    2006-02-03

    information technologies (IT), and new ways of horizontally fusing information across the battlespace...The opportunity to exploit this new “digital...brought technology , such as the Internet Protocol (IP), to the forefront. It is incumbent upon the leaders of the communications community to ensure...in a recent interview with SIGNAL magazine: In terms of potential, I see the fundamental technologies associated with Internet Protocol (IP

  18. From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans

    DTIC Science & Technology

    2014-06-01

    Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any

  19. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  20. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  1. ROVER: A DNS-Based Method to Detect and Prevent IP Hijacks

    ERIC Educational Resources Information Center

    Gersch, Joseph E.

    2013-01-01

    The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…

  2. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  3. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  4. Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection

    DTIC Science & Technology

    2003-06-01

    Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA

  5. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  6. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  7. Internet over the VDL-2 Subnetwork: the VDL-2/IP Aviation Datalink System

    NASA Technical Reports Server (NTRS)

    Grappel, R. D.

    2000-01-01

    This report describes the design to operate the standard Internet communications protocols (IP) over the VHF aviation Data Link Mode 2 (VDL-2) subnetwork. The VDL-2/IP system specified in this report can operate transparently with the current aviation users of VDL-2 (Airline Communications and Reporting System, ACARS and Aeronautical Telecommunications Network, ATN) and proposed users (Flight Information Service via Broadcast, FIS-B). The VDL-2/IP system provides a straightforward mechanisms to utilize inexpensive, commercial off-the-shelf (COTS) communications packages developed for the Internet as part of the aviation datalink system.

  8. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  9. Demonstrating a Realistic IP Mission Prototype

    NASA Technical Reports Server (NTRS)

    Rash, James; Ferrer, Arturo B.; Goodman, Nancy; Ghazi-Tehrani, Samira; Polk, Joe; Johnson, Lorin; Menke, Greg; Miller, Bill; Criscuolo, Ed; Hogie, Keith

    2003-01-01

    Flight software and hardware and realistic space communications environments were elements of recent demonstrations of the Internet Protocol (IP) mission concept in the lab. The Operating Missions as Nodes on the Internet (OMNI) Project and the Flight Software Branch at NASA/GSFC collaborated to build the prototype of a representative space mission that employed unmodified off-the-shelf Internet protocols and technologies for end-to-end communications between the spacecraft/instruments and the ground system/users. The realistic elements used in the prototype included an RF communications link simulator and components of the TRIANA mission flight software and ground support system. A web-enabled camera connected to the spacecraft computer via an Ethernet LAN represented an on-board instrument creating image data. In addition to the protocols at the link layer (HDLC), transport layer (UDP, TCP), and network (IP) layer, a reliable file delivery protocol (MDP) at the application layer enabled reliable data delivery both to and from the spacecraft. The standard Network Time Protocol (NTP) performed on-board clock synchronization with a ground time standard. The demonstrations of the prototype mission illustrated some of the advantages of using Internet standards and technologies for space missions, but also helped identify issues that must be addressed. These issues include applicability to embedded real-time systems on flight-qualified hardware, range of applicability of TCP, and liability for and maintenance of commercial off-the-shelf (COTS) products. The NASA Earth Science Technology Office (ESTO) funded the collaboration to build and demonstrate the prototype IP mission.

  10. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  11. The ROI of VoIP: Everybody Says VoIP Saves Big Bucks. But Does It?

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    Advocates of Voice over Internet Protocol (VoIP) say it saves money on long distance calls by sending them over the Internet, improves communication by eliminating the Private Branch Exchange (PBX), and offers a host of neat features such as call forwarding, e-mail accessible voicemail, and more. When it comes to measuring the dollars-and-cents…

  12. ACTS 118x: High Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.

  13. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  14. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  15. Enhanced International Space Station Ku-Band Telemetry Service

    NASA Technical Reports Server (NTRS)

    Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason

    2014-01-01

    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.

  16. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  17. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  18. Research into alternative network approaches for space operations

    NASA Technical Reports Server (NTRS)

    Kusmanoff, Antone L.; Barton, Timothy J.

    1990-01-01

    The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.

  19. Secure Networks for First Responders and Special Forces

    NASA Technical Reports Server (NTRS)

    2005-01-01

    When NASA needed help better securing its communications with orbiting satellites, the Agency called on Western DataCom Co., Inc., to help develop a prototype Internet Protocol (IP) router. Westlake, Ohio-based Western DataCom designs, develops, and manufactures hardware that secures voice, video, and data transmissions over any IP-based network. The technology that it jointly developed with NASA is now serving as a communications solution in military and first-response situations.

  20. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  1. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  2. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  3. Multiformat decoder for a DSP-based IP set-top box

    NASA Astrophysics Data System (ADS)

    Pescador, F.; Garrido, M. J.; Sanz, C.; Juárez, E.; Samper, D.; Antoniello, R.

    2007-05-01

    Internet Protocol Set-Top Boxes (IP STBs) based on single-processor architectures have been recently introduced in the market. In this paper, the implementation of an MPEG-4 SP/ASP video decoder for a multi-format IP STB based on a TMS320DM641 DSP is presented. An initial decoder for PC platform was fully tested and ported to the DSP. Using this code an optimization process was started achieving a 90% speedup. This process allows real-time MPEG-4 SP/ASP decoding. The MPEG-4 decoder has been integrated in an IP STB and tested in a real environment using DVD movies and TV channels with excellent results.

  4. A Conjoint Analysis of Voice Over IP Attributes.

    ERIC Educational Resources Information Center

    Zubey, Michael L.; Wagner, William; Otto, James R.

    2002-01-01

    Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…

  5. Intranets: Just Another Bandwagon?

    ERIC Educational Resources Information Center

    Lynch, Gary

    1997-01-01

    Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…

  6. 75 FR 13235 - IP-Enabled Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  7. Final system design document.

    DOT National Transportation Integrated Search

    2009-02-01

    The Next Generation 9-1-1 (NG9-1-1) Initiative is a research and development project funded by the US Department of Transportation (USDOT) to define the framework and plan to deploy Internet Protocol (IP)-based emergency communications across the nat...

  8. Mobile-ip Aeronautical Network Simulation Study

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  9. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOEpatents

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  10. Space-Based Telemetry and Range Safety (STARS) Study

    NASA Technical Reports Server (NTRS)

    Hogie, Keith; Crisuolo, Ed; Parise, Ron

    2004-01-01

    This presentation will describe the design, development, and testing of a system to collect telemetry, format it into UDP/IP packets, and deliver it to a ground test range using standard IP technologies over a TDRSS link. This presentation will discuss the goal of the STARS IP Formatter along with the overall design. It will also present performance results of the current version of the IP formatter. Finally, it will discuss key issues for supporting constant rate telemetry data delivery when using standard components such as PCI/104 processors, the Linux operating system, Internet Protocols, and synchronous serial interfaces.

  11. VoIP in a Campus Environment

    ERIC Educational Resources Information Center

    Young, Dan

    2005-01-01

    Internet Protocol (IP) Telephony, or voice-over IP (VoIP), has proved to be a wise decision for many organizations. This technology crosses the boundaries of public and private networks, enterprise and residential markets, voice and data technologies, as well as local and long-distance services. The convergence of voice and data into a single,…

  12. Voice over internet protocol with prepaid calling card solutions

    NASA Astrophysics Data System (ADS)

    Gunadi, Tri

    2001-07-01

    The VoIP technology is growing up rapidly, it has big network impact on PT Telkom Indonesia, the bigger telecommunication operator in Indonesia. Telkom has adopted VoIP and one other technology, Intelligent Network (IN). We develop those technologies together in one service product, called Internet Prepaid Calling Card (IPCC). IPCC is becoming new breakthrough for the Indonesia telecommunication services especially on VoIP and Prepaid Calling Card solutions. Network architecture of Indonesia telecommunication consists of three layer, Local, Tandem and Trunck Exchange layer. Network development researches for IPCC architecture are focus on network overlay hierarchy, Internet and PSTN. With this design hierarchy the goal of Interworking PSTN, VoIP and IN calling card, become reality. Overlay design for IPCC is not on Trunck Exchange, this is the new architecture, these overlay on Tandem and Local Exchange, to make the faster call processing. The nodes added: Gateway (GW) and Card Management Center (CMC) The GW do interfacing between PSTN and Internet Network used ISDN-PRA and Ethernet. The other functions are making bridge on circuit (PSTN) with packet (VoIP) based and real time billing process. The CMC used for data storage, pin validation, report activation, tariff system, directory number and all the administration transaction. With two nodes added the IPCC service offered to the market.

  13. Use of the Delay-Tolerant Networking Bundle Protocol from Space

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex

    2009-01-01

    The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.

  14. SEnviro: a sensorized platform proposal using open hardware and open standards.

    PubMed

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-03-06

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and theWeb of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented.

  15. SEnviro: A Sensorized Platform Proposal Using Open Hardware and Open Standards

    PubMed Central

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-01-01

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and the Web of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented. PMID:25756864

  16. Network Upgrade for the SLC: Control System Modifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Mackenzie, R.; Sass, R.

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  17. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space experiment. A second Internet connection at the demonstration area was implemented to provide Internet connectivity to a group of workstations to serve as platforms for controlling the simulated space experiment. Installation of this Internet connection was coordinated with an Internet service provider (ISP) and local NASA Johnson Space Center personnel. Not only did this TCP/IP-based architecture prove that a principal investigator on the Internet can securely command and control on-orbit assets, it also demonstrated that valuable virtual testing of planned on-orbit activities can be conducted over the Internet prior to actual deployment in space.

  18. 47 CFR 54.503 - Other supported special services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...

  19. Mobile Router Developed and Tested

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2002-01-01

    The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP subnetworks. This is essential in many wireless networks. A mobile router, unlike a mobile IP node, allows entire networks to roam. Hence, a device connected to the mobile router does not need to be a mobile node because the mobile router provides the roaming capabilities. There are three basic elements in the mobile IP: the home agent, the foreign agent, and the mobile node. The home agent is a router on a mobile node's home network that tunnels datagrams for delivery to the mobile node when it is away from home. The foreign agent is a router on a remote network that provides routing services to a registered mobile node. The mobile node is a host or router that changes its point of attachment from one network or subnetwork to another. In mobile routing, virtual communications are maintained by the home agent, which forwards all packets for the mobile networks to the foreign agent. The foreign agent passes the packets to the mobile router, which then forwards the packets to the devices on its networks. As the mobile router moves, it will register with its home agent on its whereabouts via the foreign agent to assure continuous connectivity.

  20. OSI and TCP/IP

    NASA Technical Reports Server (NTRS)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  1. 78 FR 78319 - Media Bureau Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips AGENCY: Federal... captioning of video clips delivered by Internet protocol (``IP''), including the extent to which industry has voluntarily captioned IP- delivered video clips. The Commission directed the Media Bureau to issue this...

  2. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... of 2010 (CVAA), which requires each provider of interconnected voice over Internet protocol (VoIP) service or non-interconnected VoIP service to begin participating in and contributing to the interstate... [[Page 65966

  3. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  4. 78 FR 39619 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...

  5. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  6. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  7. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  8. Technology: Cookies, Web Profilers, Social Network Cartography, and Proxy Servers

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…

  9. CoAP-Based Mobility Management for the Internet of Things

    PubMed Central

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-01-01

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214

  10. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  11. 77 FR 25088 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ... Commission's rules to interconnected Voice over Internet Protocol (VoIP) service providers and defers action... to outages resulting from complete loss of service and only to interconnected VoIP services... obligations of interconnected VoIP service providers. DATES: The rules in this document contain information...

  12. 47 CFR 52.34 - Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and from interconnected VoIP or Internet-based TRS providers. 52.34 Section 52.34 Telecommunication... Portability § 52.34 Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS providers. (a) An interconnected VoIP or VRS or IP Relay provider must facilitate an end-user...

  13. 47 CFR 52.34 - Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... and from interconnected VoIP or Internet-based TRS providers. 52.34 Section 52.34 Telecommunication... Portability § 52.34 Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS providers. (a) An interconnected VoIP or VRS or IP Relay provider must facilitate an end-user...

  14. Deployment of 802.15.4 Sensor Networks for C4ISR Operations

    DTIC Science & Technology

    2006-06-01

    43 Figure 20.MSP410CA Dense Grid Monitoring (Crossbow User’s Manual, 2005). ....................................44 Figure 21.(a)MICA2 without...Deployment of Sensor Grid (COASTS OPORD, 2006). ...56 Figure 27.Topology View of Two Nodes and Base Station .......57 Figure 28.Nodes Employing Multi...Random Access Memory TCP/IP Transmission Control Protocol/Internet Protocol TinyOS Tiny Micro Threading Operating System UARTs Universal

  15. Surveillance Jumps on the Network

    ERIC Educational Resources Information Center

    Raths, David

    2011-01-01

    Internet protocol (IP) network-based cameras and digital video management software are maturing, and many issues that have surrounded them, including bandwidth, data storage, ease of use, and integration are starting to become clearer as the technology continues to evolve. Prices are going down and the number of features is going up. Many school…

  16. The 10 Hottest Technologies in Telecom.

    ERIC Educational Resources Information Center

    Flanagan, Patrick

    1997-01-01

    Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…

  17. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP... waivers for one year because the record demonstrates that it is technologically infeasible for VRS and IP... standards for VRS and IP Relay will expire on July 1, 2011, or until the Commission addresses pending...

  18. 76 FR 40729 - Sunshine Act Meeting; Open Commission Meeting; Tuesday, July 12, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-11

    ... Requirements (PS Docket Bureau. No. 07-114); E911 Requirements for IP-Enabled Service Providers (WC Docket No. 05-196); and Amending the Definition of Interconnected VoIP Service in Section 9.3 of the Commission..., including Voice over Internet Protocol (VoIP). Reforms to certain of the Commission's procedural rules took...

  19. 78 FR 53684 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ... eligibility in order to get a free IP CTS device should be made under penalty of perjury; whether to prohibit the free or significantly subsidized distribution of end user equipment by IP CTS providers; whether... and restrictions on rewards and free equipment. 4. Legal Authority. Section 225(b) of the Act directs...

  20. Technology: Technology and Common Sense

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The absence of common sense in the world of technology continues to amaze the author. Things that seem so logical to just aren nott for many people. The installation of Voice-over IP (VoIP, with IP standing for Internet Protocol) in many school districts is a good example. Schools have always had trouble with telephones. Many districts don't even…

  1. ATM QoS Experiments Using TCP Applications: Performance of TCP/IP Over ATM in a Variety of Errored Links

    NASA Technical Reports Server (NTRS)

    Frantz, Brian D.; Ivancic, William D.

    2001-01-01

    Asynchronous Transfer Mode (ATM) Quality of Service (QoS) experiments using the Transmission Control Protocol/Internet Protocol (TCP/IP) were performed for various link delays. The link delay was set to emulate a Wide Area Network (WAN) and a Satellite Link. The purpose of these experiments was to evaluate the ATM QoS requirements for applications that utilize advance TCP/IP protocols implemented with large windows and Selective ACKnowledgements (SACK). The effects of cell error, cell loss, and random bit errors on throughput were reported. The detailed test plan and test results are presented herein.

  2. ISS and STS Commercial Off-the-Shelf Router Testing

    NASA Technical Reports Server (NTRS)

    Ivancie, William D.; Bell, Terry L.; Shell, Dan

    2002-01-01

    This report documents the results of testing performed with commercial off-the-shelf (COTS) routers and Internet Protocols (IPs) to determine if COTS equipment and IP could be utilized to upgrade NASA's current Space Transportation System (STS), the Shuttle, and the International Space Station communication infrastructure. Testing was performed by NASA Glenn Research Center (GRC) personnel within the Electronic Systems Test Laboratory (ESTE) with cooperation from the Mission Operations Directorate (MOD) Qualification and Utilization of Electronic System Technology (QUEST) personnel. The ESTE testing occurred between November 1 and 9, 2000. Additional testing was performed at NASA Glenn Research Center in a laboratory environment with equipment configured to emulate the STS. This report documents those tests and includes detailed test procedures, equipment interface requirements, test configurations and test results. The tests showed that a COTS router and standard Transmission Control Protocols and Internet Protocols (TCP/IP) could be used for both the Shuttle and the Space Station if near-error-free radio links are provided.

  3. WebTag: Web browsing into sensor tags over NFC.

    PubMed

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.

  4. WebTag: Web Browsing into Sensor Tags over NFC

    PubMed Central

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Álvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm. PMID:23012511

  5. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    PubMed Central

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  6. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    PubMed

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  7. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  8. Using a Simple, Free Voice-over-Internet Protocol Service to Add Interest to Lectures and Enhance Student Engagement

    ERIC Educational Resources Information Center

    Beaton, Susan J.; Forster, Peter M.

    2013-01-01

    A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…

  9. Privacy/Security Policy

    Science.gov Websites

    automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system

  10. Design of real-time voice over internet protocol system under bandwidth network

    NASA Astrophysics Data System (ADS)

    Zhang, Li; Gong, Lina

    2017-04-01

    With the increasing bandwidth of the network and network convergence accelerating, VoIP means of communication across the network is becoming increasingly popular phenomenon. The real-time identification and analysis for VOIP flow over backbone network become the urgent needs and research hotspot of network operations management. Based on this, the paper proposes a VoIP business management system over backbone network. The system first filters VoIP data stream over backbone network and further resolves the call signaling information and media voice. The system can also be able to design appropriate rules to complete real-time reduction and presentation of specific categories of calls. Experimental results show that the system can parse and process real-time backbone of the VoIP call, and the results are presented accurately in the management interface, VoIP-based network traffic management and maintenance provide the necessary technical support.

  11. 47 CFR 52.34 - Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... and from interconnected VoIP or Internet-based TRS providers. 52.34 Section 52.34 Telecommunication... Portability § 52.34 Obligations regarding local number porting to and from interconnected VoIP or Internet... customer's or a Registered Internet-based TRS User's valid number portability request, as it is defined in...

  12. 47 CFR 52.34 - Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... and from interconnected VoIP or Internet-based TRS providers. 52.34 Section 52.34 Telecommunication... Portability § 52.34 Obligations regarding local number porting to and from interconnected VoIP or Internet... customer's or a Registered Internet-based TRS User's valid number portability request, as it is defined in...

  13. 47 CFR 52.34 - Obligations regarding local number porting to and from interconnected VoIP or Internet-based TRS...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and from interconnected VoIP or Internet-based TRS providers. 52.34 Section 52.34 Telecommunication... Portability § 52.34 Obligations regarding local number porting to and from interconnected VoIP or Internet... customer's or a Registered Internet-based TRS User's valid number portability request, as it is defined in...

  14. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  15. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  16. Optimization of OSPF Routing in IP Networks

    NASA Astrophysics Data System (ADS)

    Bley, Andreas; Fortz, Bernard; Gourdin, Eric; Holmberg, Kaj; Klopfenstein, Olivier; Pióro, Michał; Tomaszewski, Artur; Ümit, Hakan

    The Internet is a huge world-wide packet switching network comprised of more than 13,000 distinct subnetworks, referred to as Autonomous Systems (ASs) autonomous system AS . They all rely on the Internet Protocol (IP) internet protocol IP for transport of packets across the network. And most of them use shortest path routing protocols shortest path routing!protocols , such as OSPF or IS-IS, to control the routing of IP packets routing!of IP packets within an AS. The idea of the routing is extremely simple — every packet is forwarded on IP links along the shortest route between its source and destination nodes of the AS. The AS network administrator can manage the routing of packets in the AS by supplying the so-called administrative weights of IP links, which specify the link lengths that are used by the routing protocols for their shortest path computations. The main advantage of the shortest path routing policy is its simplicity, allowing for little administrative overhead. From the network engineering perspective, however, shortest path routing can pose problems in achieving satisfactory traffic handling efficiency. As all routing paths depend on the same routing metric routing!metric , it is not possible to configure the routing paths for the communication demands between different pairs of nodes explicitly or individually; the routing can be controlled only indirectly and only as a whole by modifying the routing metric. Thus, one of the main tasks when planning such networks is to find administrative link weights that induce a globally efficient traffic routing traffic!routing configuration of an AS. It turns out that this task leads to very difficult mathematical optimization problems. In this chapter, we discuss and describe exact integer programming models and solution approaches as well as practically efficient smart heuristics for such shortest path routing problems shortest path routing!problems .

  17. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  18. Architectural and engineering issues for building an optical Internet

    NASA Astrophysics Data System (ADS)

    St. Arnaud, Bill

    1998-10-01

    Recent developments in high density Wave Division Multiplexing fiber systems allows for the deployment of a dedicated optical Internet network for large volume backbone pipes that does not require an underlying multi-service SONET/SDH and ATM transport protocol. Some intrinsic characteristics of Internet traffic such as its self similar nature, server bound congestion, routing and data asymmetry allow for highly optimized traffic engineered networks using individual wavelengths. By transmitting GigaBit Ethernet or SONET/SDH frames natively over WDM wavelengths that directly interconnect high performance routers the original concept of the Internet as an intrinsically survivable datagram network is possible. Traffic engineering, restoral, protection and bandwidth management of the network must now be carried out at the IP layer and so new routing or switching protocols such as MPLS that allow for uni- directional paths with fast restoral and protection at the IP layer become essential for a reliable production network. The deployment of high density WDM municipal and campus networks also gives carriers and ISPs the flexibility to offer customers as integrated and seamless set of optical Internet services.

  19. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  20. Achieving quality of service in IP networks

    NASA Astrophysics Data System (ADS)

    Hays, Tim

    2001-07-01

    The Internet Protocol (IP) has served global networks well, providing a standardized method to transmit data among many disparate systems. But IP is designed for simplicity, and only enables a `best effort' service that can be subject to delays and loss of data. For data networks, this is an acceptable trade-off. In the emerging world of convergence, driven by new applications such as video streaming and IP telephony, minimizing latency and packet loss as well as jitter can be critical. Simply increasing the size of the IP network `pipe' to meet those demands is not always sufficient. In this environment, vendors and standards bodies are endeavoring to create technologies and techniques to enable IP to improve the quality of service it can provide, while retaining the characteristics that has enabled it to become the dominant networking protocol.

  1. Voice Over Internet Protocol (VoIP) in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pirani, Joseph; Calvelage, Steven

    2010-01-01

    The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.

  2. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  3. 78 FR 8090 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... communicate in a manner that is functionally equivalent to communication by conventional voice telephone users... actually need the service to communicate in a manner that is functionally equivalent to communication by... equivalent to communication by conventional voice telephone users. In fact, the unobtrusive nature of IP CTS...

  4. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  5. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  6. Enhancing Online Education Using Collaboration Solutions

    ERIC Educational Resources Information Center

    Ge, Shuzhi Sam; Tok, Meng Yong

    2003-01-01

    With the advances in Internet technologies, online education is fast gaining ground as an extension to traditional education. Webcast allows lectures conducted on campus to be viewed by students located at remote sites by streaming the audio and video content over Internet Protocol (IP) networks. However when used alone, webcast does not provide…

  7. CALEA: Prepare for the Worst, Hope for the Best

    ERIC Educational Resources Information Center

    Wigen, Wendy

    2006-01-01

    On August 5, 2005, nearly a year since requesting public comment on the issue, the Federal Communications Commission (FCC) voted to extend the Communications Assistance for Law Enforcement Act (CALEA) to broadband Internet and interconnected Voice-over-Internet Protocol (VoIP) providers. This includes college and university campus networks, as…

  8. Using a CLIPS expert system to automatically manage TCP/IP networks and their components

    NASA Technical Reports Server (NTRS)

    Faul, Ben M.

    1991-01-01

    A expert system that can directly manage networks components on a Transmission Control Protocol/Internet Protocol (TCP/IP) network is described. Previous expert systems for managing networks have focused on managing network faults after they occur. However, this proactive expert system can monitor and control network components in near real time. The ability to directly manage network elements from the C Language Integrated Production System (CLIPS) is accomplished by the integration of the Simple Network Management Protocol (SNMP) and a Abstract Syntax Notation (ASN) parser into the CLIPS artificial intelligence language.

  9. Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.

  10. 47 CFR 64.606 - Internet-based TRS provider and TRS program certification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... of Internet-based TRS to be provided (i.e., VRS, IP Relay, and/or IP captioned telephone relay... IP Relay providers certified under this section must notify the Commission of substantive changes in...

  11. Optical burst switching for the next generation Optical Internet

    NASA Astrophysics Data System (ADS)

    Yoo, Myungsik

    2000-11-01

    In recent years, Internet Protocol (IP) over Wavelength Division Multiplexing (WDM) networks for the next generation Internet (or the so-called Optical Internet) have received enormous attention. There are two main drivers for an Optical Internet. One is the explosion of Internet traffic, which seems to keep growing exponentially. The other driver is the rapid advance in the WDM optical networking technology. In this study, key issues in the optical (WDM) layer will be investigated. As a novel switching paradigm for Optical Internet, Optical Burst Switching (OBS) is discussed. By leveraging the attractive properties of optical communications and at the same time, taking into account its limitations, OBS can combine the best of optical circuit-switching and packet/cell switching. The general concept of JET-based OBS protocol is described, including offset time and delayed reservation. In the next generation Optical Internet, one must address how to support Quality of Service (QoS) at the WDM layer since current IP provides only best effort services. The offset-time- based QoS scheme is proposed as a way of supporting QoS at the WDM layer. Unlike existing QoS schemes, offset- time-based QoS scheme does not mandate the use of buffer to differentiate services. For the bufferless WDM switch, the performance of offset- time-based QoS scheme is evaluated in term of blocking probability. In addition, the extra offset time required for class isolation is quantified and the theoretical bounds on blocking probability are analyzed. The offset-time-based scheme is applied to WDM switch with limited fiber delay line (FDL) buffer. We evaluate the effect of having a FDL buffer on the QoS performance of the offset-time-based scheme in terms of the loss probability and queuing delay of bursts. Finally, in order to dimension the network resources in Optical Internet backbone networks, the performance of the offset-time-based QoS scheme is evaluated for the multi-hop case. In particular, we consider very high performance Backbone Network Service (vBNS) backbone network. Various policies such as drop, retransmission, deflection routing and buffering are considered for performance evaluation. The performance results obtained under these policies are compared to decide the most efficient policy for the WDM backbone network.

  12. Aeronautical Related Applications Using ATN and TCP/IP Research Report

    NASA Technical Reports Server (NTRS)

    Dhas, C.; Mulkerin, T.; Wargo, C.; Nielsen, R.; Gaughan, T.; Griner, James H., Jr. (Technical Monitor)

    2000-01-01

    The course for the future aeronautical communications architecture has been defined for more than 10 years and is known as the Aeronautical Telecommunication Network (ATN). However, the operational implementations of making use of the ATN remain 3-5 years away, and these implementations are still only in the early phases of long-range projects. Thus, it is an objective of this effort to consider what the potential outcome within the air transport industry may be, given the rapid growth in commercial-off-the-shelf (COTS) products, networks, and services that are based upon the Internet TCP/IP protocol suite.

  13. Design and Characterization of a Secure Automatic Dependent Surveillance-Broadcast Prototype

    DTIC Science & Technology

    2015-03-26

    during the thesis process. Thank you to Mr. Dave Prentice of AFRL for providing the Aeroflex IFR 6000 baseband signals, upon which many design decisions...35 25 Example Aeroflex IFR 6000 signal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 26...Global Positioning System HDL hardware description language I in-phase IFR Instrument Flight Rules IP Internet Protocol IP intellectual property IPSec

  14. Research on an IP disaster recovery storage system

    NASA Astrophysics Data System (ADS)

    Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng

    2008-12-01

    According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.

  15. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  16. One Server Fits All

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    The benefits of deploying a communications system that runs over the Internet Protocol are well documented. Sending voice over the Internet, a process commonly known as VoIP, has been shown to save money on long distance calls, make voice mail more accessible, and enable users to answer their phones from anywhere. The technology also makes adding…

  17. Packet flow monitoring tool and method

    DOEpatents

    Thiede, David R [Richland, WA

    2009-07-14

    A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

  18. Internet Technology for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  19. Application of Mobile-ip to Space and Aeronautical Networks

    NASA Technical Reports Server (NTRS)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  20. 47 CFR 52.35 - Porting Intervals.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... “telecommunications carrier” includes an interconnected Voice over Internet Protocol (VoIP) provider as that term in... ports” includes (i) Wireline-to-wireless ports; (ii) Wireless-to-wireline ports; and (iii) Ports...

  1. Experimental GMPLS-Based Provisioning for Future All-Optical DPRing-Based MAN

    NASA Astrophysics Data System (ADS)

    Mu�oz, Ra�l; V�ctor Mart�nez Rivera, Ricardo; Sorribes, Jordi; Junyent Giralt, Gabriel

    2005-10-01

    Given the abundance and strategic importance of ring fiber plants in metropolitan area networks (MANs), and the accelerating growth of Internet traffic, it is crucial to extend the existing Internet protocol (IP)-based generalized multiprotocol label switching (GMPLS) framework to provision dynamic wavelength division multiplexing (WDM) optical rings. Nevertheless, the emerging GMPLS-based lightpath provisioning does not cover the intricacies of optical rings. No GMPLS standard exists for optical add-drop multiplexer (OADM) rings, relying instead upon proprietary static solution. The objective of this paper is to propose and evaluate novel GMPLS-based lightpath signaling and wavelength reservation schemes specifically designed for dedicated protection ring (DPRing)-based MANs. Performance evaluation has been carried out in a GMPLS-based testbed named ADRENALINE.

  2. Fingerprinting Software Defined Networks and Controllers

    DTIC Science & Technology

    2015-03-01

    24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined

  3. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.

  4. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  5. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    PubMed Central

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-01

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109

  6. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    PubMed

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  7. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  8. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  9. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  10. Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David

    2003-09-01

    As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, whichmore » determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept were developed, and results from this research were transferred to industry via standards in the Optical Internetworking Forum (OIF).« less

  11. Talk Is Cheap: Skype Can Make VoIP a Very Real Communication Option for Your School

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2007-01-01

    There have been many tools that people can use to get connected with each other worldwide. Cell phones, blogs, wikis, podcasts, e-mail--the world hinges upon people's ability to connect, share, collaborate, and communicate. Voice over Internet Protocol (VoIP) is another tool schools can use to help their students get connected with the world. One…

  12. IP over fiber technologies: ATM/POS/SDL

    NASA Astrophysics Data System (ADS)

    Jin, Depeng; Zeng, Lieguang

    2001-10-01

    The explosive growth of Internet traffic has created the need to transport IP over high-speed links such as fiber. Three main IP over fiber technologies have been developed: ATM, POS and SDL. As ATM has been widely researched and developed, this paper mainly discusses the POS and SDL. POS is a traditional mapping method of packets, and this paper presents the realization state machine of POS and analyzes the Probability of Packet Loss. SDL is a new framing protocol for variable/fixed length of packet, which extends the HEC-liking framing mechanism used in ATM. This paper analyzes this new protocol and gives the performance results such as MTTF and PFP. Finally, the comparison of POS and SDL is provided.

  13. Design and implementation of a VoIP broadcasting service over embedded systems in a heterogeneous network environment.

    PubMed

    Leu, Jenq-Shiou; Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source-Linphone-in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation.

  14. Design and Implementation of a VoIP Broadcasting Service over Embedded Systems in a Heterogeneous Network Environment

    PubMed Central

    Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source—Linphone—in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation. PMID:25300280

  15. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  16. Transition plan.

    DOT National Transportation Integrated Search

    2009-02-02

    Although the 9-1-1 system has been a success for nearly 40 years, changes in the publics use of : technology, the saturation of the mobile market, and the spread of Voice over Internet Protocol (VoIP) : telephony over broadband are contributing to...

  17. The Interplanetary Internet: A Communications Infrastructure for Mars Exploration

    NASA Astrophysics Data System (ADS)

    Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.

    2002-01-01

    A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5

  18. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  19. Multisites Coordination in Shared Multicast Trees

    DTIC Science & Technology

    1999-01-01

    conferencing, distributed interactive simulations, and collaborative systems. We de- scribe a novel protocol to coordinate multipoint groupwork in the IP...multicast framework. The pro- tocol supports Internet-wide coordination for large and highly-interactive groupwork , relying on trans- mission of

  20. Security in the Cache and Forward Architecture for the Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.

    The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.

  1. TCP/IP Interface for the Satellite Orbit Analysis Program (SOAP)

    NASA Technical Reports Server (NTRS)

    Carnright, Robert; Stodden, David; Coggi, John

    2009-01-01

    The Transmission Control Protocol/ Internet protocol (TCP/IP) interface for the Satellite Orbit Analysis Program (SOAP) provides the means for the software to establish real-time interfaces with other software. Such interfaces can operate between two programs, either on the same computer or on different computers joined by a network. The SOAP TCP/IP module employs a client/server interface where SOAP is the server and other applications can be clients. Real-time interfaces between software offer a number of advantages over embedding all of the common functionality within a single program. One advantage is that they allow each program to divide the computation labor between processors or computers running the separate applications. Secondly, each program can be allowed to provide its own expertise domain with other programs able to use this expertise.

  2. Identifying Effectiveness Criteria for Internet Payment Systems.

    ERIC Educational Resources Information Center

    Shon, Tae-Hwan; Swatman, Paula M. C.

    1998-01-01

    Examines Internet payment systems (IPS): third-party, card, secure Web server, electronic token, financial electronic data interchange (EDI), and micropayment based. Reports the results of a Delphi survey of experts identifying and classifying IPS effectiveness criteria and classifying types of IPS providers. Includes the survey invitation letter…

  3. Transition to an IP Environment. A Report of the Annual Aspen Institute Conference on Telecommunications Policy (15th, Aspen, Colorado, August 12-16, 2000) with Thoughts on the Implications of Technological Change for Telecommunications Policy.

    ERIC Educational Resources Information Center

    Entman, Robert M.; Katz, Michael L.

    The Aspen Institute's Communications and Society Program convened leaders and experts in the telecommunications and related fields to address telecommunications regulation in an IP (Internet Protocols) environment at the 15th annual Aspen Institute Telecommunications Policy Conference (Aspen, Colorado, August 12-16, 2000). The report from this…

  4. Internet Technology on Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current approaches. The cost to implement is much less than current approaches due to the availability of highly reliable and standard Internet tools. Use of standard Internet applications onboard reduces the risk of obsolescence inherent in custom protocols due to extremely wide use across all domains. These basic building blocks provide the framework for building onboard software to support direct user communication with payloads including payload control. Other benefits are payload to payload communication from dissimilar spacecraft, constellations of spacecraft, and reconfigurability on orbit. This work is funded through contract with the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC).

  5. Leo Satellite Communication through a LEO Constellation using TCP/IP Over ATM

    NASA Technical Reports Server (NTRS)

    Foore, Lawrence R.; Konangi, Vijay K.; Wallett, Thomas M.

    1999-01-01

    The simulated performance characteristics for communication between a terrestrial client and a Low Earth Orbit (LEO) satellite server are presented. The client and server nodes consist of a Transmission Control Protocol /Internet Protocol (TCP/IP) over ATM configuration. The ATM cells from the client or the server are transmitted to a gateway, packaged with some header information and transferred to a commercial LEO satellite constellation. These cells are then routed through the constellation to a gateway on the globe that allows the client/server communication to take place. Unspecified Bit Rate (UBR) is specified as the quality of service (QoS). Various data rates are considered.

  6. Traffic-engineering-aware shortest-path routing and its application in IP-over-WDM networks [Invited

    NASA Astrophysics Data System (ADS)

    Lee, Youngseok; Mukherjee, Biswanath

    2004-03-01

    Single shortest-path routing is known to perform poorly for Internet traffic engineering (TE) where the typical optimization objective is to minimize the maximum link load. Splitting traffic uniformly over equal-cost multiple shortest paths in open shortest path first and intermediate system-intermediate system protocols does not always minimize the maximum link load when multiple paths are not carefully selected for the global traffic demand matrix. However, a TE-aware shortest path among all the equal-cost multiple shortest paths between each ingress-egress pair can be selected such that the maximum link load is significantly reduced. IP routers can use the globally optimal TE-aware shortest path without any change to existing routing protocols and without any serious configuration overhead. While calculating TE-aware shortest paths, the destination-based forwarding constraint at a node should be satisfied, because an IP router will forward a packet to the next hop toward the destination by looking up the destination prefix. We present a mathematical problem formulation for finding a set of TE-aware shortest paths for the given network as an integer linear program, and we propose a simple heuristic for solving large instances of the problem. Then we explore the usage of our proposed algorithm for the integrated TE method in IP-over-WDM networks. The proposed algorithm is evaluated through simulations in IP networks as well as in IP-over-WDM networks.

  7. CTC Sentinel. Volume 2, Issue 4, April 2009. Defining the Punjabi Taliban Network

    DTIC Science & Technology

    2009-04-01

    Province (which has better educational facilities) and urban linkages where internet access and communications equipment are more readily available...calls by using Voice over Internet Protocol (VoIP) technology. sending an e-mail from Afghanistan explaining why he was fighting jihad.49 One of...ascendancy to power and collaborative approach represents to al-Qa`ida’s legitimacy. President Bush’s controversial policies and public persona

  8. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  9. NG9-1-1 preliminary transition plan.

    DOT National Transportation Integrated Search

    2008-04-01

    Although the 9-1-1 system has been an unqualified success story for more than 30 years, changes in the : publics use of technology, the saturation of the mobile market, and the spread of Voice over Internet : Protocol (VoIP) telephony over broadba...

  10. A randomized waitlist-controlled pilot trial of voice over Internet protocol-delivered behavior therapy for youth with chronic tic disorders.

    PubMed

    Ricketts, Emily J; Goetz, Amy R; Capriotti, Matthew R; Bauer, Christopher C; Brei, Natalie G; Himle, Michael B; Espil, Flint M; Snorrason, Ívar; Ran, Dagong; Woods, Douglas W

    2016-04-01

    Comprehensive Behavioral Intervention for Tics (CBIT) has been shown to be efficacious for chronic tic disorders (CTDs), but utilization is limited by a lack of treatment providers and perceived financial and time burden of commuting to treatment. A promising alternative to in-person delivery is voice over Internet protocol (VoIP), allowing for remote, real-time treatment delivery to patients' homes. However, little is known about the effectiveness of VoIP for CTDs. Therefore, the present study examined the preliminary efficacy, feasibility, and acceptability of VoIP-delivered CBIT (CBIT-VoIP). Twenty youth (8-16 years) with CTDs participated in a randomized, waitlist-controlled pilot trial of CBIT-VoIP. The main outcome was pre- to post-treatment change in clinician-rated tic severity (Yale Global Tic Severity Scale). The secondary outcome was clinical responder rate (Clinical Global Impressions - Improvement Scale), assessed using ratings of 'very much improved' or 'much improved' indicating positive treatment response. Intention-to-treat analyses with the last observation carried forward were performed. At post-treatment (10-weeks), significantly greater reductions in clinician-rated, (F(1,18) = 3.05, p < 0.05, partial η(2 )= 0.15), and parent-reported tic severity, (F(1,18) = 6.37, p < 0.05, partial η(2 )= 0.26) were found in CBIT-VoIP relative to waitlist. One-third (n = 4) of those in CBIT-VoIP were considered treatment responders. Treatment satisfaction and therapeutic alliance were high. CBIT can be delivered via VoIP with high patient satisfaction, using accessible, low-cost equipment. CBIT-VoIP was generally feasible to implement, with some audio and visual challenges. Modifications to enhance treatment delivery are suggested. © The Author(s) 2015.

  11. Speech transport for packet telephony and voice over IP

    NASA Astrophysics Data System (ADS)

    Baker, Maurice R.

    1999-11-01

    Recent advances in packet switching, internetworking, and digital signal processing technologies have converged to allow realizable practical implementations of packet telephony systems. This paper provides a tutorial on transmission engineering for packet telephony covering the topics of speech coding/decoding, speech packetization, packet data network transport, and impairments which may negatively impact end-to-end system quality. Particular emphasis is placed upon Voice over Internet Protocol given the current popularity and ubiquity of IP transport.

  12. Networks - The Air Force’s Newest Weapon Systems

    DTIC Science & Technology

    2006-02-17

    Force networks. Marshall T. Rose, The Simple Book: An Introduction to Management of TCP/IP based internets, (Englewood Cliffs, New Jersey: Prentice...18 November 2005 19. Rose, Marshall T. The Simple Book: An Introduction to Management of TCP/IP based internets, (Englewood Cliffs, New Jersey

  13. Computer Networks and Information Warfare: Implications for Military Operations

    DTIC Science & Technology

    2000-07-01

    specifically referring to this network.” Marshall T. Rose, The Simple Book: An Introduction to Management of TCP/IP based internets (Englewood...Cliffs, New Jersey: Prentice Hall, 1991), p. 2. 22. Marshall T. Rose, The Simple Book: An Introduction to Management of TCP/IP based internets

  14. Management of ATM-based networks supporting multimedia medical information systems

    NASA Astrophysics Data System (ADS)

    Whitman, Robert A.; Blaine, G. James; Fritz, Kevin; Goodgold, Ken; Heisinger, Patrick

    1997-05-01

    Medical information systems are acquiring the ability to collect and deliver many different types of medical information. In support of the increased network demands necessitated by these expanded capabilities, asynchronous transfer mode (ATM) based networks are being deployed in medical care systems. While ATM supplies a much greater line rate than currently deployed networks, the management and standards surrounding ATM are yet to mature. This paper explores the management and control issues surrounding an ATM network supporting medical information systems, and examines how management impacts network performance and robustness. A multivendor ATM network at the BJC Health System/Washington University and the applications using the network are discussed. Performance information for specific applications is presented and analyzed. Network management's influence on application reliability is outlined. The information collected is used to show how ATM network standards and management tools influence network reliability and performance. Performance of current applications using the ATM network is discussed. Special attention is given to issues encountered in implementation of hypertext transfer protocol over ATM internet protocol (IP) communications. A classical IP ATM implementation yields greater than twenty percent higher network performance over LANE. Maximum performance for a host's suite of applications can be obtained by establishing multiple individually engineered IP links through its ATM network connection.

  15. The design of a new laser acupuncture instrument based on internet

    NASA Astrophysics Data System (ADS)

    Li, Chengwei; Liu, Jiguang; Huang, Zhen; Jin, Zhigao

    2006-06-01

    Laser acupuncture defined as the stimulation of traditional acupuncture points with low-intensity, non-thermal laser irradiation and the therapeutic use of laser acupuncture is rapidly gaining in popularity. As recovery instrument, physiotherapy instrument has a long curing period but perfect curative effect; furthermore, the treatment scheme needs to he revised on the basis of exchanges between patients and medical staff. In this paper a new laser acupuncture instrument based on Internet is designed. This multi-functional visual physiotherapy system based on embedded TCP/IP protocol, is further developed, which can realize visual real-time communication between patients and doctors with the help of Internet. Patients can enjoy professional medical care at home. Therefore, the equipment is suitable to those where specialists are needed; such as villages, towns, communities, small private clinics, and those families applicable. For such equipment, the key is to design an embedded networked module. The solution of this paper is to design the Ethernet interface based on DSP.

  16. TCP Performance Enhancement Over Iridium

    NASA Technical Reports Server (NTRS)

    Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James

    2007-01-01

    In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.

  17. Simple Automatic File Exchange (SAFE) to Support Low-Cost Spacecraft Operation via the Internet

    NASA Technical Reports Server (NTRS)

    Baker, Paul; Repaci, Max; Sames, David

    1998-01-01

    Various issues associated with Simple Automatic File Exchange (SAFE) are presented in viewgraph form. Specific topics include: 1) Packet telemetry, Internet IP networks and cost reduction; 2) Basic functions and technical features of SAFE; 3) Project goals, including low-cost satellite transmission to data centers to be distributed via an Internet; 4) Operations with a replicated file protocol; 5) File exchange operation; 6) Ground stations as gateways; 7) Lessons learned from demonstrations and tests with SAFE; and 8) Feedback and future initiatives.

  18. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment

    DTIC Science & Technology

    2005-01-01

    the cargo manifest can be either a 56K modem-based TCP/IP connection (the oval labeled internet) or a 40K wireless modem connection ( cell phone ) that...via a UDP connection on the 40K wireless modem ( cell phone ). For each resource, either alternative may be used to achieve the same goal, but some...Manifests Comm-in Comp- power Comm- out JTF Internet (TCP-IP) Cell phone (TCP-IP) Internet (UDP) Cell phone (UDP) Manual Computer 4

  19. Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service

    DTIC Science & Technology

    2007-12-07

    MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status

  20. 47 CFR 54.500 - Terms and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and state agencies that provides free or reduced price lunches to economically disadvantaged children... Management and Budget is eligible for a free lunch. (j) Pre-discount price. The “pre-discount price” means... service such as cellular, interconnected voice over Internet protocol (VoIP), and the circuit capacity...

  1. A Descriptive Model of Information Problem Solving while Using Internet

    ERIC Educational Resources Information Center

    Brand-Gruwel, Saskia; Wopereis, Iwan; Walraven, Amber

    2009-01-01

    This paper presents the IPS-I-model: a model that describes the process of information problem solving (IPS) in which the Internet (I) is used to search information. The IPS-I-model is based on three studies, in which students in secondary and (post) higher education were asked to solve information problems, while thinking aloud. In-depth analyses…

  2. BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borges, Raymond; Patton, Robert M; Kettani, Houssain

    2011-01-01

    There is a large amount of illegal content being replicated through peer-to-peer (P2P) networks where BitTorrent is dominant; therefore, a framework to profile and police it is needed. The goal of this work is to explore the behavior of initial seeds and highly active peers to develop techniques to correctly identify them. We intend to establish a new methodology and software framework for profiling BitTorrent peers. This involves three steps: crawling torrent indexers for keywords in recently added torrents using Really Simple Syndication protocol (RSS), querying torrent trackers for peer list data and verifying Internet Protocol (IP) addresses from peermore » lists. We verify IPs using active monitoring methods. Peer behavior is evaluated and modeled using bitfield message responses. We also design a tool to profile worldwide file distribution by mapping IP-to-geolocation and linking to WHOIS server information in Google Earth.« less

  3. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  4. Quality of Service in Networks Supporting Cultural Multimedia Applications

    ERIC Educational Resources Information Center

    Kanellopoulos, Dimitris N.

    2011-01-01

    Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…

  5. Audio/ Videoconferencing Packages: Low Cost

    ERIC Educational Resources Information Center

    Treblay, Remy; Fyvie, Barb; Koritko, Brenda

    2005-01-01

    A comparison was conducted of "Voxwire MeetingRoom" and "iVocalize" v4.1.0.3, both Web-conferencing products using voice-over-Internet protocol (VoIP) to provide unlimited, inexpensive, international audio communication, and high-quality Web-conferencing fostering collaborative learning. The study used the evaluation criteria used in earlier…

  6. A native IP satellite communications system

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner-Puschl, S.; Riedler, W.

    2004-08-01

    ≪ In the framework of ESA's ARTES-5 program the Institute of Applied Systems Technology (Joanneum Research) in cooperation with the Department of Communications and Wave Propagation has developed a novel meshed satellite communications system which is optimised for Internet traffic and applications (L*IP—Local Network Interconnection via Satellite Systems Using the IP Protocol Suite). Both symmetrical and asymmetrical connections are supported. Bandwidth on demand and guaranteed quality of service are key features of the system. A novel multi-frequency TDMA access scheme utilises efficient methods of IP encapsulation. In contrast to other solutions it avoids legacy transport network techniques. While the DVB-RCS standard is based on ATM or MPEG transport cells, the solution of the L*IP system uses variable-length cells which reduces the overhead significantly. A flexible and programmable platform based on Linux machines was chosen to allow the easy implementation and adaptation to different standards. This offers the possibility to apply the system not only to satellite communications, but provides seamless integration with terrestrial fixed broadcast wireless access systems. The platform is also an ideal test-bed for a variety of interactive broadband communications systems. The paper describes the system architecture and the key features of the system.

  7. Speech perception benefits of internet versus conventional telephony for hearing-impaired individuals.

    PubMed

    Mantokoudis, Georgios; Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco; Senn, Pascal

    2012-07-16

    Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3-3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1-8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%-53%), 10.6% (4%-46%), and 8.8% (7%-33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and were 36% (P = .001) for cochlear implant users, 18% (P = .002) for hearing aid users, and 53% (P = .001) for normal-hearing adults. With a packet loss of 10%, the maximum benefits were 30% (P = .002) for cochlear implant users, 6% (P = .38) for hearing aid users, and 33% (P = .002) for normal-hearing adults. VoIP offers a speech perception benefit over conventional telephone quality, even when mild or moderate packet loss scenarios are created in the laboratory. VoIP, therefore, has the potential to significantly improve telecommunication abilities for the large community of hearing-impaired individuals.

  8. Speech Perception Benefits of Internet Versus Conventional Telephony for Hearing-Impaired Individuals

    PubMed Central

    Dubach, Patrick; Pfiffner, Flurin; Kompis, Martin; Caversaccio, Marco

    2012-01-01

    Background Telephone communication is a challenge for many hearing-impaired individuals. One important technical reason for this difficulty is the restricted frequency range (0.3–3.4 kHz) of conventional landline telephones. Internet telephony (voice over Internet protocol [VoIP]) is transmitted with a larger frequency range (0.1–8 kHz) and therefore includes more frequencies relevant to speech perception. According to a recently published, laboratory-based study, the theoretical advantage of ideal VoIP conditions over conventional telephone quality has translated into improved speech perception by hearing-impaired individuals. However, the speech perception benefits of nonideal VoIP network conditions, which may occur in daily life, have not been explored. VoIP use cannot be recommended to hearing-impaired individuals before its potential under more realistic conditions has been examined. Objective To compare realistic VoIP network conditions, under which digital data packets may be lost, with ideal conventional telephone quality with respect to their impact on speech perception by hearing-impaired individuals. Methods We assessed speech perception using standardized test material presented under simulated VoIP conditions with increasing digital data packet loss (from 0% to 20%) and compared with simulated ideal conventional telephone quality. We monaurally tested 10 adult users of cochlear implants, 10 adult users of hearing aids, and 10 normal-hearing adults in the free sound field, both in quiet and with background noise. Results Across all participant groups, mean speech perception scores using VoIP with 0%, 5%, and 10% packet loss were 15.2% (range 0%–53%), 10.6% (4%–46%), and 8.8% (7%–33%) higher, respectively, than with ideal conventional telephone quality. Speech perception did not differ between VoIP with 20% packet loss and conventional telephone quality. The maximum benefits were observed under ideal VoIP conditions without packet loss and were 36% (P = .001) for cochlear implant users, 18% (P = .002) for hearing aid users, and 53% (P = .001) for normal-hearing adults. With a packet loss of 10%, the maximum benefits were 30% (P = .002) for cochlear implant users, 6% (P = .38) for hearing aid users, and 33% (P = .002) for normal-hearing adults. Conclusions VoIP offers a speech perception benefit over conventional telephone quality, even when mild or moderate packet loss scenarios are created in the laboratory. VoIP, therefore, has the potential to significantly improve telecommunication abilities for the large community of hearing-impaired individuals. PMID:22805169

  9. Overview of NASA Glenn Aero/Mobile Communications Demonstrations

    NASA Technical Reports Server (NTRS)

    Brooks, David; Hoder, Doug; Wilkins, Ryan

    2004-01-01

    The Glenn Research Center at Lewis Field (GRC) has been involved with several other NASA field centers on various networking and RF communications demonstrations and experiments since 1998. These collaborative experiments investigated communications technologies new to aviation, such as wideband Ku satcom, L-band narrowband satcom, and IP (Internet Protocol), using commercial off-the-shelf (COTS) components These technologies can be used to distribute weather and hazard data, air traffic management and airline fleet management information, and passenger cabin Internet service.

  10. Overview of NASA Glenn Aero/Mobile Communication Demonstrations

    NASA Technical Reports Server (NTRS)

    Brooks, David; Hoder, Doug; Wilkins, Ryan

    2004-01-01

    The Glenn Research Center at Lewis Field (GRC) has been involved with several other NASA field centers on various networking and RF communications demonstrations and experiments since 1998. These collaborative experiments investigated communications technologies new to aviation, such as wideband Ku satcom, L-band narrowband satcom, and IP (Internet Protocol), using commercial off-the-shelf (COTS) components These technologies can be used to distribute weather and hazard data, air traffic management and airline fleet management information, and passenger cabin Internet service.

  11. Secure, Network-Centric Operations of a Space-Based Asset: Cisco Router in Low Earth Orbit (CLEO) and Virtual Mission Operations Center (VMOC)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric

    2005-01-01

    This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.

  12. 78 FR 8030 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Copy and Printing, Inc., Portals II, 445 12th Street, SW., Room CY-B402, Washington, DC 20554... . To request materials in accessible formats for people with disabilities (Braille, large print..., 127 F.3d 90, 94 (DC Cir. 1997) (``an interpretive rule can construe an agency's substantive regulation...

  13. We'll Take It from Here: Further Developments We'd Like To See in Virtual Reference Software.

    ERIC Educational Resources Information Center

    Coffman, Steven

    2001-01-01

    Discussion of virtual reference services focuses on software that is currently available and further developments that are needed. Topics include co-browsing and collaboration capabilities; communications technology, including chat technology and voice over Internet protocol (VoIP); networked reference services; and online reference collections…

  14. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    NASA Astrophysics Data System (ADS)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.

  15. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    NASA Technical Reports Server (NTRS)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated independently as a simplex link. Without negotiation, the COTS routers are prevented from entering into the IP header compression mode, and no IP header compression would be performed. An algorithm is proposed to enable IP header compression in COTS routers on a simplex link with no negotiation or with a one-way messaging. In doing so, COTS routers can enter IP header compression mode without the need to handshake through a bidirectional link as required by FRF.20. This technique would spoof the routers locally and thereby allow the routers to enter into IP header compression mode without having the negotiations between routers actually occur. The spoofing function is conducted by a frame relay adapter (also COTS) with the capability to generate control messages according to the FRF.20 descriptions. Therefore, negotiation is actually performed between the FRF.20 adapter and the connecting COTS router locally and never occurs over the space link. Through understanding of the handshaking protocol described by FRF.20, the necessary FRF.20 negotiations messages can be generated to control the connecting router, not only to turn on IP header compression but also to adjust the compression parameters. The FRF.20 negotiation (or control) message is composed in the FRF.20 adapter by interpreting the incoming router request message. Many of the fields are simply transcribed from request to response while the control field indicating response and type are modified.

  16. 47 CFR 64.611 - Internet-based TRS registration.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... number assigned or issued to any Registered Internet-based TRS User. (e) Toll free numbers. A VRS or IP... effective date of this Order remove from the Internet-based TRS Numbering Directory any toll free number... 47 Telecommunication 3 2012-10-01 2012-10-01 false Internet-based TRS registration. 64.611 Section...

  17. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eli Dart; Helen Chen; Jerry Friesen

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM ismore » connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.« less

  18. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  19. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  20. Achieving High Throughput for Data Transfer over ATM Networks

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.; Townsend, Jeffrey N.

    1996-01-01

    File-transfer rates for ftp are often reported to be relatively slow, compared to the raw bandwidth available in emerging gigabit networks. While a major bottleneck is disk I/O, protocol issues impact performance as well. Ftp was developed and optimized for use over the TCP/IP protocol stack of the Internet. However, TCP has been shown to run inefficiently over ATM. In an effort to maximize network throughput, data-transfer protocols can be developed to run over UDP or directly over IP, rather than over TCP. If error-free transmission is required, techniques for achieving reliable transmission can be included as part of the transfer protocol. However, selected image-processing applications can tolerate a low level of errors in images that are transmitted over a network. In this paper we report on experimental work to develop a high-throughput protocol for unreliable data transfer over ATM networks. We attempt to maximize throughput by keeping the communications pipe full, but still keep packet loss under five percent. We use the Bay Area Gigabit Network Testbed as our experimental platform.

  1. Adopting Internet Standards for Orbital Use

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William; da Silva Curiel, Alex; Jackson, Chris; Stewart, Dave; Shell, Dave; Hodgson, Dave

    2005-01-01

    After a year of testing and demonstrating a Cisco mobile access router intended for terrestrial use onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we reflect on and discuss the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use, as well as reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies we have adopted and also some significant differences in operational models and assumptions that must be considered.

  2. Approaches in highly parameterized inversion - GENIE, a general model-independent TCP/IP run manager

    USGS Publications Warehouse

    Muffels, Christopher T.; Schreuder, Willem A.; Doherty, John E.; Karanovic, Marinko; Tonkin, Matthew J.; Hunt, Randall J.; Welter, David E.

    2012-01-01

    GENIE is a model-independent suite of programs that can be used to generally distribute, manage, and execute multiple model runs via the TCP/IP infrastructure. The suite consists of a file distribution interface, a run manage, a run executer, and a routine that can be compiled as part of a program and used to exchange model runs with the run manager. Because communication is via a standard protocol (TCP/IP), any computer connected to the Internet can serve in any of the capacities offered by this suite. Model independence is consistent with the existing template and instruction file protocols of the widely used PEST parameter estimation program. This report describes (1) the problem addressed; (2) the approach used by GENIE to queue, distribute, and retrieve model runs; and (3) user instructions, classes, and functions developed. It also includes (4) an example to illustrate the linking of GENIE with Parallel PEST using the interface routine.

  3. iChat[TM] Do You? Using Desktop Web Conferencing in Education

    ERIC Educational Resources Information Center

    Bell, Randy L.; Garofalo, Joe

    2006-01-01

    Videoconferencing is not a new technology and it has been widely used in educational settings since the mid-1980s. Videoconferencing has evolved into the integration of personal computers to what is now referred to as Web conferencing. In the mid-1990s, Internet Protocol (IP) was introduced into the mainstream but the educational community has…

  4. 78 FR 8032 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... believe that this growth is being caused by the offering of incentives for referrals to use this service... precipitated largely by new referral programs that offer monetary rewards for the referral of customers who... cost to the consumer. In short, offering such rewards may have the effect of enlisting customers who...

  5. Advance Planning Briefing for Industry. Technology Requirements Briefings

    DTIC Science & Technology

    2009-02-17

    procedure drills through complex multiplayer interactions representative of a motorcade under heavy attack. The tool shall provide a first-person...Integrated Munitions Effect Assessment IMI Interactive Multimedia Instruction IP Internet Protocol IPE Intelligence Preparation of the Environment IR...CTTSO Programs and Mission Areas/Subgroups 13 Requirement Descriptions Blast Effects and Mitigation (BX) 16 Chemical, Biological, Radiological, and

  6. A Failure to Communicate

    ERIC Educational Resources Information Center

    Fredette, Michelle

    2011-01-01

    In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…

  7. Research on TCP/IP network communication based on Node.js

    NASA Astrophysics Data System (ADS)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  8. Interactive MPEG-4 low-bit-rate speech/audio transmission over the Internet

    NASA Astrophysics Data System (ADS)

    Liu, Fang; Kim, JongWon; Kuo, C.-C. Jay

    1999-11-01

    The recently developed MPEG-4 technology enables the coding and transmission of natural and synthetic audio-visual data in the form of objects. In an effort to extend the object-based functionality of MPEG-4 to real-time Internet applications, architectural prototypes of multiplex layer and transport layer tailored for transmission of MPEG-4 data over IP are under debate among Internet Engineering Task Force (IETF), and MPEG-4 systems Ad Hoc group. In this paper, we present an architecture for interactive MPEG-4 speech/audio transmission system over the Internet. It utilities a framework of Real Time Streaming Protocol (RTSP) over Real-time Transport Protocol (RTP) to provide controlled, on-demand delivery of real time speech/audio data. Based on a client-server model, a couple of low bit-rate bit streams (real-time speech/audio, pre- encoded speech/audio) are multiplexed and transmitted via a single RTP channel to the receiver. The MPEG-4 Scene Description (SD) and Object Descriptor (OD) bit streams are securely sent through the RTSP control channel. Upon receiving, an initial MPEG-4 audio- visual scene is constructed after de-multiplexing, decoding of bit streams, and scene composition. A receiver is allowed to manipulate the initial audio-visual scene presentation locally, or interactively arrange scene changes by sending requests to the server. A server may also choose to update the client with new streams and list of contents for user selection.

  9. Real-time long term measurement using integrated framework for ubiquitous smart monitoring

    NASA Astrophysics Data System (ADS)

    Heo, Gwanghee; Lee, Giu; Lee, Woosang; Jeon, Joonryong; Kim, Pil-Joong

    2007-04-01

    Ubiquitous monitoring combining internet technologies and wireless communication is one of the most promising technologies of infrastructure health monitoring against the natural of man-made hazards. In this paper, an integrated framework of the ubiquitous monitoring is developed for real-time long term measurement in internet environment. This framework develops a wireless sensor system based on Bluetooth technology and sends measured acceleration data to the host computer through TCP/IP protocol. And it is also designed to respond to the request of web user on real time basis. In order to verify this system, real time monitoring tests are carried out on a prototype self-anchored suspension bridge. Also, wireless measurement system is analyzed to estimate its sensing capacity and evaluate its performance for monitoring purpose. Based on the evaluation, this paper proposes the effective strategies for integrated framework in order to detect structural deficiencies and to design an early warning system.

  10. Using OpenSSH to secure mobile LAN network traffic

    NASA Astrophysics Data System (ADS)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  11. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Application of Mobile Router to Military Communications

    NASA Technical Reports Server (NTRS)

    Stewart, David H.; Ivancic, William D.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent

    2002-01-01

    Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile-router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile-router is software code that resides in a network router. A Mobile-Router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both the government and commercial sectors. This technology will be applied to the wireless battlefield. NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is the enabling technology for communication via the Internet or Intranets to aircraft. Information such as weather, air traffic control, voice and video can be easily and inexpensively transmitted to the aircraft using Internet protocols. The mobile router can be incorporated into emergency vehicles particularly ambulances and life-flight aircraft to provide real-time connectivity back to the hospital and healthcare experts. Commercial applications include entertainment services, IP telephone, and Internet connectivity for cruise ships, commercial shipping, tour busses, aircraft, and eventually cars. This paper will briefly describe the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications will be described. The paper will also highlight military and government networks that will benefit from the deployment of mobile router and the associated applications.

  13. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  14. A subjective scheduler for subjective dedicated networks

    NASA Astrophysics Data System (ADS)

    Suherman; Fakhrizal, Said Reza; Al-Akaidi, Marwan

    2017-09-01

    Multiple access technique is one of important techniques within medium access layer in TCP/IP protocol stack. Each network technology implements the selected access method. Priority can be implemented in those methods to differentiate services. Some internet networks are dedicated for specific purpose. Education browsing or tutorial video accesses are preferred in a library hotspot, while entertainment and sport contents could be subjects of limitation. Current solution may use IP address filter or access list. This paper proposes subjective properties of users or applications are used for priority determination in multiple access techniques. The NS-2 simulator is employed to evaluate the method. A video surveillance network using WiMAX is chosen as the object. Subjective priority is implemented on WiMAX scheduler based on traffic properties. Three different traffic sources from monitoring video: palace, park, and market are evaluated. The proposed subjective scheduler prioritizes palace monitoring video that results better quality, xx dB than the later monitoring spots.

  15. Using NetMeeting for remote configuration of the Otto Bock C-Leg: technical considerations.

    PubMed

    Lemaire, E D; Fawcett, J A

    2002-08-01

    Telehealth has the potential to be a valuable tool for technical and clinical support of computer controlled prosthetic devices. This pilot study examined the use of Internet-based, desktop video conferencing for remote configuration of the Otto Bock C-Leg. Laboratory tests involved connecting two computers running Microsoft NetMeeting over a local area network (IP protocol). Over 56 Kbs(-1), DSL/Cable, and 10 Mbs(-1) LAN speeds, a prosthetist remotely configured a user's C-Leg by using Application Sharing, Live Video, and Live Audio. A similar test between sites in Ottawa and Toronto, Canada was limited by the notebook computer's 28 Kbs(-1) modem. At the 28 Kbs(-1) Internet-connection speed, NetMeeting's application sharing feature was not able to update the remote Sliders window fast enough to display peak toe loads and peak knee angles. These results support the use of NetMeeting as an accessible and cost-effective tool for remote C-Leg configuration, provided that sufficient Internet data transfer speed is available.

  16. 47 CFR 64.605 - Emergency calling requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... providers of VRS and IP Relay to which § 64.605(b) applies. (2) Each provider of Internet-based TRS shall... VRS and IP Relay—(1) Scope. The following requirements are only applicable to providers of VRS or IP... provider handling the call. (2) E911 Service. As of December 31, 2008: (i) VRS or IP Relay providers must...

  17. 47 CFR 64.605 - Emergency calling requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... providers of VRS and IP Relay to which § 64.605(b) applies. (2) Each provider of Internet-based TRS shall... VRS and IP Relay—(1) Scope. The following requirements are only applicable to providers of VRS or IP... provider handling the call. (2) E911 Service. As of December 31, 2008: (i) VRS or IP Relay providers must...

  18. IP-Based Video Modem Extender Requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, L G; Boorman, T M; Howe, R E

    2003-12-16

    Visualization is one of the keys to understanding large complex data sets such as those generated by the large computing resources purchased and developed by the Advanced Simulation and Computing program (aka ASCI). In order to be convenient to researchers, visualization data must be distributed to offices and large complex visualization theaters. Currently, local distribution of the visual data is accomplished by distance limited modems and RGB switches that simply do not scale to hundreds of users across the local, metropolitan, and WAN distances without incurring large costs in fiber plant installation and maintenance. Wide Area application over the DOEmore » Complex is infeasible using these limited distance RGB extenders. On the other hand, Internet Protocols (IP) over Ethernet is a scalable well-proven technology that can distribute large volumes of data over these distances. Visual data has been distributed at lower resolutions over IP in industrial applications. This document describes requirements of the ASCI program in visual signal distribution for the purpose of identifying industrial partners willing to develop products to meet ASCI's needs.« less

  19. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    PubMed Central

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper. PMID:22164084

  20. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    PubMed

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  1. Hybrid model for wireless mobility management using IPv6

    NASA Astrophysics Data System (ADS)

    Howie, Douglas P.; Sun, Junzhao; Koivisto, Antti T.

    2001-07-01

    Within the coming decade, there will be a dramatic increase in the availability of inexpensive, computationally powerful mobile devices running applications which use the Internet Protocol (IP) to access multimedia services over broad-band wireless connections. To this end, there has been extensive research and standardization in the areas of Mobile IP and IPv6. The purpose of this paper is to apply this work to the issues involved in designing a mobility model able to adapt to different wireless mobile IP scenarios. We describe the usefulness of this model in the 4th generation mobile multimedia systems to come. This new model has been synthesized through a comparative analysis of current mobile IP models where particular attention has been given to the problems of mobile IP handoff and mobility management and their impact on QoS. By applying a unique perspective to these problems, our model is used to set a roadmap for future mobile IPv6 testbed construction.

  2. Telebation: next-generation telemedicine in remote airway management using current wireless technologies.

    PubMed

    Mosier, Jarrod; Joseph, Bellal; Sakles, John C

    2013-02-01

    Since the first remote intubation with telemedicine guidance, wireless technology has advanced to enable more portable methods of telemedicine involvement in remote airway management. Three voice over Internet protocol (VoIP) services were evaluated for quality of image transmitted, data lag, and audio quality with remotely observed and assisted intubations in an academic emergency department. The VoIP clients evaluated were Apple (Cupertino, CA) FaceTime(®), Skype™ (a division of Microsoft, Luxembourg City, Luxembourg), and Tango(®) (TangoMe, Palo Alto, CA). Each client was tested over a Wi-Fi network as well as cellular third generation (3G) (Skype and Tango). All three VoIP clients provided acceptable image and audio quality. There is a significant data lag in image transmission and quality when VoIP clients are used over cellular broadband (3G) compared with Wi-Fi. Portable remote telemedicine guidance is possible with newer technology devices such as a smartphone or tablet, as well as VoIP clients used over Wi-Fi or cellular broadband.

  3. Price Based Local Power Distribution Management System (Local Power Distribution Manager) v1.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    BROWN, RICHARD E.; CZARNECKI, STEPHEN; SPEARS, MICHAEL

    2016-11-28

    A trans-active energy micro-grid controller is implemented in the VOLTTRON distributed control platform. The system uses the price of electricity as the mechanism for conducting transactions that are used to manage energy use and to balance supply and demand. In order to allow testing and analysis of the control system, the implementation is designed to run completely as a software simulation, while allowing the inclusion of selected hardware that physically manages power. Equipment to be integrated with the micro-grid controller must have an IP (Internet Protocol)-based network connection and a software "driver" must exist to translate data communications between themore » device and the controller.« less

  4. Technologies for Achieving Field Ubiquitous Computing

    NASA Astrophysics Data System (ADS)

    Nagashima, Akira

    Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.

  5. ACTS 118x Final Report High-Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.; Brooks, David E.; Beering, Dave R.; Welch, Arun

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The satellite system providers are interested in solving TCP efficiency problems associated with long delays and error-prone links. Similarly, the terrestrial community is interested in solving TCP problems over high-bandwidth links. Whereas the wireless community is interested in improving TCP performance over bandwidth constrained, error-prone links. NASA realized that solutions had already been proposed for most of the problems associated with efficient data transfer over large bandwidth-delay links (which include satellite links). The solutions are detailed in various Internet Engineering Task Force (IETF) Request for Comments (RFCs). Unfortunately, most of these solutions had not been tested at high-speed (155+ Mbps). Therefore, the NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine how far the protocol can be optimized over a 622 Mbps satellite link. These experiments were known as the 118i and 118j experiments. During the 118i and 118j experiments, NASA worked closely with SUN Microsystems and FORE Systems to improve the operating system, TCP stacks. and network interface cards and drivers. We were able to obtain instantaneous data throughput rates of greater than 520 Mbps and average throughput rates of 470 Mbps using TCP over Asynchronous Transfer Mode (ATM) over a 622 Mbps Synchronous Optical Network (SONET) OC12 link. Following the success of these experiments and the successful government/industry collaboration, a new series of experiments. the 118x experiments. were developed.

  6. The good, bad, and ugly of online recruitment of parents for health-related focus groups: lessons learned.

    PubMed

    Quach, Susan; Pereira, Jennifer A; Russell, Margaret L; Wormsbecker, Anne E; Ramsay, Hilary; Crowe, Lois; Quan, Sherman D; Kwong, Jeff

    2013-11-14

    We describe our experiences with identifying and recruiting Ontario parents through the Internet, primarily, as well as other modes, for participation in focus groups about adding the influenza vaccine to school-based immunization programs. Our objectives were to assess participation rates with and without incentives and software restrictions. We also plan to examine study response patterns of unique and multiple submissions and assess efficiency of each online advertising mode. We used social media, deal forum websites, online classified ads, conventional mass media, and email lists to invite parents of school-aged children from Ontario, Canada to complete an online questionnaire to determine eligibility for focus groups. We compared responses and paradata when an incentive was provided and there were no software restrictions to the questionnaire (Period 1) to a period when only a single submission per Internet protocol (IP) address (ie, software restrictions invoked) was permitted and no incentive was provided (Period 2). We also compared the median time to complete a questionnaire, response patterns, and percentage of missing data between questionnaires classified as multiple submissions from the same Internet protocol (IP) address or email versus unique submissions. Efficiency was calculated as the total number of hours study personnel devoted to an advertising mode divided by the resultant number of unique eligible completed questionnaires . Of 1346 submitted questionnaires, 223 (16.6%) were incomplete and 34 (2.52%) did not meet the initial eligibility criteria. Of the remaining 1089 questionnaires, 246 (22.6%) were not from Ontario based on IP address and postal code, and 469 (43.1%) were submitted from the same IP address or email address (multiple submissions). In Period 2 vs Period 1, a larger proportion of questionnaires were submitted from Ontario (92.8%, 141/152 vs 75.1%, 702/937, P<.001), and a smaller proportion of same IP addresses (7.9%, 12/152 vs 47.1%, 441/937, P<.001) were received. Compared to those who made unique submissions, those who made multiple submissions spent less time per questionnaire (166 vs 215 seconds, P<.001), and had a higher percentage of missing data among their responses (15.0% vs 7.6%, P=.004). Advertisements posted on RedFlagDeals were the most efficient for recruitment (0.03 hours of staff time per questionnaire), whereas those placed on Twitter were the least efficient (3.64 hours of staff time per questionnaire). Using multiple online advertising strategies was effective for recruiting a large sample of participants in a relatively short period time with minimal resources. However, risks such as multiple submissions and potentially fraudulent information need to be considered. In our study, these problems were associated with providing an incentive for responding, and could have been partially avoided by activating restrictive software features for online questionnaires.

  7. Proposed DoD (Department of Defense) Internet Protocol Standard.

    DTIC Science & Technology

    1982-07-06

    parameters fall into two categories: service quality parameters and service options. Service quality parameters influence the transmission service provided...Corporation 6 July 1982 -7- TM-7172/481/OO o Service Quality Parameters - Precedence : attempts preferential treatment for high importance datagrams...select the transmission quality. IP passes the type of service (TOS) command set for service quality to the SNP where it is mapped into subnetwork

  8. Team Faces Tough Odds to Implement New Phone Network | Poster

    Cancer.gov

    It was a Saturday, in the final stretch of winter in late February, and the temperature peaked to a pleasant 66 degrees. Many people were outside enjoying the spring-like weather; however, the Voice over Internet Protocol (VoIP) Deployment Team was hard at work at Industry Lane. The team of 10 was installing the new voice-only network, including deploying 145 phones, switching

  9. Identity Management Task Force Report 2008

    DTIC Science & Technology

    2008-01-01

    Telecommunication Grid ( GTG ) consists of the public- switched telecommunications network (PSTN), various forms of Internet protocol (IP) networks...to network providers) to a large community of nomadic users and access devices over a wide range of access technologies. The GTG is notional, and...DOC Dr. Myra Gray , DOD Greg Hall, DNI Celia Hanley, DOD Patrick Hannon, DNI James Hass, IC Linda Hill, SSA Bobby Jones, DOC Patrick Hannon

  10. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    DTIC Science & Technology

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  11. Network-wide BGP route prediction for traffic engineering

    NASA Astrophysics Data System (ADS)

    Feamster, Nick; Rexford, Jennifer

    2002-07-01

    The Internet consists of about 13,000 Autonomous Systems (AS's) that exchange routing information using the Border Gateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS's. However, BGP is a complicated, policy-based protocol that does not include any direct support for traffic engineering. In previous work, we have demonstrated that network operators can adapt the flow of traffic in an efficient and predictable fashion through careful adjustments to the BGP policies running on their edge routers. Nevertheless, many details of the BGP protocol and decision process make predicting the effects of these policy changes difficult. In this paper, we describe a tool that predicts traffic flow at network exit points based on the network topology, the import policy associated with each BGP session, and the routing advertisements received from neighboring AS's. We present a linear-time algorithm that computes a network-wide view of the best BGP routes for each destination prefix given a static snapshot of the network state, without simulating the complex details of BGP message passing. We describe how to construct this snapshot using the BGP routing tables and router configuration files available from operational routers. We verify the accuracy of our algorithm by applying our tool to routing and configuration data from AT&T's commercial IP network. Our route prediction techniques help support the operation of large IP backbone networks, where interdomain routing is an important aspect of traffic engineering.

  12. Design and development of an IoT-based web application for an intelligent remote SCADA system

    NASA Astrophysics Data System (ADS)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  13. 76 FR 59551 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ..., and IP Relay, which allows these individuals to communicate in text using a computer. The final rules... hearing and speech disabilities to communicate using sign language through video equipment, and IP Relay... language through video equipment, and IP Relay, which allows these individuals to communicate in text using...

  14. A hybrid optical switch architecture to integrate IP into optical networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor J.

    2013-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users. As a consequence, the nature of the Internet traffic has been fundamentally transformed from a pure packet-based pattern to today's predominantly flow-based pattern. Cloud computing has also brought about an unprecedented growth in the Internet traffic. In this paper, a hybrid optical switch architecture is presented to deal with the flow-based Internet traffic, aiming to offer flexible and intelligent bandwidth on demand to improve fiber capacity utilization. The hybrid optical switch is capable of integrating IP into optical networks for cloud-based traffic with predictable performance, for which the delay performance of the electronic module in the hybrid optical switch architecture is evaluated through simulation.

  15. X-Windows Socket Widget Class

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Socket Widget Class ("Class" is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing network connections for graphical-user-interface (GUI) computer programs. UNIX Transmission Control Protocol/Internet Protocol (TCP/IP) socket programming libraries require many method calls to configure, operate, and destroy sockets. Most X Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Socket Widget Class encapsulates UNIX TCP/IP socket-management tasks within the framework of an X Windows widget. Using the widget framework, X Windows GUI programs can treat one or more network socket instances in the same manner as that of other graphical widgets, making it easier to program sockets. Wrapping ISP socket programming libraries inside a widget framework enables a programmer to treat a network interface as though it were a GUI.

  16. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    PubMed

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand.

  17. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic

    PubMed Central

    Kerkhove, Dwight; Tian, Le; Munteanu, Adrian; De Poorter, Eli

    2018-01-01

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand. PMID:29360798

  18. The Behavior of TCP and Its Extensions in Space

    NASA Technical Reports Server (NTRS)

    Wang, Ruhai; Horan, Stephen

    2001-01-01

    The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.

  19. Deployment of Directory Service for IEEE N Bus Test System Information

    NASA Astrophysics Data System (ADS)

    Barman, Amal; Sil, Jaya

    2008-10-01

    Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.

  20. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  1. Bringing HIV partner services into the age of social media and mobile connectivity.

    PubMed

    Udeagu, Chi-Chi N; Bocour, Angelica; Shah, Sharmila; Ramos, Yasmin; Gutierrez, Rodolfo; Shepard, Colin W

    2014-10-01

    A substantial proportion of recent sex partners named by persons with sexually transmitted infections are not notified about their exposure despite attempts by public health officials. Although text messaging (texting) and Internet-based communications (dating Web sites, e-mail, etc) are used by a large segment of the public for regular communications, these tools have been underused for partner services (PS). We augmented PS for HIV in New York City using texting and Internet-based means to contact persons for whom traditional information (landline telephone number, postal address) was unavailable. We compared traditional PS (traditionalPS), Internet-based PS (IPS) in January 2011 to October 2012, and texting PS (txtPS) from January 2012 (when txtPS was initiated) through October 2012 on outcomes of contact attempts, notification, and HIV testing. From January 2011 to October 2012, of 3319 partners elicited, 2604 and 275 partners had traditional and only Internet-based contact information and were selected for traditionalPS and IPS, respectively. From January to October 2012, 368 of 1569 partners had only texting-enabled cellphone numbers and were selected for txtPS. The contact rate for txtPS (285/368 [77%]) was significantly higher (P < 0.0001) than the contact rates for traditionalPS (1803/2604 [69%]) and IPS (112/275 [41%]). There was a higher likelihood of notifying contacted IPS (odds ratio, 2.1; 1.2-3.4) and txtPS (odds ratio, 2.4; 1.7-3.2) than traditionalPS partners (P ≤ 0.0001). However, among the notified partners, traditionalPS partners were significantly (P < 0.0001) more likely than txtPS or IPS partners to test for HIV after partner notification (69% vs 45% and 34%, respectively). Augmenting traditionalPS with txtPS and IPS enabled notification of hundreds of previously untraceable partners and several new HIV diagnoses.

  2. 47 CFR 64.611 - Internet-based TRS registration.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Default provider registration. Every provider of VRS or IP Relay must, no later than December 31, 2008, provide users with the capability to register with that VRS or IP Relay provider as a “default provider.” Upon a user's registration, the VRS or IP Relay provider shall: (1) Either: (i) Facilitate the user's...

  3. 47 CFR 64.611 - Internet-based TRS registration.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Default provider registration. Every provider of VRS or IP Relay must, no later than December 31, 2008, provide users with the capability to register with that VRS or IP Relay provider as a “default provider.” Upon a user's registration, the VRS or IP Relay provider shall: (1) Either: (i) Facilitate the user's...

  4. BPTAP: A New Approach to IP over DTN

    NASA Technical Reports Server (NTRS)

    Tsao, Philip; Nguyen, Sam

    2012-01-01

    Traditional Internet protocols have been widely deployed for a variety of applications. However such protocols generally perform poorly in situations in which, round trip delays are very large (interplanetary distances) or . persistent connectivity is not always available (widely dispersed MANET). Delay/Disruption Tolerant Network (DTN) technology was invented to address these issues: (1) . Relay nodes "take custody" of blocks of network traffic on a hop-by -hop basis and retransmit them in cases of expected or unexpected link outage (2) Bundle lifetime may be configured for long round trip light times. BPTAP is novel by encapsulating Ethernet frames in BP

  5. The Aeronautical Data Link: Taxonomy, Architectural Analysis, and Optimization

    NASA Technical Reports Server (NTRS)

    Morris, A. Terry; Goode, Plesent W.

    2002-01-01

    The future Communication, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) System will rely on global satellite navigation, and ground-based and satellite based communications via Multi-Protocol Networks (e.g. combined Aeronautical Telecommunications Network (ATN)/Internet Protocol (IP)) to bring about needed improvements in efficiency and safety of operations to meet increasing levels of air traffic. This paper will discuss the development of an approach that completely describes optimal data link architecture configuration and behavior to meet the multiple conflicting objectives of concurrent and different operations functions. The practical application of the approach enables the design and assessment of configurations relative to airspace operations phases. The approach includes a formal taxonomic classification, an architectural analysis methodology, and optimization techniques. The formal taxonomic classification provides a multidimensional correlation of data link performance with data link service, information protocol, spectrum, and technology mode; and to flight operations phase and environment. The architectural analysis methodology assesses the impact of a specific architecture configuration and behavior on the local ATM system performance. Deterministic and stochastic optimization techniques maximize architectural design effectiveness while addressing operational, technology, and policy constraints.

  6. One Approach for Transitioning the iNET Standards into the IRIG 106 Telemetry Standards

    DTIC Science & Technology

    2015-05-26

    Protocol Suite. Figure 1 illustrates the Open Systems Interconnection ( OSI ) Model, the corresponding TCP/IP Model, and the major components of the TCP...IP Protocol Suite. Figure 2 represents the iNET-specific protocols layered onto the TCP/IP Model. Figure 1. OSI and TCP/IP Model with TCP/IP...Protocol Suite TCP/IP Protocol Suite Major Components IPv4 IPv6 TCP/IP Model OSI Model Application Presentation

  7. Generation of Isogenic Human iPS Cell Line Precisely Corrected by Genome Editing Using the CRISPR/Cas9 System.

    PubMed

    Grobarczyk, Benjamin; Franco, Bénédicte; Hanon, Kevin; Malgrange, Brigitte

    2015-10-01

    Genome engineering and human iPS cells are two powerful technologies, which can be combined to highlight phenotypic differences and identify pathological mechanisms of complex diseases by providing isogenic cellular material. However, very few data are available regarding precise gene correction in human iPS cells. Here, we describe an optimized stepwise protocol to deliver CRISPR/Cas9 plasmids in human iPS cells. We highlight technical issues especially those associated to human stem cell culture and to the correction of a point mutation to obtain isogenic iPS cell line, without inserting any resistance cassette. Based on a two-steps clonal isolation protocol (mechanical picking followed by enzymatic dissociation), we succeed to select and expand corrected human iPS cell line with a great efficiency (more than 2% of the sequenced colonies). This protocol can also be used to obtain knock-out cell line from healthy iPS cell line by the NHEJ pathway (with about 15% efficiency) and reproduce disease phenotype. In addition, we also provide protocols for functional validation tests after every critical step.

  8. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  9. Display Sharing: An Alternative Paradigm

    NASA Technical Reports Server (NTRS)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  10. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  11. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    PubMed Central

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  12. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    PubMed

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  13. An evaluation of remote communication versus face-to-face in clinical dental education.

    PubMed

    Martin, N; Lazalde, O Martínez; Stokes, C; Romano, D

    2012-03-23

    Distance learning and internet-based delivery of educational content are becoming very popular as an alternative to real face-to-face delivery. Clinical-based discussions still remain greatly face-to-face despite the advancement of remote communication and internet sharing technology. In this study we have compared three communication modalities between a learner and educator: audio and video using voice over internet protocol (VoIP) alone [AV]; audio and video VoIP with the addition of a three dimensional virtual artefact [AV3D] and physical face-to-face [FTF]. Clinical case discussions based on fictitious patients were held between a 'learner' and an 'expert' using the three communication modalities. The learner presented a clinical scenario to the experts, with the aid of a prop (partially dentate cast, digitised for AV3D), to obtain advice on the management of the clinical case. Each communication modality was tested in timed exercises in a random order among one of three experts (senior clinical restorative staff) and a learner (from a cohort of 15 senior clinical undergraduate students) all from the School of Clinical Dentistry, University of Sheffield. All learners and experts used each communication modality in turn with no prior training. Video recording and structured analysis were used to ascertain learner behaviour and levels of interactivity. Evaluation questionnaires were completed by experts and learners immediately after the experiment to ascertain effectiveness of information exchange and barriers/facilitators to communication. The video recordings showed that students were more relaxed with AV and AV3D than FTF (p = 0.01). The evaluation questionnaires showed that students felt they could provide (p = 0.03) and obtain (p = 0.003) more information using the FTF modality, followed by AV and then AV3D. Experts also ranked FTF better than AV and AV3D for providing (p = 0.012) and obtaining (p = 0) information to/from the expert. Physical face-to-face learning is a more effective communication modality for clinical case-based discussions between a learner and an expert. Remote, internet-based discussions enable a more relaxed discussion environment. The effectiveness of 3D supported internet-based communication is dependent upon a robust and simple to use interface, along with some prior training.

  14. Operating a terrestrial Internet router onboard and alongside a small satellite

    NASA Astrophysics Data System (ADS)

    Wood, L.; da Silva Curiel, A.; Ivancic, W.; Hodgson, D.; Shell, D.; Jackson, C.; Stewart, D.

    2006-07-01

    After twenty months of flying, testing and demonstrating a Cisco mobile access router, originally designed for terrestrial use, onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we use our experience to examine the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use with a large set of latent capabilities to draw on when needed, as well as the familiarity that comes from reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies have been taken to small satellites—and also some significant differences between the two in operational models and assumptions that must be borne in mind.

  15. Integrating DXplain into a clinical information system using the World Wide Web.

    PubMed

    Elhanan, G; Socratous, S A; Cimino, J J

    1996-01-01

    The World Wide Web(WWW) offers a cross-platform environment and standard protocols that enable integration of various applications available on the Internet. The authors use the Web to facilitate interaction between their Web-based Clinical Information System and a decision-support system-DXplain, at the Massachusetts General Hospital-using local architecture and Common Gateway Interface programs. The current application translates patients laboratory test results into DXplain's terms to generate diagnostic hypotheses. Two different access methods are utilized for this model; Hypertext Transfer Protocol (HTTP) and TCP/IP function calls. While clinical aspects cannot be evaluated as yet, the model demonstrates the potential of Web-based applications for interaction and integration and how local architecture, with a controlled vocabulary server, can further facilitate such integration. This model serves to demonstrate some of the limitations of the current WWW technology and identifies issues such as control over Web resources and their utilization and liability issues as possible obstacles for further integration.

  16. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  17. Large File Transfers from Space Using Multiple Ground Terminals and Delay-Tolerant Networking

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Paulsen, Phillip; Stewart, Dave; Eddy, Wesley; McKim, James; Taylor, John; Lynch, Scott; Heberle, Jay; Northam, James; Jackson, Chris; hide

    2010-01-01

    We use Delay-Tolerant Networking (DTN) to break control loops between space-ground communication links and ground-ground communication links to increase overall file delivery efficiency, as well as to enable large files to be proactively fragmented and received across multiple ground stations. DTN proactive fragmentation and reactive fragmentation were demonstrated from the UK-DMC satellite using two independent ground stations. The files were reassembled at a bundle agent, located at Glenn Research Center in Cleveland Ohio. The first space-based demonstration of this occurred on September 30 and October 1, 2009. This paper details those experiments. Communication, delay-tolerant networking, DTN, satellite, Internet, protocols, bundle, IP, TCP.

  18. Shuttle Payload Ground Command and Control: An Experiment Implementation Combustion Module-2 Software Development, STS-107

    NASA Technical Reports Server (NTRS)

    Carek, David Andrew

    2003-01-01

    This presentation covers the design of a command and control architecture developed by the author for the Combustion Module-2 microgravity experiment, which flew aboard the STS-107 Shuttle mission, The design was implemented to satisfy a hybrid network that utilized TCP/IP for both the onboard segment and ground segment, with an intermediary unreliable transport for the space to ground segment. With the infusion of Internet networking technologies into Space Shuttle, Space Station, and spacecraft avionics systems, comes the need for robust methodologies for ground command and control. Considerations of high bit error links, and unreliable transport over intermittent links must be considered in such systems. Internet protocols applied to these systems, coupled with the appropriate application layer protections, can provide adequate communication architectures for command and control. However, there are inherent limitations and additional complexities added by the use of Internet protocols that must be considered during the design. This presentation will discuss the rationale for the: framework and protocol algorithms developed by the author. A summary of design considerations, implantation issues, and learned lessons will be will be presented. A summary of mission results using this communications architecture will be presented. Additionally, areas of further needed investigation will be identified.

  19. Real-Time Mapping: Contemporary Challenges and the Internet of Things as the Way Forward

    NASA Astrophysics Data System (ADS)

    Bęcek, Kazimierz

    2016-12-01

    The Internet of Things (IoT) is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective `intelligent' is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that `know' the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address), which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.

  20. Scalable SCPPM Decoder

    NASA Technical Reports Server (NTRS)

    Quir, Kevin J.; Gin, Jonathan W.; Nguyen, Danh H.; Nguyen, Huy; Nakashima, Michael A.; Moision, Bruce E.

    2012-01-01

    A decoder was developed that decodes a serial concatenated pulse position modulation (SCPPM) encoded information sequence. The decoder takes as input a sequence of four bit log-likelihood ratios (LLR) for each PPM slot in a codeword via a XAUI 10-Gb/s quad optical fiber interface. If the decoder is unavailable, it passes the LLRs on to the next decoder via a XAUI 10-Gb/s quad optical fiber interface. Otherwise, it decodes the sequence and outputs information bits through a 1-GB/s Ethernet UDP/IP (User Datagram Protocol/Internet Protocol) interface. The throughput for a single decoder unit is 150-Mb/s at an average of four decoding iterations; by connecting a number of decoder units in series, a decoding rate equal to that of the aggregate rate is achieved. The unit is controlled through a 1-GB/s Ethernet UDP/IP interface. This ground station decoder was developed to demonstrate a deep space optical communication link capability, and is unique in the scalable design to achieve real-time SCPP decoding at the aggregate data rate.

  1. Long-term forecasting of internet backbone traffic.

    PubMed

    Papagiannaki, Konstantina; Taft, Nina; Zhang, Zhi-Li; Diot, Christophe

    2005-09-01

    We introduce a methodology to predict when and where link additions/upgrades have to take place in an Internet protocol (IP) backbone network. Using simple network management protocol (SNMP) statistics, collected continuously since 1999, we compute aggregate demand between any two adjacent points of presence (PoPs) and look at its evolution at time scales larger than 1 h. We show that IP backbone traffic exhibits visible long term trends, strong periodicities, and variability at multiple time scales. Our methodology relies on the wavelet multiresolution analysis (MRA) and linear time series models. Using wavelet MRA, we smooth the collected measurements until we identify the overall long-term trend. The fluctuations around the obtained trend are further analyzed at multiple time scales. We show that the largest amount of variability in the original signal is due to its fluctuations at the 12-h time scale. We model inter-PoP aggregate demand as a multiple linear regression model, consisting of the two identified components. We show that this model accounts for 98% of the total energy in the original signal, while explaining 90% of its variance. Weekly approximations of those components can be accurately modeled with low-order autoregressive integrated moving average (ARIMA) models. We show that forecasting the long term trend and the fluctuations of the traffic at the 12-h time scale yields accurate estimates for at least 6 months in the future.

  2. Development of ISO connection-oriented/correctionless gateways

    NASA Technical Reports Server (NTRS)

    Landweber, Lawrence H.

    1991-01-01

    The project had two goals, establishment of a gateway between French and U.S. academic networks and studies of issues related to the development of ISO connection-oriented/connectionless (CO/CL) gateways. The first component involved installation of a 56K bps line between Princeton Univ. and INRIA in France. The end-points of these lines were connected by Vitalink link level bridges. The Princeton end was then connected to the NSFNET via the John Von Neumann Supercomputer Center. The French end was connected to Transpac, the French X.25 public data network and to the French IP research internet. U.S. users may communicate with users of the French internet by e-mail and may access computational and data resources in France by use of remote login and file transfer. The connection to Transpac enables U.S. users to access the SIMBAD astronomical database outside of Paris. Access to this database from the U.S. can be via TCP/IP or DECNET (via a DECNET to TCP/IP gateway) protocols utilizing a TCP/IP to X.25 gateway developed and operated by INRIA. The second component of the project involved experiments aimed at understanding the issues involved is ISO CO/CL gateways. An experimental gateway was developed at Wisconsin and a preliminary report was prepared. Because of the need to devote most resources to the first component of the project, work in this area did not go beyond development of a prototype gateway.

  3. Real-time services in IP network architectures

    NASA Astrophysics Data System (ADS)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  4. Interoperability Is the Foundation for Successful Internet Telephony.

    ERIC Educational Resources Information Center

    Fromm, Larry

    1997-01-01

    More than 40 leading computer and telephony companies have united to lead the charge toward open standards and universal interoperability for Internet telephony products. The voice of IP Forum (VoIP) is working to define technical guidelines for two-party, real-time communications over IP networks, including provisions for compatibility with…

  5. Packet Scheduling Mechanism to Improve Quality of Short Flows and Low-Rate Flows

    NASA Astrophysics Data System (ADS)

    Yokota, Kenji; Asaka, Takuya; Takahashi, Tatsuro

    In recent years elephant flows are increasing by expansion of peer-to-peer (P2P) applications on the Internet. As a result, bandwidth is occupied by specific users triggering unfair resource allocation. The main packet-scheduling mechanism currently employed is first-in first-out (FIFO) where the available bandwidth of short flows is limited by elephant flows. Least attained service (LAS), which decides transfer priority of packets by the total amount of transferred data in all flows, was proposed to solve this problem. However, routers with LAS limit flows with large amount of transferred data even if they are low-rate. Therefore, it is necessary to improve the quality of low-rate flows with long holding times such as voice over Internet protocol (VoIP) applications. This paper proposes rate-based priority control (RBPC), which calculates the flow rate and control the priority by using it. Our proposed method can transfer short flows and low-rate flows in advance. Moreover, its fair performance is shown through simulations.

  6. Realtime Gas Emission Monitoring at Hazardous Sites Using a Distributed Point-Source Sensing Infrastructure.

    PubMed

    Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco

    2016-01-20

    This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant's critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events.

  7. NSI customer service representatives and user support office: NASA Science Internet

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  8. OSI in the NASA science internet: An analysis

    NASA Technical Reports Server (NTRS)

    Nitzan, Rebecca

    1990-01-01

    The Open Systems Interconnection (OSI) protocol suite is a result of a world-wide effort to develop international standards for networking. OSI is formalized through the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The goal of OSI is to provide interoperability between network products without relying on one particular vendor, and to do so on a multinational basis. The National Institute for Standards and Technology (NIST) has developed a Government OSI Profile (GOSIP) that specified a subset of the OSI protocols as a Federal Information Processing Standard (FIPS 146). GOSIP compatibility has been adopted as the direction for all U.S. government networks. OSI is extremely diverse, and therefore adherence to a profile will facilitate interoperability within OSI networks. All major computer vendors have indicated current or future support of GOSIP-compliant OSI protocols in their products. The NASA Science Internet (NSI) is an operational network, serving user requirements under NASA's Office of Space Science and Applications. NSI consists of the Space Physics Analysis Network (SPAN) that uses the DECnet protocols and the NASA Science Network (NSN) that uses TCP/IP protocols. The NSI Project Office is currently working on an OSI integration analysis and strategy. A long-term goal is to integrate SPAN and NSN into one unified network service, using a full OSI protocol suite, which will support the OSSA user community.

  9. HiSeasNet: Oceanographic Ships Join the Grid

    NASA Astrophysics Data System (ADS)

    Berger, Jonathan; Orcutt, John; Foley, Steven; Bohlen, Steven

    2006-05-01

    HiSeasNet, the communications network providing full-period Internet access for the U.S. academic ocean research fleet, is an enabling technology that is changing the way oceanography is done in the 21st century. With the installation in March 2006 of a system on the research vessel (R/V) Seward Johnson and the planned installation on the R/V Marcus Langseth later this year, all but two of the Universities National Oceanographic Laboratories System (UNOLS) fleet of large/global and intermediate/ocean vessels will be equipped with HiSeasNet capability. HiSeasNet is a full-service Internet Protocol (IP) satellite network utilizing Cisco technology. In addition to the familiar IP services-such as e-mail, telnet, ssh, rlogin, Web traffic, and ftp-HiSeasNet can move real-time audio and video traffic across the satellite links. Phone systems onboard research ships can be connected to their home institutions' phone exchanges. Video teleconferencing with the current 96 kilobits per second circuits supports compressed video frame rates at about 10 frames per second, allowing for effective conversations and demonstrations with ship-to-shore video.

  10. A FPGA embedded web server for remote monitoring and control of smart sensors networks.

    PubMed

    Magdaleno, Eduardo; Rodríguez, Manuel; Pérez, Fernando; Hernández, David; García, Enrique

    2013-12-27

    This article describes the implementation of a web server using an embedded Altera NIOS II IP core, a general purpose and configurable RISC processor which is embedded in a Cyclone FPGA. The processor uses the μCLinux operating system to support a Boa web server of dynamic pages using Common Gateway Interface (CGI). The FPGA is configured to act like the master node of a network, and also to control and monitor a network of smart sensors or instruments. In order to develop a totally functional system, the FPGA also includes an implementation of the time-triggered protocol (TTP/A). Thus, the implemented master node has two interfaces, the webserver that acts as an Internet interface and the other to control the network. This protocol is widely used to connecting smart sensors and actuators and microsystems in embedded real-time systems in different application domains, e.g., industrial, automotive, domotic, etc., although this protocol can be easily replaced by any other because of the inherent characteristics of the FPGA-based technology.

  11. A FPGA Embedded Web Server for Remote Monitoring and Control of Smart Sensors Networks

    PubMed Central

    Magdaleno, Eduardo; Rodríguez, Manuel; Pérez, Fernando; Hernández, David; García, Enrique

    2014-01-01

    This article describes the implementation of a web server using an embedded Altera NIOS II IP core, a general purpose and configurable RISC processor which is embedded in a Cyclone FPGA. The processor uses the μCLinux operating system to support a Boa web server of dynamic pages using Common Gateway Interface (CGI). The FPGA is configured to act like the master node of a network, and also to control and monitor a network of smart sensors or instruments. In order to develop a totally functional system, the FPGA also includes an implementation of the time-triggered protocol (TTP/A). Thus, the implemented master node has two interfaces, the webserver that acts as an Internet interface and the other to control the network. This protocol is widely used to connecting smart sensors and actuators and microsystems in embedded real-time systems in different application domains, e.g., industrial, automotive, domotic, etc., although this protocol can be easily replaced by any other because of the inherent characteristics of the FPGA-based technology. PMID:24379047

  12. An Updated Protocol to Detect Invalid Entries in an Online Survey of Men Who Have Sex with Men (MSM): How Do Valid and Invalid Submissions Compare?

    PubMed Central

    Konstan, Joseph; Iantaffi, Alex; Wilkerson, J. Michael; Galos, Dylan; Simon Rosser, B. R.

    2017-01-01

    Researchers use protocols to screen for suspicious survey submissions in online studies. We evaluated how well a de-duplication and cross-validation process detected invalid entries. Data were from the Sexually Explicit Media Study, an Internet-based HIV prevention survey of men who have sex with men. Using our protocol, 146 (11.6 %) of 1254 entries were identified as invalid. Most indicated changes to the screening questionnaire to gain entry (n = 109, 74.7 %), matched other submissions’ payment profiles (n = 56, 41.8 %), or featured an IP address that was recorded previously (n = 43, 29.5 %). We found few demographic or behavioral differences between valid and invalid samples, however. Invalid submissions had lower odds of reporting HIV testing in the past year (OR 0.63), and higher odds of requesting no payment compared to check payments (OR 2.75). Thus, rates of HIV testing would have been underestimated if invalid submissions had not been removed, and payment may not be the only incentive for invalid participation. PMID:25805443

  13. Teletesting at IABG - Technical Features and Security Issues

    NASA Astrophysics Data System (ADS)

    Goerner, E.

    2004-08-01

    In the space simulation department at IABG data handling systems are used to collect, evaluate and present all data gathered from different test chambers during thermal vacuum tests. In the year 2000 a redesign of the existing data handling systems gave us the opportunity to add some features like ethernet- based client / server systems and internet protocol TCP / IP. The results were state of the art internet-ready data handling systems. Based on this we started mid 2002 with a new project called teletesting to give our customers remote access to test data. For the realisation TCO (Total Cost of Ownership), QoS (Quality of Service), data confidentiality, restrictive access to test data and a plain and simple user interface with standard components, i.e. normal PC hardware and software, were mandatory. As a result of this project, our customers have now online access to their test data in CSV/EXCEL format, in display mode either in numerical or graphical form and through DynaWorks. ISDN teletesting is already used by our customers, internet teletesting is in test mode but some parts have already been approved and used. Although an extension to teleoperation is implemented in the control systems (WIN CC) of our test chambers, it is not yet in use.

  14. Team Faces Tough Odds to Implement New Phone Network | Poster

    Cancer.gov

    It was a Saturday, in the final stretch of winter in late February, and the temperature peaked to a pleasant 66 degrees. Many people were outside enjoying the spring-like weather; however, the Voice over Internet Protocol (VoIP) Deployment Team was hard at work at Industry Lane. The team of 10 was installing the new voice-only network, including deploying 145 phones, switching and testing the 911 feature, connecting wall mounts, and verifying each phone... Read more

  15. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  16. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  17. Designing of routing algorithms in autonomous distributed data transmission system for mobile computing devices with ‘WiFi-Direct’ technology

    NASA Astrophysics Data System (ADS)

    Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.

    2017-02-01

    The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.

  18. Internet Technologies for Space-based Communications: State of the Art and Challenges

    NASA Technical Reports Server (NTRS)

    Bhasin, K.; DePaula, R.; Edwards, C.

    2000-01-01

    The Internet is rapidly changing the ways we communicate information around the globe today. The desire to provide Internet-based services to anyone, anywhere, anytime has brought satellite communications to the forefront to become an integral part of the Internet. In spite of the distances involved, satellite links are proving to be capable of providing Internet services based on Internet protocol (TCP/IP) stack. This development has led to the question particularly at NASA; can satellites and other space platforms become an Internet-node in space? This will allow the direct transfer of information directly from space to the users on Earth and even be able to control the spacecraft and its instruments. NASA even wants to extend the near earth space Internet to deep space applications where scientists and the public here on Earth may view space exploration in real time via the Internet. NASA's future solar system exploration will involve intensive in situ investigations of planets, moons, asteroids, and comets. While past missions typically involved a single fly-by or orbiting science spacecraft, future missions will begin to use fleets of small, highly intelligent robotic vehicles to carry out collaborative investigations. The resulting multi-spacecraft topologies will effectively create a wide area network spanning the solar system. However, this will require significant development in Internet technologies for space use. This paper provides the status'of the Internet for near earth applications and the potential extension of the Internet for use in deep space planetary exploration. The paper will discuss the overall challenges of implementing the space Internet and how the space Internet will integrate into the complex terrestrial systems those forms the Internet of today in a hybrid set of networks. Internet. We envision extending to the deep space environment such Internet concepts as a well-designed layered architecture. This effort will require an ability to develop and infuse new physical layer technology to increase network bandwidth at very low-bit error rates. In addition, we identify network technologies such as routers and switches needed to maintain standard application layer interfaces, while providing low-cost, efficient, modular networking solutions. We will describe the overall architectural approach to extending the concept of the Internet to space and highlight the important technological challenges and initiatives that will make it a reality.

  19. Web-based monitoring and management system for integrated enterprise-wide imaging networks

    NASA Astrophysics Data System (ADS)

    Ma, Keith; Slik, David; Lam, Alvin; Ng, Won

    2003-05-01

    Mass proliferation of IP networks and the maturity of standards has enabled the creation of sophisticated image distribution networks that operate over Intranets, Extranets, Communities of Interest (CoI) and even the public Internet. Unified monitoring, provisioning and management of such systems at the application and protocol levels represent a challenge. This paper presents a web based monitoring and management tool that employs established telecom standards for the creation of an open system that enables proactive management, provisioning and monitoring of image management systems at the enterprise level and across multi-site geographically distributed deployments. Utilizing established standards including ITU-T M.3100, and web technologies such as XML/XSLT, JSP/JSTL, and J2SE, the system allows for seamless device and protocol adaptation between multiple disparate devices. The goal has been to develop a unified interface that provides network topology views, multi-level customizable alerts, real-time fault detection as well as real-time and historical reporting of all monitored resources, including network connectivity, system load, DICOM transactions and storage capacities.

  20. Study of intelligent building system based on the internet of things

    NASA Astrophysics Data System (ADS)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  1. [Exploiture and application of an internet-based Computation Platform for Integrative Pharmacology of Traditional Chinese Medicine].

    PubMed

    Xu, Hai-Yu; Liu, Zhen-Ming; Fu, Yan; Zhang, Yan-Qiong; Yu, Jian-Jun; Guo, Fei-Fei; Tang, Shi-Huan; Lv, Chuan-Yu; Su, Jin; Cui, Ru-Yi; Yang, Hong-Jun

    2017-09-01

    Recently, integrative pharmacology(IP) has become a pivotal paradigm for the modernization of traditional Chinese medicines(TCM) and combinatorial drugs discovery, which is an interdisciplinary science for establishing the in vitro and in vivo correlation between absorption, distribution, metabolism, and excretion/pharmacokinetic(ADME/PK) profiles of TCM and the molecular networks of disease by the integration of the knowledge of multi-disciplinary and multi-stages. In the present study, an internet-based Computation Platform for IP of TCM(TCM-IP, www.tcmip.cn) is established to promote the development of the emerging discipline. Among them, a big data of TCM is an important resource for TCM-IP including Chinese Medicine Formula Database, Chinese Medical Herbs Database, Chemical Database of Chinese Medicine, Target Database for Disease and Symptoms, et al. Meanwhile, some data mining and bioinformatics approaches are critical technology for TCM-IP including the identification of the TCM constituents, ADME prediction, target prediction for the TCM constituents, network construction and analysis, et al. Furthermore, network beautification and individuation design are employed to meet the consumer's requirement. We firmly believe that TCM-IP is a very useful tool for the identification of active constituents of TCM and their involving potential molecular mechanism for therapeutics, which would wildly applied in quality evaluation, clinical repositioning, scientific discovery based on original thinking, prescription compatibility and new drug of TCM, et al. Copyright© by the Chinese Pharmaceutical Association.

  2. Audio CAPTCHA for SIP-Based VoIP

    NASA Astrophysics Data System (ADS)

    Soupionis, Yannis; Tountas, George; Gritzalis, Dimitris

    Voice over IP (VoIP) introduces new ways of communication, while utilizing existing data networks to provide inexpensive voice communications worldwide as a promising alternative to the traditional PSTN telephony. SPam over Internet Telephony (SPIT) is one potential source of future annoyance in VoIP. A common way to launch a SPIT attack is the use of an automated procedure (bot), which generates calls and produces audio advertisements. In this paper, our goal is to design appropriate CAPTCHA to fight such bots. We focus on and develop audio CAPTCHA, as the audio format is more suitable for VoIP environments and we implement it in a SIP-based VoIP environment. Furthermore, we suggest and evaluate the specific attributes that audio CAPTCHA should incorporate in order to be effective, and test it against an open source bot implementation.

  3. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  4. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  5. Data Transfer Efficiency Over Satellite Circuits Using a Multi-Socket Extension to the File Transfer Protocol (FTP)

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn; Kruse, Hans

    1996-01-01

    In several experiments using NASA's Advanced Communications Technology Satellite (ACTS), investigators have reported disappointing throughput using the transmission control protocol/Internet protocol (TCP/IP) protocol suite over 1.536Mbit/sec (T1) satellite circuits. A detailed analysis of file transfer protocol (FTP) file transfers reveals that both the TCP window size and the TCP 'slow starter' algorithm contribute to the observed limits in throughput. In this paper we summarize the experimental and and theoretical analysis of the throughput limit imposed by TCP on the satellite circuit. We then discuss in detail the implementation of a multi-socket FTP, XFTP client and server. XFTP has been tested using the ACTS system. Finally, we discuss a preliminary set of tests on a link with non-zero bit error rates. XFTP shows promising performance under these conditions, suggesting the possibility that a multi-socket application may be less effected by bit errors than a single, large-window TCP connection.

  6. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  7. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    NASA Astrophysics Data System (ADS)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  8. Communication protocol in chassis detecting wireless transmission system based on WiFi

    USDA-ARS?s Scientific Manuscript database

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  9. Broadband set-top box using MAP-CA processor

    NASA Astrophysics Data System (ADS)

    Bush, John E.; Lee, Woobin; Basoglu, Chris

    2001-12-01

    Advances in broadband access are expected to exert a profound impact in our everyday life. It will be the key to the digital convergence of communication, computer and consumer equipment. A common thread that facilitates this convergence comprises digital media and Internet. To address this market, Equator Technologies, Inc., is developing the Dolphin broadband set-top box reference platform using its MAP-CA Broadband Signal ProcessorT chip. The Dolphin reference platform is a universal media platform for display and presentation of digital contents on end-user entertainment systems. The objective of the Dolphin reference platform is to provide a complete set-top box system based on the MAP-CA processor. It includes all the necessary hardware and software components for the emerging broadcast and the broadband digital media market based on IP protocols. Such reference design requires a broadband Internet access and high-performance digital signal processing. By using the MAP-CA processor, the Dolphin reference platform is completely programmable, allowing various codecs to be implemented in software, such as MPEG-2, MPEG-4, H.263 and proprietary codecs. The software implementation also enables field upgrades to keep pace with evolving technology and industry demands.

  10. NMR-based urinary profiling of lactulose/mannitol ratio used to assess the altered intestinal permeability in acute on chronic liver failure (ACLF) patients.

    PubMed

    Kumar, Dinesh; Pandey, Gaurav; Bansal, Deepak; Rawat, Atul; Kumar, Umesh; Dubey, Durgesh; Guleria, Anupam; Saraswat, Vivek Anand

    2017-04-01

    The article presents a simplified NMR-based protocol for urinary profiling of lactulose/mannitol ratio (LMR) and demonstrates here its utility to assess increased intestinal permeability (IP) in patients with acute on chronic liver failure (ACLF). ACLF is a serious clinical complication associated with chronic liver disease (cirrhosis). The major risk factor in its development is increased IP ('leaky gut'), which has been linked to disease progression and to infectious complications. However, IP has seldom been investigated in patients with ACLF, even though patients frequently report gastrointestinal disorders and associated complications. To this end, we first optimized the NMR-based targeted profiling of urinary metabolites (i.e. actulose, mannitol, and creatinine) and subsequently used this resulted protocol (a) first to evaluate the altered IP in ACLF patients and then (b) to explore its utility for monitoring the treatment response in these patients. The normal profiles were obtained for 7 age and sex matched healthy volunteers. The results revealed that the urinary LMR excretion was significantly higher in ACLF patients compared to normal controls (median ~0.7, range (0.12-2.84), vs median ~0.11, range (0.02-0.28), p < 0.001) suggesting that the ACLF patients' exhibit altered IP. However, the LMR excretion in six clinically improved follow-up ACLF patients was comparable to normal controls indicating restored IP after the treatment. The protocol-as demonstrated here with ACLF-is equally applicable for evaluating IP or mucosal barrier function in other intestinal disorders with reasonable sensitivity and specificity, highlighting its general utility. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  11. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    NASA Technical Reports Server (NTRS)

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole process, while maintaining the integrity of the latest technological displayed image devices. This study will provide insights to the many possibilities that can be filtered down to a harmoniously responsive product that can be used in today's MCC environment.

  12. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  13. Realtime Gas Emission Monitoring at Hazardous Sites Using a Distributed Point-Source Sensing Infrastructure

    PubMed Central

    Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco

    2016-01-01

    This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant’s critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events. PMID:26805832

  14. Mobile telephones: a comparison of radiated power between 3G VoIP calls and 3G VoCS calls.

    PubMed

    Jovanovic, Dragan; Bragard, Guillaume; Picard, Dominique; Chauvin, Sébastien

    2015-01-01

    The purpose of this study is to assess the mean RF power radiated by mobile telephones during voice calls in 3G VoIP (Voice over Internet Protocol) using an application well known to mobile Internet users, and to compare it with the mean power radiated during voice calls in 3G VoCS (Voice over Circuit Switch) on a traditional network. Knowing that the specific absorption rate (SAR) is proportional to the mean radiated power, the user's exposure could be clearly identified at the same time. Three 3G (High Speed Packet Access) smartphones from three different manufacturers, all dual-band for GSM (900 MHz, 1800 MHz) and dual-band for UMTS (900 MHz, 1950 MHz), were used between 28 July and 04 August 2011 in Paris (France) to make 220 two-minute calls on a mobile telephone network with national coverage. The places where the calls were made were selected in such a way as to describe the whole range of usage situations of the mobile telephone. The measuring equipment, called "SYRPOM", recorded the radiation power levels and the frequency bands used during the calls with a sampling rate of 20,000 per second. In the framework of this study, the mean normalised power radiated by a telephone in 3G VoIP calls was evaluated at 0.75% maximum power of the smartphone, compared with 0.22% in 3G VoCS calls. The very low average power levels associated with use of 3G devices with VoIP or VoCS support the view that RF exposure resulting from their use is far from exceeding the basic restrictions of current exposure limits in terms of SAR.

  15. Security Research on VoIP with Watermarking

    NASA Astrophysics Data System (ADS)

    Hu, Dong; Lee, Ping

    2008-11-01

    With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.

  16. Chromatin Immunoprecipitation (ChIP) Protocol for Low-abundance Embryonic Samples.

    PubMed

    Rehimi, Rizwan; Bartusel, Michaela; Solinas, Francesca; Altmüller, Janine; Rada-Iglesias, Alvaro

    2017-08-29

    Chromatin immunoprecipitation (ChIP) is a widely-used technique for mapping the localization of post-translationally modified histones, histone variants, transcription factors, or chromatin-modifying enzymes at a given locus or on a genome-wide scale. The combination of ChIP assays with next-generation sequencing (i.e., ChIP-Seq) is a powerful approach to globally uncover gene regulatory networks and to improve the functional annotation of genomes, especially of non-coding regulatory sequences. ChIP protocols normally require large amounts of cellular material, thus precluding the applicability of this method to investigating rare cell types or small tissue biopsies. In order to make the ChIP assay compatible with the amount of biological material that can typically be obtained in vivo during early vertebrate embryogenesis, we describe here a simplified ChIP protocol in which the number of steps required to complete the assay were reduced to minimize sample loss. This ChIP protocol has been successfully used to investigate different histone modifications in various embryonic chicken and adult mouse tissues using low to medium cell numbers (5 x 10 4 - 5 x 10 5 cells). Importantly, this protocol is compatible with ChIP-seq technology using standard library preparation methods, thus providing global epigenomic maps in highly relevant embryonic tissues.

  17. Integrating QoS and security functions in an IP-VPN gateway

    NASA Astrophysics Data System (ADS)

    Fan, Kuo-Pao; Chang, Shu-Hsin; Lin, Kuan-Ming; Pen, Mau-Jy

    2001-10-01

    IP-based Virtual Private Network becomes more and more popular. It can not only reduce the enterprise communication cost but also increase the revenue of the service provider. The common IP-VPN application types include Intranet VPN, Extranet VPN, and remote access VPN. For the large IP-VPN market, some vendors develop dedicated IP-VPN devices; while some vendors add the VPN functions into their existing network equipment such as router, access gateway, etc. The functions in the IP-VPN device include security, QoS, and management. The common security functions supported are IPSec (IP Security), IKE (Internet Key Exchange), and Firewall. The QoS functions include bandwidth control and packet scheduling. In the management component, policy-based network management is under standardization in IETF. In this paper, we discuss issues on how to integrate the QoS and security functions in an IP-VPN Gateway. We propose three approaches to do this. They are (1) perform Qos first (2) perform IPSec first and (3) reserve fixed bandwidth for IPSec. We also compare the advantages and disadvantages of the three proposed approaches.

  18. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  19. Integration of the White Sands Complex into a Wide Area Network

    NASA Technical Reports Server (NTRS)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  20. Robust Kriged Kalman Filtering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baingana, Brian; Dall'Anese, Emiliano; Mateos, Gonzalo

    2015-11-11

    Although the kriged Kalman filter (KKF) has well-documented merits for prediction of spatial-temporal processes, its performance degrades in the presence of outliers due to anomalous events, or measurement equipment failures. This paper proposes a robust KKF model that explicitly accounts for presence of measurement outliers. Exploiting outlier sparsity, a novel l1-regularized estimator that jointly predicts the spatial-temporal process at unmonitored locations, while identifying measurement outliers is put forth. Numerical tests are conducted on a synthetic Internet protocol (IP) network, and real transformer load data. Test results corroborate the effectiveness of the novel estimator in joint spatial prediction and outlier identification.

  1. Technology-assisted psychoanalysis.

    PubMed

    Scharff, Jill Savege

    2013-06-01

    Teleanalysis-remote psychoanalysis by telephone, voice over internet protocol (VoIP), or videoteleconference (VTC)-has been thought of as a distortion of the frame that cannot support authentic analytic process. Yet it can augment continuity, permit optimum frequency of analytic sessions for in-depth analytic work, and enable outreach to analysands in areas far from specialized psychoanalytic centers. Theoretical arguments against teleanalysis are presented and countered and its advantages and disadvantages discussed. Vignettes of analytic process from teleanalytic sessions are presented, and indications, contraindications, and ethical concerns are addressed. The aim is to provide material from which to judge the authenticity of analytic process supported by technology.

  2. Joint Fire Support in 2020: Development of a Future Joint Fires Systems Architecture for Immediate, Unplanned Targets

    DTIC Science & Technology

    2006-12-01

    Undersea Warfare Commander VHF Very High Frequency VoIP Voice over Internet Protocol WCS Weapons...USN surface and undersea warfare, USN and USA communications and networking operations, and USAF acquisition and aircraft maintenance projects. In...kin g 1 x x BN -R EG T- BD E Co or di na tio n 1 x x x x Pr ov id in g Ba tte ry Ta sk in g, E ng ag e, C oo rd in at io n 1 1 x x x Pr ov id in

  3. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets

    PubMed Central

    Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently. PMID:28968450

  4. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    PubMed

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  5. Scalable parallel communications

    NASA Technical Reports Server (NTRS)

    Maly, K.; Khanna, S.; Overstreet, C. M.; Mukkamala, R.; Zubair, M.; Sekhar, Y. S.; Foudriat, E. C.

    1992-01-01

    Coarse-grain parallelism in networking (that is, the use of multiple protocol processors running replicated software sending over several physical channels) can be used to provide gigabit communications for a single application. Since parallel network performance is highly dependent on real issues such as hardware properties (e.g., memory speeds and cache hit rates), operating system overhead (e.g., interrupt handling), and protocol performance (e.g., effect of timeouts), we have performed detailed simulations studies of both a bus-based multiprocessor workstation node (based on the Sun Galaxy MP multiprocessor) and a distributed-memory parallel computer node (based on the Touchstone DELTA) to evaluate the behavior of coarse-grain parallelism. Our results indicate: (1) coarse-grain parallelism can deliver multiple 100 Mbps with currently available hardware platforms and existing networking protocols (such as Transmission Control Protocol/Internet Protocol (TCP/IP) and parallel Fiber Distributed Data Interface (FDDI) rings); (2) scale-up is near linear in n, the number of protocol processors, and channels (for small n and up to a few hundred Mbps); and (3) since these results are based on existing hardware without specialized devices (except perhaps for some simple modifications of the FDDI boards), this is a low cost solution to providing multiple 100 Mbps on current machines. In addition, from both the performance analysis and the properties of these architectures, we conclude: (1) multiple processors providing identical services and the use of space division multiplexing for the physical channels can provide better reliability than monolithic approaches (it also provides graceful degradation and low-cost load balancing); (2) coarse-grain parallelism supports running several transport protocols in parallel to provide different types of service (for example, one TCP handles small messages for many users, other TCP's running in parallel provide high bandwidth service to a single application); and (3) coarse grain parallelism will be able to incorporate many future improvements from related work (e.g., reduced data movement, fast TCP, fine-grain parallelism) also with near linear speed-ups.

  6. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

    PubMed Central

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. PMID:25945177

  7. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    PubMed

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  8. Implementation of a Web-Based Organ Donation Educational Intervention: Development and Use of a Refined Process Evaluation Model

    PubMed Central

    Harker, Laura; Bamps, Yvan; Flemming, Shauna St. Clair; Perryman, Jennie P; Thompson, Nancy J; Patzer, Rachel E; Williams, Nancy S DeSousa; Arriola, Kimberly R Jacob

    2017-01-01

    Background The lack of available organs is often considered to be the single greatest problem in transplantation today. Internet use is at an all-time high, creating an opportunity to increase public commitment to organ donation through the broad reach of Web-based behavioral interventions. Implementing Internet interventions, however, presents challenges including preventing fraudulent respondents and ensuring intervention uptake. Although Web-based organ donation interventions have increased in recent years, process evaluation models appropriate for Web-based interventions are lacking. Objective The aim of this study was to describe a refined process evaluation model adapted for Web-based settings and used to assess the implementation of a Web-based intervention aimed to increase organ donation among African Americans. Methods We used a randomized pretest-posttest control design to assess the effectiveness of the intervention website that addressed barriers to organ donation through corresponding videos. Eligible participants were African American adult residents of Georgia who were not registered on the state donor registry. Drawing from previously developed process evaluation constructs, we adapted reach (the extent to which individuals were found eligible, and participated in the study), recruitment (online recruitment mechanism), dose received (intervention uptake), and context (how the Web-based setting influenced study implementation) for Internet settings and used the adapted model to assess the implementation of our Web-based intervention. Results With regard to reach, 1415 individuals completed the eligibility screener; 948 (67.00%) were determined eligible, of whom 918 (96.8%) completed the study. After eliminating duplicate entries (n=17), those who did not initiate the posttest (n=21) and those with an invalid ZIP code (n=108), 772 valid entries remained. Per the Internet protocol (IP) address analysis, only 23 of the 772 valid entries (3.0%) were within Georgia, and only 17 of those were considered unique entries and could be considered for analyses. With respect to recruitment, 517 of the 772 valid entries (67.0%) of participants were recruited from a Web recruiter. Regarding dose received, no videos from the intervention website were watched in their entirety, and the average viewing duration was 17 seconds over the minimum. With respect to context, context analysis provided us with valuable insights into factors in the Internet environment that may have affected study implementation. Although only active for a brief period of time, the Craigslist website advertisement may have contributed the largest volume of fraudulent responses. Conclusions We determined fraud and low uptake to be serious threats to this study and further confirmed the importance of conducting a process evaluation to identify such threats. We suggest checking participants’ IP addresses before study initiation, selecting software that allows for automatic duplicate protection, and tightening minimum requirements for intervention uptake. Further research is needed to understand how process evaluation models can be used to monitor implementation of Web-based studies. PMID:29191799

  9. Implementation of a Web-Based Organ Donation Educational Intervention: Development and Use of a Refined Process Evaluation Model.

    PubMed

    Redmond, Nakeva; Harker, Laura; Bamps, Yvan; Flemming, Shauna St Clair; Perryman, Jennie P; Thompson, Nancy J; Patzer, Rachel E; Williams, Nancy S DeSousa; Arriola, Kimberly R Jacob

    2017-11-30

    The lack of available organs is often considered to be the single greatest problem in transplantation today. Internet use is at an all-time high, creating an opportunity to increase public commitment to organ donation through the broad reach of Web-based behavioral interventions. Implementing Internet interventions, however, presents challenges including preventing fraudulent respondents and ensuring intervention uptake. Although Web-based organ donation interventions have increased in recent years, process evaluation models appropriate for Web-based interventions are lacking. The aim of this study was to describe a refined process evaluation model adapted for Web-based settings and used to assess the implementation of a Web-based intervention aimed to increase organ donation among African Americans. We used a randomized pretest-posttest control design to assess the effectiveness of the intervention website that addressed barriers to organ donation through corresponding videos. Eligible participants were African American adult residents of Georgia who were not registered on the state donor registry. Drawing from previously developed process evaluation constructs, we adapted reach (the extent to which individuals were found eligible, and participated in the study), recruitment (online recruitment mechanism), dose received (intervention uptake), and context (how the Web-based setting influenced study implementation) for Internet settings and used the adapted model to assess the implementation of our Web-based intervention. With regard to reach, 1415 individuals completed the eligibility screener; 948 (67.00%) were determined eligible, of whom 918 (96.8%) completed the study. After eliminating duplicate entries (n=17), those who did not initiate the posttest (n=21) and those with an invalid ZIP code (n=108), 772 valid entries remained. Per the Internet protocol (IP) address analysis, only 23 of the 772 valid entries (3.0%) were within Georgia, and only 17 of those were considered unique entries and could be considered for analyses. With respect to recruitment, 517 of the 772 valid entries (67.0%) of participants were recruited from a Web recruiter. Regarding dose received, no videos from the intervention website were watched in their entirety, and the average viewing duration was 17 seconds over the minimum. With respect to context, context analysis provided us with valuable insights into factors in the Internet environment that may have affected study implementation. Although only active for a brief period of time, the Craigslist website advertisement may have contributed the largest volume of fraudulent responses. We determined fraud and low uptake to be serious threats to this study and further confirmed the importance of conducting a process evaluation to identify such threats. We suggest checking participants' IP addresses before study initiation, selecting software that allows for automatic duplicate protection, and tightening minimum requirements for intervention uptake. Further research is needed to understand how process evaluation models can be used to monitor implementation of Web-based studies. ©Nakeva Redmond, Laura Harker, Yvan Bamps, Shauna St. Clair Flemming, Jennie P Perryman, Nancy J Thompson, Rachel E Patzer, Nancy S DeSousa Williams, Kimberly R Jacob Arriola. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 30.11.2017.

  10. Building-in-Briefcase: A Rapidly-Deployable Environmental Sensor Suite for the Smart Building.

    PubMed

    Weekly, Kevin; Jin, Ming; Zou, Han; Hsu, Christopher; Soyza, Chris; Bayen, Alexandre; Spanos, Costas

    2018-04-29

    A building’s environment has profound influence on occupant comfort and health. Continuous monitoring of building occupancy and environment is essential to fault detection, intelligent control, and building commissioning. Though many solutions for environmental measuring based on wireless sensor networks exist, they are not easily accessible to households and building owners who may lack time or technical expertise needed to set up a system and get quick and detailed overview of environmental conditions. Building-in-Briefcase (BiB) is a portable sensor network platform that is trivially easy to deploy in any building environment. Once the sensors are distributed, the environmental data is collected and communicated to the BiB router via the Transmission Control Protocol/Internet Protocol (TCP/IP) and WiFi technology, which then forwards the data to the central database securely over the internet through a 3G radio. The user, with minimal effort, can access the aggregated data and visualize the trends in real time on the BiB web portal. Paramount to the adoption and continued operation of an indoor sensing platform is battery lifetime. This design has achieved a multi-year lifespan by careful selection of components, an efficient binary communications protocol and data compression. Our BiB sensor is capable of collecting a rich set of environmental parameters, and is expandable to measure others, such as CO 2 . This paper describes the power characteristics of BiB sensors and their occupancy estimation and activity recognition functionality. We have demonstrated large-scale deployment of BiB throughout Singapore. Our vision is that, by monitoring thousands of buildings through BiB, it would provide ample research opportunities and opportunities to identify ways to improve the building environment and energy efficiency.

  11. Building-in-Briefcase: A Rapidly-Deployable Environmental Sensor Suite for the Smart Building

    PubMed Central

    Weekly, Kevin; Jin, Ming; Zou, Han; Hsu, Christopher; Soyza, Chris; Bayen, Alexandre; Spanos, Costas

    2018-01-01

    A building’s environment has profound influence on occupant comfort and health. Continuous monitoring of building occupancy and environment is essential to fault detection, intelligent control, and building commissioning. Though many solutions for environmental measuring based on wireless sensor networks exist, they are not easily accessible to households and building owners who may lack time or technical expertise needed to set up a system and get quick and detailed overview of environmental conditions. Building-in-Briefcase (BiB) is a portable sensor network platform that is trivially easy to deploy in any building environment. Once the sensors are distributed, the environmental data is collected and communicated to the BiB router via the Transmission Control Protocol/Internet Protocol (TCP/IP) and WiFi technology, which then forwards the data to the central database securely over the internet through a 3G radio. The user, with minimal effort, can access the aggregated data and visualize the trends in real time on the BiB web portal. Paramount to the adoption and continued operation of an indoor sensing platform is battery lifetime. This design has achieved a multi-year lifespan by careful selection of components, an efficient binary communications protocol and data compression. Our BiB sensor is capable of collecting a rich set of environmental parameters, and is expandable to measure others, such as CO2. This paper describes the power characteristics of BiB sensors and their occupancy estimation and activity recognition functionality. We have demonstrated large-scale deployment of BiB throughout Singapore. Our vision is that, by monitoring thousands of buildings through BiB, it would provide ample research opportunities and opportunities to identify ways to improve the building environment and energy efficiency. PMID:29710839

  12. Chromatin immunoprecipitation in microfluidic droplets: towards fast and cheap analyses.

    PubMed

    Teste, Bruno; Champ, Jerome; Londono-Vallejo, Arturo; Descroix, Stéphanie; Malaquin, Laurent; Viovy, Jean-Louis; Draskovic, Irena; Mottet, Guillaume

    2017-01-31

    Genetic organization is governed by the interaction of DNA with histone proteins, and differential modifications of these proteins is a fundamental mechanism of gene regulation. Histone modifications are primarily studied through chromatin immunoprecipitation (ChIP) assays, however conventional ChIP procedures are time consuming, laborious and require a large number of cells. Here we report for the first time the development of ChIP in droplets based on a microfluidic platform combining nanoliter droplets, magnetic beads (MB) and magnetic tweezers (MT). The droplet approach enabled compartmentalization and improved mixing, while reducing the consumption of samples and reagents in an integrated workflow. Anti-histone antibodies grafted to MB were used as a solid support to capture and transfer the target chromatin from droplets to droplets in order to perform chromatin immunoprecipitation, washing, elution and purification of DNA. We designed a new ChIP protocol to investigate four different types of modified histones with known roles in gene activation or repression. We evaluated the performances of this new ChIP in droplet assay in comparison with conventional methods. The proposed technology dramatically reduces analytical time from a few days to 7 hours, simplifies the ChIP protocol and decreases the number of cells required by 100 fold while maintaining a high degree of sensitivity and specificity. Therefore this droplet-based ChIP assay represents a new, highly advantageous and convenient approach to epigenetic analyses.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bauer, Gerry; et al.

    The DAQ system of the CMS experiment at CERN collects data from more than 600 custom detector Front-End Drivers (FEDs). During 2013 and 2014 the CMS DAQ system will undergo a major upgrade to address the obsolescence of current hardware and the requirements posed by the upgrade of the LHC accelerator and various detector components. For a loss-less data collection from the FEDs a new FPGA based card implementing the TCP/IP protocol suite over 10Gbps Ethernet has been developed. To limit the TCP hardware implementation complexity the DAQ group developed a simplified and unidirectional but RFC 793 compliant version ofmore » the TCP protocol. This allows to use a PC with the standard Linux TCP/IP stack as a receiver. We present the challenges and protocol modifications made to TCP in order to simplify its FPGA implementation. We also describe the interaction between the simplified TCP and Linux TCP/IP stack including the performance measurements.« less

  14. An algorithm of a real time image tracking system using a camera with pan/tilt motors on an embedded system

    NASA Astrophysics Data System (ADS)

    Kim, Hie-Sik; Nam, Chul; Ha, Kwan-Yong; Ayurzana, Odgeral; Kwon, Jong-Won

    2005-12-01

    The embedded systems have been applied to many fields, including households and industrial sites. The user interface technology with simple display on the screen was implemented more and more. The user demands are increasing and the system has more various applicable fields due to a high penetration rate of the Internet. Therefore, the demand for embedded system is tend to rise. An embedded system for image tracking was implemented. This system is used a fixed IP for the reliable server operation on TCP/IP networks. Using an USB camera on the embedded Linux system developed a real time broadcasting of video image on the Internet. The digital camera is connected at the USB host port of the embedded board. All input images from the video camera are continuously stored as a compressed JPEG file in a directory at the Linux web-server. And each frame image data from web camera is compared for measurement of displacement Vector. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The embedded board utilized the S3C2410 MPU, which used the ARM 920T core form Samsung. The operating system was ported to embedded Linux kernel and mounted of root file system. And the stored images are sent to the client PC through the web browser. It used the network function of Linux and it developed a program with protocol of the TCP/IP.

  15. VON and Its Use in NASA's International Space Station Science Operation

    NASA Technical Reports Server (NTRS)

    Bradford, Robert N.; Chamberlain, Jim

    1999-01-01

    This presentation will provide a brief overview of a International Space Station (ISS) remote user (scientist/experimenter) operation. Specifically, the presentation will show how Voice over IP (VoIP) is integrated into the ISS science payload operation and in the mission voice system. Included will be the details on how a scientist, using VON, will talk to the ISS onboard crew and ground based cadre from a scientist's home location (lab, office or garage) over tile public Internet and science nets. Benefit(s) to tile ISS Program (and taxpayer) and of VoIP versus other implementations also will be presented.

  16. The Role of Sexual Compulsivity, Impulsivity, and Experiential Avoidance in Internet Pornography Use

    ERIC Educational Resources Information Center

    Wetterneck, Chad T.; Burgess, Angela J.; Short, Mary B.; Smith, Angela H.; Cervantes, Maritza E.

    2012-01-01

    Previous research has found that a significant proportion of individuals who use Internet pornography (IP) report that their use is problematic in some area of functioning. Problematic IP use has been conceptualized as an aspect of sexual addiction and as having components of impulsivity and compulsivity. Experiential avoidance also has been…

  17. Examining Correlates of Problematic Internet Pornography Use Among University Students

    PubMed Central

    Harper, Cody; Hodgins, David C.

    2016-01-01

    Background and aims The phenomenon of Internet pornography (IP) addiction is gainingincreasing attention in the popular media and psychological research. What has not been tested empirically is how frequency and amount ofIP use, along with other individual characteristics, are related tosymptoms of IP addiction. Methods 105 female and 86 male university students (mean age 21) from Calgary,Canada, were administered measures of IP use, psychosocial functioning (anxiety and depression, life and relationship satisfaction), addictivepropensities, and addictive IP use. Results Men reported earlier age of exposure and more frequent current IP use than women. Individuals not in relationships reported more frequent use than those in relationships. Frequency of IP use wasnot generally correlated with psychosocial functioning but was significantly positively correlated with level of IP addiction. Higher level of IP addiction was associated with poorer psychosocial functioning and problematic alcohol, cannabis, gambling and, in particular, video game use. A curvilinear association was found between frequency of IP use and level of addiction such that daily or greater IP use was associated with a sharp rise in addictive IP scores. Discussion The failure to find a strong significant relationship between IP use and general psychosocial functioning suggests that the overall effect of IP use is not necessarily harmful in and of itself. Addictiveuse of IP, which is associated with poorer psychosocial functioning, emerges when people begin to use IP daily. PMID:27156383

  18. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  19. The Moderating Effects of Internet Parenting Styles on the Relationship between Internet Parenting Behavior, Internet Expectancy, and Internet Addiction Tendency

    ERIC Educational Resources Information Center

    Chou, Chien; Lee, Yuan-Hsuan

    2017-01-01

    This study investigated the moderating effect of children's perceived Internet parenting styles (IPS) on the relationship among their perceived Internet parenting behaviors (operationalized as warmth and control on Internet use from their parents), Internet expectancy (IE), and Internet addiction tendency (IAT). Participants were 3169 Taiwanese…

  20. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  1. Examining Correlates of Problematic Internet Pornography Use Among University Students.

    PubMed

    Harper, Cody; Hodgins, David C

    2016-06-01

    Background and aims The phenomenon of Internet pornography (IP) addiction is gainingincreasing attention in the popular media and psychological research.What has not been tested empirically is how frequency and amount ofIP use, along with other individual characteristics, are related tosymptoms of IP addiction. Methods 105 female and 86 male university students (mean age 21) from Calgary,Canada, were administered measures of IP use, psychosocial functioning(anxiety and depression, life and relationship satisfaction), addictivepropensities, and addictive IP use. Results Men reported earlier age of exposure and more frequent currentIP use than women. Individuals not in relationships reported morefrequent use than those in relationships. Frequency of IP use wasnot generally correlated with psychosocial functioning but was significantlypositively correlated with level of IP addiction. Higher level ofIP addiction was associated with poorer psychosocial functioning andproblematic alcohol, cannabis, gambling and, in particular, videogame use. A curvilinear association was found between frequency ofIP use and level of addiction such that daily or greater IP use wasassociated with a sharp rise in addictive IP scores. Discussion The failure to find a strong significant relationship between IPuse and general psychosocial functioning suggests that the overalleffect of IP use is not necessarily harmful in and of itself. Addictiveuse of IP, which is associated with poorer psychosocial functioning,emerges when people begin to use IP daily.

  2. SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach

    NASA Astrophysics Data System (ADS)

    Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore

    The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.

  3. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    PubMed Central

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863

  4. Achieving QoS for TCP Traffic in Satellite Networks with Differentiated Services

    NASA Technical Reports Server (NTRS)

    Durresi, Arjan; Kota, Sastri; Goyal, Mukul; Jain, Raj; Bharani, Venkata

    2001-01-01

    Satellite networks play an indispensable role in providing global Internet access and electronic connectivity. To achieve such a global communications, provisioning of quality of service (QoS) within the advanced satellite systems is the main requirement. One of the key mechanisms of implementing the quality of service is traffic management. Traffic management becomes a crucial factor in the case of satellite network because of the limited availability of their resources. Currently, Internet Protocol (IP) only has minimal traffic management capabilities and provides best effort services. In this paper, we presented a broadband satellite network QoS model and simulated performance results. In particular, we discussed the TCP flow aggregates performance for their good behavior in the presence of competing UDP flow aggregates in the same assured forwarding. We identified several factors that affect the performance in the mixed environments and quantified their effects using a full factorial design of experiment methodology.

  5. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  6. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  7. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  8. Experiences with the AEROnet/PSCN ATM Prototype

    NASA Technical Reports Server (NTRS)

    Kurak, Richard S.; Lisotta, Anthony J.; McCabe, James D.; Nothaft, Alfred E.; Russell, Kelly R.; Lasinski, T. A. (Technical Monitor)

    1995-01-01

    This paper discusses the experience gained by the AEROnet/PSCN networking team in deploying a prototype Asynchronous Transfer Mode (ATM) based network as part of the wide-area network for the Numerical Aerodynamic Simulation (NAS) Program at NASA Ames Research Center. The objectives of this prototype were to test concepts in using ATM over wide-area Internet Protocol (IP) networks and measure end-to-end system performance. This testbed showed that end-to-end ATM over a DS3 reaches approximately 80% of the throughput achieved from a FDDI to DS3 network. The 20% reduction in through-put can be attributed to the overhead associated with running ATM. As a result, we conclude that if the loss in capacity due to ATM overhead is balanced by the reduction in cost of ATM services, as compared to dedicated circuits, then ATM can be a viable alternative.

  9. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  10. Seven years of clinical experience with teleconsultation in craniomaxillofacial surgery.

    PubMed

    Ewers, Rolf; Schicho, Kurt; Wagner, Arne; Undt, Gerhard; Seemann, Rudolf; Figl, Michael; Truppe, Michael

    2005-10-01

    In this work the experiences from 50 telemedically supported treatments in craniomaxillofacial surgery are summarized and different setups for their technical realization are described. Furthermore, for the first time the innovative UMTS (universal mobile telecommunication system) is applied for the transmission of arthroscopic videos of the temporomandibular joint and other craniomaxillofacial structures. The combination of computer-assisted navigation technology in augmented reality environments with telecommunication is used for execution of interactive stereotaxic teleconsultation. Furthermore, treatments without navigation are telemedically supported. This study is composed of 4 technical system configurations: 1) integrated services digital network (ISDN)-based videoconferencing without remote control of the navigation computer; 2) transmission control protocol/internet protocol (TCP/IP)-based interactive teleconsultation via bundled ISDN lines (including remote control of the navigation computer); 3) TCP/IP-based interactive teleconsultation via network; 4) combination of TCP/IP-connection and ISDN-based videoconferencing. The telemedically supported treatments are: orbitozygomatic osteotomies, positioning of the mandibular condyle in orthognathic surgery, insertion of implants, positioning of the maxilla in orthognathic surgery, distraction osteogenesis, arthroscopies of the temporomandibular joint, and operation simulations on stereolithographic models. The surgical interventions are evaluated on a 5-level system performance scale from the technical point of view. In a separate trial 20 videosequences of arthroscopies of the temporomandibular joint are transmitted via UMTS cellular phones and independently evaluated by 3 experts (ie, a total of 60 streamings) to investigate feasibility of this technology in the field of craniomaxillofacial surgery. In the years from 1996 to 2002 a total of 50 treatments were telemedically supported. All intraoperative applications were successfully finished; 48 of 60 UMTS transmissions were finished without any interruptions in constant quality, slight interruptions were observed in 8 tests, and a complete breakdown was observed during 4 streamings that required a restart of the transmission. Resolution was sufficient to diagnose even tiny anatomic structures inside the temporomandibular joint, but orientation was hardly recognizable. In many applications telecommunication technology can contribute to a quality improvement in cranio- and maxillofacial surgery because of the global availability of specialized knowledge. The required technical expenditure for teleconsultation crucially depends on the infrastructure that is already available at the clinic and the remote site. UMTS is a promising technology with the potential to be valuable in numerous craniomaxillofacial applications.

  11. Identifying multiple submissions in Internet research: preserving data integrity.

    PubMed

    Bowen, Anne M; Daniel, Candice M; Williams, Mark L; Baird, Grayson L

    2008-11-01

    Internet-based sexuality research with hidden populations has become increasingly popular. Respondent anonymity may encourage participation and lower social desirability, but associated disinhibition may promote multiple submissions, especially when incentives are offered. The goal of this study was to identify the usefulness of different variables for detecting multiple submissions from repeat responders and to explore incentive effects. The data included 1,900 submissions from a three-session Internet intervention with a pretest and three post-test questionnaires. Participants were men who have sex with men and incentives were offered to rural participants for completing each questionnaire. The final number of submissions included 1,273 "unique", 132 first submissions by "repeat responders" and 495 additional submissions by the "repeat responders" (N = 1,900). Four categories of repeat responders were identified: "infrequent" (2-5 submissions), "persistent" (6-10 submissions), "very persistent" (11-30 submissions), and "hackers" (more than 30 submissions). Internet Provider (IP) addresses, user names, and passwords were the most useful for identifying "infrequent" repeat responders. "Hackers" often varied their IP address and identifying information to prevent easy identification, but investigating the data for small variations in IP, using reverse telephone look up, and patterns across usernames and passwords were helpful. Incentives appeared to play a role in stimulating multiple submissions, especially from the more sophisticated "hackers". Finally, the web is ever evolving and it will be necessary to have good programmers and staff who evolve as fast as "hackers".

  12. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.

    PubMed

    Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan

    2015-09-22

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.

  13. Telecare and Social Link Solution for Ambient Assisted Living Using a Robot Companion with Visiophony

    NASA Astrophysics Data System (ADS)

    Varène, Thibaut; Hillereau, Paul; Simonnet, Thierry

    An increasing number of people are in need of help at home (elderly, isolated and/or disabled persons; people with mild cognitive impairment). Several solutions can be considered to maintain a social link while providing tele-care to these people. Many proposals suggest the use of a robot acting as a companion. In this paper we will look at an environment constrained solution, its drawbacks (such as latency) and its advantages (flexibility, integration…). A key design choice is to control the robot using a unified Voice over Internet Protocol (VoIP) solution, while addressing bandwidth limitations, providing good communication quality and reducing transmission latency

  14. LIS–lnterlink—connecting laboratory information systems to remote primary health–care centres via the Internet

    PubMed Central

    Clark, Barry; Wachowiak, Bartosz; Crawford, Ewan W.; Jakubowski, Zenon; Kabata, Janusz

    1998-01-01

    A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLinkTM LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP ‘get’ and ‘post’ operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols. PMID:18924820

  15. LIS-lnterlink-connecting laboratory information systems to remote primary health-care centres via the Internet.

    PubMed

    Clark, B; Wachowiak, B; Crawford, E W; Jakubowski, Z; Kabata, J

    1998-01-01

    A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLink(TM) LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP 'get' and 'post' operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols.

  16. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  17. Naval Postgraduate School Research. Volume 11, Number 2, June 2001

    DTIC Science & Technology

    2001-06-01

    Asynchronous Transfer Mode Protocols for Communi- cation of TCP / IP Based Voice, Video and Data over Long Delay Wireless Links.” LCDR Bermingham is...accurate, DD-21 is planned to employ an Integrated Power System ( IPS ), where both ship service and ship propulsion power are derived from a common set...electric drive and to shipboard distribu- tion. The advantages of electric drive and IPS are manifold including: a reduction in the number of prime movers

  18. Design and Evaluation for the End-to-End Detection of TCP/IP Header Manipulation

    DTIC Science & Technology

    2014-06-01

    Cooperative Association for Internet Data Analysis CDN content delivery network CE congestion encountered CRC cyclic redundancy check CWR congestion...Switzerland was primarily developed as a network neutrality analysis tool to detect when internet service providers (ISPs) were interfering with...maximum 200 words) Understanding, measuring, and debugging IP networks , particularly across administrative domains, is challenging. One aspect of the

  19. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  20. DARPA Internet Program. Internet and Transmission Control Specifications,

    DTIC Science & Technology

    1981-09-01

    Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information

  1. Real-time capability of GEONET system and its application to crust monitoring

    NASA Astrophysics Data System (ADS)

    Yamagiwa, Atsushi; Hatanaka, Yuki; Yutsudo, Toru; Miyahara, Basara

    2006-03-01

    The GPS Earth Observation Network system (GEONET) has been playing an important role in monitoring the crustal deformation of Japan. Since its start of operation, the requirements for accuracy and timeliness have become higher and higher. On the other hand, recent broadband communication infrastructure has had capability to realize real-time crust monitoring and to aid the development of a location-based service. In early 2003, the Geographical Survey Institute (GSI) upgraded the GEONET system to meet new requirements. The number of stations became 1200 in total by March, 2003. The antennas were unified to the choke ring antennas of Dorne Margolin T-type and the receivers were replaced with new ones that are capable of real-time observation and data transfer. The new system uses IP-connection through IP-VPN (Internet Protocol Virtual Private Network) for data transfer, which is provided by communication companies. The Data Processing System, which manages the observation data and analyses in GEONET, has 7 units. GEONET carries out three kinds of routine analyses and an analysis of RTK-type for emergencies. The new system has shown its capability for real-time crust monitoring, for example, the precise and rapid detection of coseismic (and post-seismic) motion caused by 2003 Tokachi-Oki earthquake.

  2. Internet-based videoconferencing and data collaboration for the imaging community.

    PubMed

    Poon, David P; Langkals, John W; Giesel, Frederik L; Knopp, Michael V; von Tengg-Kobligk, Hendrik

    2011-01-01

    Internet protocol-based digital data collaboration with videoconferencing is not yet well utilized in the imaging community. Videoconferencing, combined with proven low-cost solutions, can provide reliable functionality and speed, which will improve rapid, time-saving, and cost-effective communications, within large multifacility institutions or globally with the unlimited reach of the Internet. The aim of this project was to demonstrate the implementation of a low-cost hardware and software setup that facilitates global data collaboration using WebEx and GoToMeeting Internet protocol-based videoconferencing software. Both products' features were tested and evaluated for feasibility across 2 different Internet networks, including a video quality and recording assessment. Cross-compatibility with an Apple OS is also noted in the evaluations. Departmental experiences with WebEx pertaining to clinical trials are also described. Real-time remote presentation of dynamic data was generally consistent across platforms. A reliable and inexpensive hardware and software setup for complete Internet-based data collaboration/videoconferencing can be achieved.

  3. Geography-based structural analysis of the Internet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kasiviswanathan, Shiva; Eidenbenz, Stephan; Yan, Guanhua

    2010-01-01

    In this paper, we study some geographic aspects of the Internet. We base our analysis on a large set of geolocated IP hop-level session data (including about 300,000 backbone routers, 150 million end hosts, and 1 billion sessions) that we synthesized from a variety of different input sources such as US census data, computer usage statistics, Internet market share data, IP geolocation data sets, CAJDA's Skitter data set for backbone connectivity, and BGP routing tables. We use this model to perform a nationwide and statewide geographic analysis of the Internet. Our main observations are: (1) There is a dominant coast-to-coastmore » pattern in the US Internet traffic. In fact, in many instances even if the end-devices are not near either coast, still the traffic between them takes a long detour through the coasts. (2) More than half of the Internet paths are inflated by 100% or more compared to their corresponding geometric straight-line distance. This circuitousness makes the average ratio between the routing distance and geometric distance big (around 10). (3) The weighted mean hop count is around 5, but the hop counts are very loosely correlated with the distances. The weighted mean AS count (number of ASes traversed) is around 3. (4) The AS size and the AS location number distributions are heavy-tailed and strongly correlated. Most of the ASes are medium sized and there is a wide variability in the geographic dispersion size (measured in terms of the convex hull area) of these ASes.« less

  4. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  5. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  6. Intranet and Internet metrological workstation with photonic sensors and transmission

    NASA Astrophysics Data System (ADS)

    Romaniuk, Ryszard S.; Pozniak, Krzysztof T.; Dybko, Artur

    1999-05-01

    We describe in this paper a part of a telemetric network which consists of a workstation with photonic measurement and communication interfaces, structural fiber optic cabling (10/100BaseFX and CAN-FL), and photonic sensors with fiber optic interfaces. The station is equipped with direct photonic measurement interface and most common measuring standards converter (RS, GPIB) with fiber optic I/O CAN bus, O/E converters, LAN and modem ports. The station was connected to the Intranet (ipx/spx) and Internet (tcp/ip) with separate IP number and DNS, WINS names. Virtual measuring environment system program was written specially for such an Intranet and Internet station. The measurement system program communicated with the user via a Graphical User's Interface (GUI). The user has direct access to all functions of the measuring station system through appropriate layers of GUI: telemetric, transmission, visualization, processing, information, help and steering of the measuring system. We have carried out series of thorough simulation investigations and tests of the station using WWW subsystem of the Internet. We logged into the system through the LAN and via modem. The Internet metrological station works continuously under the address http://nms.ipe.pw.edu.pl/nms. The station and the system hear the short name NMS (from Network Measuring System).

  7. Influence of Security Mechanisms on the Quality of Service of VoIP

    NASA Astrophysics Data System (ADS)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  8. In-Space Networking on NASA's SCAN Testbed

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Eddy, Wesley M.; Clark, Gilbert J.; Johnson, Sandra K.

    2016-01-01

    The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios and a flight computer for supporting in-space communication research. New technologies being studied using the SCaN Testbed include advanced networking, coding, and modulation protocols designed to support the transition of NASAs mission systems from primarily point to point data links and preplanned routes towards adaptive, autonomous internetworked operations needed to meet future mission objectives. Networking protocols implemented on the SCaN Testbed include the Advanced Orbiting Systems (AOS) link-layer protocol, Consultative Committee for Space Data Systems (CCSDS) Encapsulation Packets, Internet Protocol (IP), Space Link Extension (SLE), CCSDS File Delivery Protocol (CFDP), and Delay-Tolerant Networking (DTN) protocols including the Bundle Protocol (BP) and Licklider Transmission Protocol (LTP). The SCaN Testbed end-to-end system provides three S-band data links and one Ka-band data link to exchange space and ground data through NASAs Tracking Data Relay Satellite System or a direct-to-ground link to ground stations. The multiple data links and nodes provide several upgradable elements on both the space and ground systems. This paper will provide a general description of the testbeds system design and capabilities, discuss in detail the design and lessons learned in the implementation of the network protocols, and describe future plans for continuing research to meet the communication needs for evolving global space systems.

  9. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  10. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  11. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Nichols, Kelvin; Bradford, Robert

    2003-01-01

    This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.

  12. ChIP-nexus: a novel ChIP-exo protocol for improved detection of in vivo transcription factor binding footprints

    PubMed Central

    He, Qiye; Johnston, Jeff; Zeitlinger, Julia

    2014-01-01

    Understanding how eukaryotic enhancers are bound and regulated by specific combinations of transcription factors is still a major challenge. To better map transcription factor binding genome-wide at nucleotide resolution in vivo, we have developed a robust ChIP-exo protocol called ChIP experiments with nucleotide resolution through exonuclease, unique barcode and single ligation (ChIP-nexus), which utilizes an efficient DNA self-circularization step during library preparation. Application of ChIP-nexus to four proteins—human TBP and Drosophila NFkB, Twist and Max— demonstrates that it outperforms existing ChIP protocols in resolution and specificity, pinpoints relevant binding sites within enhancers containing multiple binding motifs and allows the analysis of in vivo binding specificities. Notably, we show that Max frequently interacts with DNA sequences next to its motif, and that this binding pattern correlates with local DNA sequence features such as DNA shape. ChIP-nexus will be broadly applicable to studying in vivo transcription factor binding specificity and its relationship to cis-regulatory changes in humans and model organisms. PMID:25751057

  13. Advances Made in the Next Generation of Satellite Networks

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.

    1999-01-01

    Because of the unique networking characteristics of communications satellites, global satellite networks are moving to the forefront in enhancing national and global information infrastructures. Simultaneously, broadband data services, which are emerging as the major market driver for future satellite and terrestrial networks, are being widely acknowledged as the foundation for an efficient global information infrastructure. In the past 2 years, various task forces and working groups around the globe have identified pivotal topics and key issues to address if we are to realize such networks in a timely fashion. In response, industry, government, and academia undertook efforts to address these topics and issues. A workshop was organized to provide a forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. The Satellite Networks: Architectures, Applications, and Technologies Workshop was hosted by the Space Communication Program at the NASA Lewis Research Center in Cleveland, Ohio. Nearly 300 executives and technical experts from academia, industry, and government, representing the United States and eight other countries, attended the event (June 2 to 4, 1998). The program included seven panels and invited sessions and nine breakout sessions in which 42 speakers presented on technical topics. The proceedings covers a wide range of topics: access technology and protocols, architectures and network simulations, asynchronous transfer mode (ATM) over satellite networks, Internet over satellite networks, interoperability experiments and applications, multicasting, NASA interoperability experiment programs, NASA mission applications, and Transmission Control Protocol/Internet Protocol (TCP/IP) over satellite: issues, relevance, and experience.

  14. Micro-chromatin Immunoprecipation (μChIP) Protocol for Real-time PCR Analysis of a Limited Amount of Cells.

    PubMed

    Gillotin, Sébastien; Guillemot, François

    2016-06-20

    Chromatin immunoprecipitation followed by deep sequencing (ChIP-Seq) is an important strategy to study gene regulation. When availability of cells is limited, however, it can be useful to focus on specific genes to investigate in depth the role of transcription factors or histone marks. Unfortunately, performing ChIP experiments to study transcription factors' binding to DNA can be difficult when biological material is restricted. This protocol describes a robust method to perform μChIP for over-expressed or endogenous transcription factors using ~100,000 cells per ChIP experiment (Masserdotti et al ., 2015). We also describe optimization steps, which we think are critical for this protocol to work and which can be used to further reduce the number of cells.

  15. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    PubMed

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.

  16. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things

    PubMed Central

    Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan

    2015-01-01

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683

  17. 47 CFR 12.3 - 911 and E911 analyses and reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... wireless 911 rules set forth in § 20.18 of this chapter; and interconnected Voice over Internet Protocol... Public Safety and Homeland Security Bureau (PSHSB) has the delegated authority to implement and activate... generation Internet Protocol-based E911 platform. (b) These reports are due 120 days from the date that the...

  18. Motif-based analysis of large nucleotide data sets using MEME-ChIP

    PubMed Central

    Ma, Wenxiu; Noble, William S; Bailey, Timothy L

    2014-01-01

    MEME-ChIP is a web-based tool for analyzing motifs in large DNA or RNA data sets. It can analyze peak regions identified by ChIP-seq, cross-linking sites identified by cLIP-seq and related assays, as well as sets of genomic regions selected using other criteria. MEME-ChIP performs de novo motif discovery, motif enrichment analysis, motif location analysis and motif clustering, providing a comprehensive picture of the DNA or RNA motifs that are enriched in the input sequences. MEME-ChIP performs two complementary types of de novo motif discovery: weight matrix–based discovery for high accuracy; and word-based discovery for high sensitivity. Motif enrichment analysis using DNA or RNA motifs from human, mouse, worm, fly and other model organisms provides even greater sensitivity. MEME-ChIP’s interactive HTML output groups and aligns significant motifs to ease interpretation. this protocol takes less than 3 h, and it provides motif discovery approaches that are distinct and complementary to other online methods. PMID:24853928

  19. ChIP-seq.

    PubMed

    Kim, Tae Hoon; Dekker, Job

    2018-05-01

    Owing to its digital nature, ChIP-seq has become the standard method for genome-wide ChIP analysis. Using next-generation sequencing platforms (notably the Illumina Genome Analyzer), millions of short sequence reads can be obtained. The densities of recovered ChIP sequence reads along the genome are used to determine the binding sites of the protein. Although a relatively small amount of ChIP DNA is required for ChIP-seq, the current sequencing platforms still require amplification of the ChIP DNA by ligation-mediated PCR (LM-PCR). This protocol, which involves linker ligation followed by size selection, is the standard ChIP-seq protocol using an Illumina Genome Analyzer. The size-selected ChIP DNA is amplified by LM-PCR and size-selected for the second time. The purified ChIP DNA is then loaded into the Genome Analyzer. The ChIP DNA can also be processed in parallel for ChIP-chip results. © 2018 Cold Spring Harbor Laboratory Press.

  20. Identifying Multiple Submissions in Internet Research: Preserving Data Integrity

    PubMed Central

    Bowen, Anne M.; Daniel, Candice M.; Williams, Mark L.; Baird, Grayson L.

    2008-01-01

    Internet-based sexuality research with hidden populations has become increasingly popular. Respondent anonymity may encourage participation and lower social desirability, but associated disinhibition may promote multiple submissions, especially when incentives are offered. The goal of this study was to identify the usefulness of different variables for detecting multiple submissions from repeat responders and to explore incentive effects. The data included 1,900 submissions from a three-session Internet intervention with a pretest and three post-test questionnaires. Participants were men who have sex with men and incentives were offered to rural participants for completing each questionnaire. The final number of submissions included 1,273 “unique”, 132 first submissions by “repeat responders” and 495 additional submissions by the “repeat responders” (N = 1,900). Four categories of repeat responders were identified: “infrequent” (2–5 submissions), “persistent” (6–10 submissions), “very persistent” (11–30 submissions), and “hackers” (more than 30 submissions). Internet Provider (IP) addresses, user names, and passwords were the most useful for identifying “infrequent” repeat responders. “Hackers” often varied their IP address and identifying information to prevent easy identification, but investigating the data for small variations in IP, using reverse telephone look up, and patterns across usernames and passwords were helpful. Incentives appeared to play a role in stimulating multiple submissions, especially from the more sophisticated “hackers”. Finally, the web is ever evolving and it will be necessary to have good programmers and staff who evolve as fast as “hackers”. PMID:18240015

  1. Research of future network with multi-layer IP address

    NASA Astrophysics Data System (ADS)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  2. Validation of the Pangao PG-800A11 wrist device assessed according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Xie, Peigen; Wang, Yanling; Xu, Xiaoying; Huang, Fei; Pan, Jingru

    2015-04-01

    The objective of this study was to determine the accuracy of the Pangao PG-800A11 wrist blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the protocol of the British Hypertension Society (BHS). The device evaluations were performed in 85 participants, 33 of whom were included according to the ESH-IP revision 2010 and 52 of whom were included on the basis of the requirements of the BHS protocol. The validation procedure and data analysis followed the protocols precisely. The device achieved an A/A grading for the BHS protocol and passed all phases of the ESH-IP revision 2010 protocol. The mean difference ±SD for the ESH and BHS protocols, respectively, was -0.6±4.5 and -0.8±6.2 mmHg for systolic pressure and 1.2±4.6 and -0.5±5.1 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low, medium, and high-pressure ranges. The Pangao PG-800A11 wrist blood pressure monitor passed all requirements of the ESH-IP revision 2010 and achieved A/A grade of the BHS protocol in an adult population.

  3. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  4. Delay and Disruption Tolerant Networking MACHETE Model

    NASA Technical Reports Server (NTRS)

    Segui, John S.; Jennings, Esther H.; Gao, Jay L.

    2011-01-01

    To verify satisfaction of communication requirements imposed by unique missions, as early as 2000, the Communications Networking Group at the Jet Propulsion Laboratory (JPL) saw the need for an environment to support interplanetary communication protocol design, validation, and characterization. JPL's Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in Simulator of Space Communication Networks (NPO-41373) NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various commercial, non-commercial, and in-house custom tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. As NASA is expanding its Space Communications and Navigation (SCaN) capabilities to support planned and future missions, building infrastructure to maintain services and developing enabling technologies, an important and broader role is seen for MACHETE in design-phase evaluation of future SCaN architectures. To support evaluation of the developing Delay Tolerant Networking (DTN) field and its applicability for space networks, JPL developed MACHETE models for DTN Bundle Protocol (BP) and Licklider/Long-haul Transmission Protocol (LTP). DTN is an Internet Research Task Force (IRTF) architecture providing communication in and/or through highly stressed networking environments such as space exploration and battlefield networks. Stressed networking environments include those with intermittent (predictable and unknown) connectivity, large and/or variable delays, and high bit error rates. To provide its services over existing domain specific protocols, the DTN protocols reside at the application layer of the TCP/IP stack, forming a store-and-forward overlay network. The key capabilities of the Bundle Protocol include custody-based reliability, the ability to cope with intermittent connectivity, the ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses.

  5. Preparation of Low-Input and Ligation-Free ChIP-seq Libraries Using Template-Switching Technology.

    PubMed

    Bolduc, Nathalie; Lehman, Alisa P; Farmer, Andrew

    2016-10-10

    Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) has become the gold standard for mapping of transcription factors and histone modifications throughout the genome. However, for ChIP experiments involving few cells or targeting low-abundance transcription factors, the small amount of DNA recovered makes ligation of adapters very challenging. In this unit, we describe a ChIP-seq workflow that can be applied to small cell numbers, including a robust single-tube and ligation-free method for preparation of sequencing libraries from sub-nanogram amounts of ChIP DNA. An example ChIP protocol is first presented, resulting in selective enrichment of DNA-binding proteins and cross-linked DNA fragments immobilized on beads via an antibody bridge. This is followed by a protocol for fast and easy cross-linking reversal and DNA recovery. Finally, we describe a fast, ligation-free library preparation protocol, featuring DNA SMART technology, resulting in samples ready for Illumina sequencing. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  6. Teaching and Learning Foreign Languages via System of "Voice over Internet Protocol" and Language Interactions Case Study: Skype

    ERIC Educational Resources Information Center

    Wahid, Wazira Ali Abdul; Ahmed, Eqbal Sulaiman; Wahid, Muntaha Ali Abdul

    2015-01-01

    This issue expresses a research study based on the online interactions of English teaching specially conversation through utilizing VOIP (Voice over Internet Protocol) and cosmopolitan online theme. Data has been achieved by interviews. Simplifiers indicate how oral tasks require to be planned upon to facilitate engagement models propitious to…

  7. Sequential ChIP Protocol for Profiling Bivalent Epigenetic Modifications (ReChIP).

    PubMed

    Desvoyes, Bénédicte; Sequeira-Mendes, Joana; Vergara, Zaida; Madeira, Sofia; Gutierrez, Crisanto

    2018-01-01

    Identification of chromatin modifications, e.g., histone acetylation and methylation, among others, is widely carried out by using a chromatin immunoprecipitation (ChIP) strategy. The information obtained with these procedures is useful to gain an overall picture of modifications present in all cells of the population under study. It also serves as a basis to figure out the mechanisms of chromatin organization and gene regulation at the population level. However, the ultimate goal is to understand gene regulation at the level of single chromatin fibers. This requires the identification of chromatin modifications that occur at a given genomic location and within the same chromatin fiber. This is achieved by following a sequential ChIP strategy using two antibodies to distinguish different chromatin modifications. Here, we describe a sequential ChIP protocol (Re-ChIP), paying special attention to the controls needed and the required steps to obtain meaningful and reproducible results. The protocol is developed for young Arabidopsis seedlings but could be adapted to other plant materials.

  8. 75 FR 17584 - Schools and Libraries Universal Service Support Mechanism

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-07

    ... libraries may receive discounts for eligible telecommunications services, Internet access, and internal... service, Internet access, internal connections, basic maintenance of internal connections, and... VoIP be listed in both the telecommunications and Internet access categories of the ESL, despite the...

  9. Improving UDP/IP Transmission Without Increasing Congestion

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    2006-01-01

    Datagram Retransmission (DGR) is a computer program that, within certain limits, ensures the reception of each datagram transmitted under the User Datagram Protocol/Internet Protocol. [User Datagram Protocol (UDP) is considered unreliable because it does not involve a reliability-ensuring connection-initiation dialogue between sender and receiver. UDP is well suited to issuing of many small messages to many different receivers.] Unlike prior software for ensuring reception of UDP datagrams, DGR does not contribute to network congestion by retransmitting data more frequently as an ever-increasing number of messages and acknowledgements is lost. Instead, DGR does just the opposite: DGR includes an adaptive timeout-interval- computing component that provides maximum opportunity for reception of acknowledgements, minimizing retransmission. By monitoring changes in the rate at which message-transmission transactions are completed, DGR detects changes in the level of congestion and responds by imposing varying degrees of delay on the transmission of new messages. In addition, DGR maximizes throughput by not waiting for acknowledgement of a message before sending the next message. All DGR communication is asynchronous, to maximize efficient utilization of network connections. DGR manages multiple concurrent datagram transmission and acknowledgement conversations.

  10. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  11. Integrated Operations Architecture Technology Assessment Study

    NASA Technical Reports Server (NTRS)

    2001-01-01

    As part of NASA's Integrated Operations Architecture (IOA) Baseline, NASA will consolidate all communications operations. including ground-based, near-earth, and deep-space communications, into a single integrated network. This network will make maximum use of commercial equipment, services and standards. It will be an Internet Protocol (IP) based network. This study supports technology development planning for the IOA. The technical problems that may arise when LEO mission spacecraft interoperate with commercial satellite services were investigated. Commercial technology and services that could support the IOA were surveyed, and gaps in the capability of existing technology and techniques were identified. Recommendations were made on which gaps should be closed by means of NASA research and development funding. Several findings emerged from the interoperability assessment: in the NASA mission set, there is a preponderance of small. inexpensive, low data rate science missions; proposed commercial satellite communications services could potentially provide TDRSS-like data relay functions; and. IP and related protocols, such as TCP, require augmentation to operate in the mobile networking environment required by the space-to-ground portion of the IOA. Five case studies were performed in the technology assessment. Each case represented a realistic implementation of the near-earth portion of the IOA. The cases included the use of frequencies at L-band, Ka-band and the optical spectrum. The cases also represented both space relay architectures and direct-to-ground architectures. Some of the main recommendations resulting from the case studies are: select an architecture for the LEO/MEO communications network; pursue the development of a Ka-band space-qualified transmitter (and possibly a receiver), and a low-cost Ka-band ground terminal for a direct-to-ground network, pursue the development of an Inmarsat (L-band) space-qualified transceiver to implement a global, low data rate network for LEO/MEO, mission spacecraft; and, pursue developmental research for a miniaturized, high data rate optical transceiver.

  12. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  13. The extended TRIP supporting VoIP routing reservation with distributed QoS

    NASA Astrophysics Data System (ADS)

    Wang, Furong; Wu, Ye

    2004-04-01

    In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.

  14. Agent-Based Framework for Personalized Service Provisioning in Converged IP Networks

    NASA Astrophysics Data System (ADS)

    Podobnik, Vedran; Matijasevic, Maja; Lovrek, Ignac; Skorin-Kapov, Lea; Desic, Sasa

    In a global multi-service and multi-provider market, the Internet Service Providers will increasingly need to differentiate in the service quality they offer and base their operation on new, consumer-centric business models. In this paper, we propose an agent-based framework for the Business-to-Consumer (B2C) electronic market, comprising the Consumer Agents, Broker Agents and Content Agents, which enable Internet consumers to select a content provider in an automated manner. We also discuss how to dynamically allocate network resources to provide end-to-end Quality of Service (QoS) for a given consumer and content provider.

  15. Aggregating quantum repeaters for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Kato, Go

    2017-09-01

    The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.

  16. Future internet architecture and cloud ecosystem: A survey

    NASA Astrophysics Data System (ADS)

    Wan, Man; Yin, Shiqun

    2018-04-01

    The Internet has gradually become a social infrastructure, the existing TCP/IP architecture faces many challenges. So future Internet architecture become hot research. This paper introduces two ways of idea about the future research of Internet structure system, probes into the future Internet architecture and the environment of cloud ecosystem. Finally, we focuses the related research, and discuss basic principles and problems of OpenStack.

  17. Internet Tomography in Support of Internet and Network Simulation and Emulation Modelling

    NASA Astrophysics Data System (ADS)

    Moloisane, A.; Ganchev, I.; O'Droma, M.

    Internet performance measurement data extracted through Internet Tomography techniques and metrics and how it may be used to enhance the capacity of network simulation and emulation modelling is addressed in this paper. The advantages of network simulation and emulation as a means to aid design and develop the component networks, which make up the Internet and are fundamental to its ongoing evolution, are highlighted. The Internet's rapid growth has spurred development of new protocols and algorithms to meet changing operational requirements such as security, multicast delivery, mobile networking, policy management, and quality of service (QoS) support. Both the development and evaluation of these operational tools requires the answering of many design and operational questions. Creating the technical support required by network engineers and managers in their efforts to seek answers to these questions is in itself a major challenge. Within the Internet the number and range of services supported continues to grow exponentially, from legacy and client/server applications to VoIP, multimedia streaming services and interactive multimedia services. Services have their own distinctive requirements and idiosyncrasies. They respond differently to bandwidth limitations, latency and jitter problems. They generate different types of “conversations” between end-user terminals, back-end resources and middle-tier servers. To add to the complexity, each new or enhanced service introduced onto the network contends for available bandwidth with every other service. In an effort to ensure networking products and resources being designed and developed handling diverse conditions encountered in real Internet environments, network simulation and emulation modelling is a valuable tool, and becoming a critical element, in networking product and application design and development. The better these laboratory tools reflect real-world environment and conditions the more helpful to designers they will be.

  18. GMPLS-based control plane for optical networks: early implementation experience

    NASA Astrophysics Data System (ADS)

    Liu, Hang; Pendarakis, Dimitrios; Komaee, Nooshin; Saha, Debanjan

    2002-07-01

    Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS signaling and Internet routing protocols to provide a scalable, interoperable, distributed control plane, which is applicable to multiple network technologies such as optical cross connects (OXCs), photonic switches, IP routers, ATM switches, SONET and DWDM systems. It is intended to facilitate automatic service provisioning and dynamic neighbor and topology discovery across multi-vendor intelligent transport networks, as well as their clients. Efforts to standardize such a distributed common control plane have reached various stages in several bodies such as the IETF, ITU and OIF. This paper describes the design considerations and architecture of a GMPLS-based control plane that we have prototyped for core optical networks. Functional components of GMPLS signaling and routing are integrated in this architecture with an application layer controller module. Various requirements including bandwidth, network protection and survivability, traffic engineering, optimal utilization of network resources, and etc. are taken into consideration during path computation and provisioning. Initial experiments with our prototype demonstrate the feasibility and main benefits of GMPLS as a distributed control plane for core optical networks. In addition to such feasibility results, actual adoption and deployment of GMPLS as a common control plane for intelligent transport networks will depend on the successful completion of relevant standardization activities, extensive interoperability testing as well as the strengthening of appropriate business drivers.

  19. Teaching IP Networking Fundamentals in Resource Constrained Educational Environments

    ERIC Educational Resources Information Center

    Armitage, Grenville; Harrop, Warren

    2005-01-01

    Many educational institutions suffer from a lack of funding to keep telecommunications laboratory classes up to date and flexible. This paper describes our Remote Unix Lab Environment (RULE), a solution for exposing students to the latest Internet based telecommunications software tools in a Unix like environment. RULE leverages existing PC…

  20. 47 CFR 64.601 - Definitions and provisions of general applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a text telephone (TTY) and the public switched telephone network. (18) IP Relay access technology... used to make and receive an Internet-based TRS call. (20) Neutral Video Communication Service Platform... by the Neutral Video Communication Service Platform include the provision of a video link, user...

  1. 47 CFR 64.601 - Definitions and provisions of general applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a text telephone (TTY) and the public switched telephone network. (18) IP Relay access technology... used to make and receive an Internet-based TRS call. (20) Neutral Video Communication Service Platform... by the Neutral Video Communication Service Platform include the provision of a video link, user...

  2. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    ERIC Educational Resources Information Center

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  3. Optimized methods of chromatin immunoprecipitation for profiling histone modifications in industrial microalgae Nannochloropsis spp.

    PubMed

    Wei, Li; Xu, Jian

    2018-06-01

    Epigenetic factors such as histone modifications play integral roles in plant development and stress response, yet their implications in algae remain poorly understood. In the industrial oleaginous microalgae Nannochloropsis spp., the lack of an efficient methodology for chromatin immunoprecipitation (ChIP), which determines the specific genomic location of various histone modifications, has hindered probing the epigenetic basis of their photosynthetic carbon conversion and storage as oil. Here, a detailed ChIP protocol was developed for Nannochloropsis oceanica, which represents a reliable approach for the analysis of histone modifications, chromatin state, and transcription factor-binding sites at the epigenetic level. Using ChIP-qPCR, genes related to photosynthetic carbon fixation in this microalga were systematically assessed. Furthermore, a ChIP-Seq protocol was established and optimized, which generated a genome-wide profile of histone modification events, using histone mark H3K9Ac as an example. These results are the first step for appreciation of the chromatin landscape in industrial oleaginous microalgae and for epigenetics-based microalgal feedstock development. © 2018 Phycological Society of America.

  4. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  5. HotJava: Sun's Animated Interactive World Wide Web Browser for the Internet.

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Examines HotJava and Java, World Wide Web technology for use on the Internet. HotJava, an interactive, animated Web browser, based on the object-oriented Java programming language, is different from HTML-based browsers such as Netscape. Its client/server design does not understand Internet protocols but can dynamically find what it needs to know.…

  6. Improving the accuracy of blood pressure measurement: the influence of the European Society of Hypertension International Protocol (ESH-IP) for the validation of blood pressure measuring devices and future perspectives.

    PubMed

    Stergiou, George S; Asmar, Roland; Myers, Martin; Palatini, Paolo; Parati, Gianfranco; Shennan, Andrew; Wang, Jiguang; O'Brien, Eoin

    2018-03-01

    The European Society of Hypertension (ESH) International Protocol (ESH-IP) for the validation of blood pressure (BP) measuring devices was published in 2002, with the main objective of simplifying the validation procedures, so that more BP monitors would be subjected to independent validation. This article provides an overview of the international impact of the ESH-IP and of the lessons learned from its use, to be able to justify further developments in validation protocols. A review of published (PubMed) validation studies from 2002 to 2017 was performed. One hundred and seventy-seven validation studies using the ESH-IP, 59 using the British Hypertension Society protocol, 46 using the Association for the Advancement of Medical Instrumentation (AAMI) standard and 23 using the International Organization for Standardization (ISO) standard were identified. Lists of validated office-clinic, home and ambulatory BP monitors are provided. Of the ESH-IP studies, 93% tested oscillometric devices, 80% upper arm, 71% home, 25% office and 7% ambulatory monitors (some had more than one function). The original goal of the ESH-IP has been fulfilled in that in the last decade the number of published validation studies has more than doubled. It is now recognized that the provision of accurate devices would be best served by having a universal protocol. An international initiative has been put in place by AAMI, ESH and ISO experts aiming to reach consensus for a universal validation protocol to be accepted worldwide, which will allow a more thorough evaluation of the accuracy and performance of future BP monitors.

  7. Standardization efforts in IP telephony

    NASA Astrophysics Data System (ADS)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  8. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    PubMed

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  9. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    PubMed Central

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-01-01

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265

  10. Internet Geo-Location

    DTIC Science & Technology

    2017-12-01

    space while absolutely refraining from issuing any measurement probes of its own, either before or after it is presented with the IP addresses... space , IP geolocation 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON ROBERT...since it computes predictions for the entire IP address space while absolutely refraining from issuing any measurement probes of its own, either

  11. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  12. Lightweight SIP/SDP compression scheme (LSSCS)

    NASA Astrophysics Data System (ADS)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  13. Chromatin Immunoprecipitation Sequencing (ChIP-Seq) for Transcription Factors and Chromatin Factors in Arabidopsis thaliana Roots: From Material Collection to Data Analysis.

    PubMed

    Cortijo, Sandra; Charoensawan, Varodom; Roudier, François; Wigge, Philip A

    2018-01-01

    Chromatin immunoprecipitation combined with next-generation sequencing (ChIP-seq) is a powerful technique to investigate in vivo transcription factor (TF) binding to DNA, as well as chromatin marks. Here we provide a detailed protocol for all the key steps to perform ChIP-seq in Arabidopsis thaliana roots, also working on other A. thaliana tissues and in most non-ligneous plants. We detail all steps from material collection, fixation, chromatin preparation, immunoprecipitation, library preparation, and finally computational analysis based on a combination of publicly available tools.

  14. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach

    PubMed Central

    Law, Emily F.; Beals-Erickson, Sarah E.; Fisher, Emma; Lang, Emily A.; Palermo, Tonya M.

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache. PMID:29503787

  15. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach.

    PubMed

    Law, Emily F; Beals-Erickson, Sarah E; Fisher, Emma; Lang, Emily A; Palermo, Tonya M

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache.

  16. Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance

    NASA Astrophysics Data System (ADS)

    Patil, Dipali P.; Patil, G. A.

    2010-11-01

    Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.

  17. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  18. A data transmission method for particle physics experiments based on Ethernet physical layer

    NASA Astrophysics Data System (ADS)

    Huang, Xi-Ru; Cao, Ping; Zheng, Jia-Jun

    2015-11-01

    Due to its advantages of universality, flexibility and high performance, fast Ethernet is widely used in readout system design for modern particle physics experiments. However, Ethernet is usually used together with the TCP/IP protocol stack, which makes it difficult to implement readout systems because designers have to use the operating system to process this protocol. Furthermore, TCP/IP degrades the transmission efficiency and real-time performance. To maximize the performance of Ethernet in physics experiment applications, a data readout method based on the physical layer (PHY) is proposed. In this method, TCP/IP is replaced with a customized and simple protocol, which makes it easier to implement. On each readout module, data from the front-end electronics is first fed into an FPGA for protocol processing and then sent out to a PHY chip controlled by this FPGA for transmission. This kind of data path is fully implemented by hardware. From the side of the data acquisition system (DAQ), however, the absence of a standard protocol causes problems for the network related applications. To solve this problem, in the operating system kernel space, data received by the network interface card is redirected from the traditional flow to a specified memory space by a customized program. This memory space can easily be accessed by applications in user space. For the purpose of verification, a prototype system has been designed and implemented. Preliminary test results show that this method can meet the requirements of data transmission from the readout module to the DAQ with an efficient and simple manner. Supported by National Natural Science Foundation of China (11005107) and Independent Projects of State Key Laboratory of Particle Detection and Electronics (201301)

  19. Trade-Off Analysis Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.

  20. Prototype development and implementation of picture archiving and communications systems based on ISO-OSI standard

    NASA Astrophysics Data System (ADS)

    Martinez, Ralph; Nam, Jiseung

    1992-07-01

    Picture Archiving and Communication Systems (PACS) is an integration of digital image formation in a hospital, which encompasses various imaging equipment, image viewing workstations, image databases, and a high speed network. The integration requires a standardization of communication protocols to connect devices from different vendors. The American College of Radiology and the National Electrical Manufacturers Association (ACR- NEMA) standard Version 2.0 provides a point-to-point hardware interface, a set of software commands, and a consistent set of data formats for PACS. But, it is inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks and an approach were proposed to ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS''s capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI), TCP/IP protocols, and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the ISO-based protocol into a PACS prototype. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance comparison between the ISO and TCP/IP implementations are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is done by prototyping PACS on available platforms, which are Micro VAX II, DECstation and SUN Workstation.

  1. Validation of the Tensoval Duo Control II blood pressure monitor for clinic use and self-measurement according to the British Hypertension Society protocol and the European Society of Hypertension International Protocol Revision 2010.

    PubMed

    de Greeff, Annemarie; Shennan, Andrew H

    2013-06-01

    The Tensoval Duo Control II is an automated upper arm device that uses a combination of oscillometric and auscultatory technology to determine blood pressure noninvasively. The accuracy of this device was assessed according to the British Hypertension Society (BHS) protocol and the European Society of Hypertension International Protocol revision 2010 (ESH-IP2) in an adult population. Ethical approval was obtained. Eighty-five and 33 adult individuals, respectively, were recruited to fulfil the requirements of each protocol. Trained observers took nine sequential same-arm measurements alternating between a mercury sphygmomanometer and the device. The device had to achieve at least a B grade for both systolic and diastolic pressures to pass the BHS protocol and had to fulfil the criteria of all three phases of the ESH-IP2 protocol to receive recommendation. The device achieved an A/A grading for the BHS protocol and passed all three phases of the ESH-IP2 protocol. The mean difference±SD for the BHS/ESH protocols, respectively, was -1.8±6.5/-0.7±5.7 mmHg for systolic pressure and 1.9±5.1/2.4±4.5 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low-pressure, medium-pressure and high-pressure ranges. The Tensoval Duo Control II device is recommended for clinical and home use according to both the BHS and the ESH-IP2 standard.

  2. Battlefield Object Control via Internet Architecture

    DTIC Science & Technology

    2002-01-01

    superiority is the best way to reach the goal of competition superiority. Using information technology (IT) in data processing, including computer hardware... technologies : Global Positioning System (GPS), Geographic Information System (GIS), Battlefield Information Transmission System (BITS), and Intelligent...operational environment. Keywords: C4ISR Systems, Information Superiority, Battlefield Objects, Computer - Aided Prototyping System (CAPS), IP-based

  3. Enhanced Communication Network Solution for Positive Train Control Implementation

    NASA Technical Reports Server (NTRS)

    Fatehi, M. T.; Simon, J.; Chang, W.; Chow, E. T.; Burleigh, S. C.

    2011-01-01

    The commuter and freight railroad industry is required to implement Positive Train Control (PTC) by 2015 (2012 for Metrolink), a challenging network communications problem. This paper will discuss present technologies developed by the National Aeronautics and Space Administration (NASA) to overcome comparable communication challenges encountered in deep space mission operations. PTC will be based on a new cellular wireless packet Internet Protocol (IP) network. However, ensuring reliability in such a network is difficult due to the "dead zones" and transient disruptions we commonly experience when we lose calls in commercial cellular networks. These disruptions make it difficult to meet PTC s stringent reliability (99.999%) and safety requirements, deployment deadlines, and budget. This paper proposes innovative solutions based on space-proven technologies that would help meet these challenges: (1) Delay Tolerant Networking (DTN) technology, designed for use in resource-constrained, embedded systems and currently in use on the International Space Station, enables reliable communication over networks in which timely data acknowledgments might not be possible due to transient link outages. (2) Policy-Based Management (PBM) provides dynamic management capabilities, allowing vital data to be exchanged selectively (with priority) by utilizing alternative communication resources. The resulting network may help railroads implement PTC faster, cheaper, and more reliably.

  4. Technology that Touches Lives: Teleconsultation to Benefit Persons with Upper Limb Loss

    PubMed Central

    Whelan, Lynsay R.; Wagner, Nathan

    2011-01-01

    While over 1.5 million individuals are living with limb loss in the United States (Ziegler-Graham et al., 2008), only 10% of these individuals have a loss that affects an upper limb. Coincident with the relatively low incidence of upper limb loss, is a shortage of the community-based prosthetic rehabilitation experts that can help prosthetic users to more fully integrate their devices into their daily routines. This article describes how expert prosthetists and occupational therapists at Touch Bionics, a manufacturer of advanced upper limb prosthetic devices, employ Voice over the Internet Protocol (VoIP) videoconferencing software telehealth technologies to engage in remote consultation with users of prosthetic devices and/or their local practitioners. The Touch Bionics staff provide follow-up expertise to local prosthetists, occupational therapists, and other health professionals. Contrasted with prior telephone-based consultations, the video-enabled approach provides enhanced capabilities to benefit persons with upper limb loss. Currently, the opportunities for Touch Bionics occupational therapists to fully engage in patient-based services delivered through telehealth technologies are significantly reduced by their need to obtain and maintain professional licenses in multiple states. PMID:25945186

  5. Selective randomized load balancing and mesh networks with changing demands

    NASA Astrophysics Data System (ADS)

    Shepherd, F. B.; Winzer, P. J.

    2006-05-01

    We consider the problem of building cost-effective networks that are robust to dynamic changes in demand patterns. We compare several architectures using demand-oblivious routing strategies. Traditional approaches include single-hop architectures based on a (static or dynamic) circuit-switched core infrastructure and multihop (packet-switched) architectures based on point-to-point circuits in the core. To address demand uncertainty, we seek minimum cost networks that can carry the class of hose demand matrices. Apart from shortest-path routing, Valiant's randomized load balancing (RLB), and virtual private network (VPN) tree routing, we propose a third, highly attractive approach: selective randomized load balancing (SRLB). This is a blend of dual-hop hub routing and randomized load balancing that combines the advantages of both architectures in terms of network cost, delay, and delay jitter. In particular, we give empirical analyses for the cost (in terms of transport and switching equipment) for the discussed architectures, based on three representative carrier networks. Of these three networks, SRLB maintains the resilience properties of RLB while achieving significant cost reduction over all other architectures, including RLB and multihop Internet protocol/multiprotocol label switching (IP/MPLS) networks using VPN-tree routing.

  6. Internet Telephony: The Next Killer Application? (Or, How I Cut My Long-Distance Phone Bill to Nothing!).

    ERIC Educational Resources Information Center

    Learn, Larry L., Ed.

    1995-01-01

    Discusses the evolution of real-time telephony and broadcast applications using the Internet; resulting issues and opportunities; and future implications for regulators, Internet users, and service providers. Topics covered include bandpass, packetized voice, IP structures, class D datagrams, software, technical parameters, legal and regulatory…

  7. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  8. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  9. Impact of applying the more stringent validation criteria of the revised European Society of Hypertension International Protocol 2010 on earlier validation studies.

    PubMed

    Stergiou, George S; Karpettas, Nikos; Atkins, Neil; O'Brien, Eoin

    2011-04-01

    Since 2002 when the European Society of Hypertension International Protocol (ESH-IP) was published it has become the preferred protocol for validating blood pressure monitors worldwide. In 2010, a revised version of the ESH-IP with more stringent criteria was published. This study assesses the impact of applying the revised ESH-IP criteria. A systematic literature review of ESH-IP studies reported between 2002 and 2010 was conducted. The impact of applying the ESH-IP 2010 criteria retrospectively on the data reported in these studies was investigated. The performance of the oscillometric devices in the last decade was also investigated on the basis of the ESH-IP criteria. Among 119 published studies, 112 with sufficient data were analyzed. According to ESH-IP 2002, the test device failed in 19 studies, whereas by applying the ESH-IP 2010 criteria in 28 additional studies increased the failure rate from 17 to 42%. Of these 28 studies, in 20 (71%) the test device failed at part 1 (accuracy per measurement) and in 22 (79%) at part 2 (accuracy per subject). Most of the failures involved the '5 mmHg or less' criterion. In the last decade there has been a consistent trend toward improved performance of oscillometric devices assessed on the basis of the ESH-IP criteria. This retrospective analysis shows that the stricter revised ESH-IP 2010 criteria will noticeably increase the failure rate of devices being validated. Oscillometric devices are becoming more accurate, and the revised ESH-IP by acknowledging this trend will allow more accurate devices to enter the market.

  10. New-generation security network with synergistic IP sensors

    NASA Astrophysics Data System (ADS)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  11. Extending Tactical Fleet Communications Through VoIP

    DTIC Science & Technology

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  12. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    NASA Astrophysics Data System (ADS)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  13. Advanced Communications Technology Satellite Now Operating in an Inclined Orbit

    NASA Technical Reports Server (NTRS)

    Bauer, Robert A.

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) system has been modified to support operation in an inclined orbit that is virtually transparent to users, and plans are to continue this final phase of its operation through September 2000. The next 2 years of ACTS will provide a new opportunity for using the technologies that this system brought online over 5 years ago and that are still being used to resolve the technical issues that face NASA and the satellite industry in the area of seamless networking and interoperability with terrestrial systems. New goals for ACTS have been defined that align the program with recent changes in NASA and industry. ACTS will be used as a testbed to: Show how NASA and other Government agencies can use commercial systems for 1. future support of their operations Test, characterize, and resolve technical issues in using advanced communications 2. protocols such as asynchronous transfer mode (ATM) and transmission control protocol/Internet protocol (TCP/IP) over long latency links as found when interoperating satellites with terrestrial systems Evaluate narrow-spot-beam Ka-band satellite operation in an inclined orbit 3. Verify Ka-band satellite technologies since no other Ka-band system is yet 4. available in the United States

  14. Phosphoinositide and Inositol Phosphate Analysis in Lymphocyte Activation

    PubMed Central

    Sauer, Karsten; Huang, Yina Hsing; Lin, Hongying; Sandberg, Mark; Mayr, Georg W.

    2015-01-01

    Lymphocyte antigen receptor engagement profoundly changes the cellular content of phosphoinositide lipids and soluble inositol phosphates. Among these, the phosphoinositides phosphatidylinositol 4,5-bisphosphate (PIP2) and phosphatidylinositol 3,4,5-trisphosphate (PIP3) play key signaling roles by acting as pleckstrin homology (PH) domain ligands that recruit signaling proteins to the plasma membrane. Moreover, PIP2 acts as a precursor for the second messenger molecules diacylglycerol and soluble inositol 1,4,5-trisphosphate (IP3), essential mediators of PKC, Ras/Erk, and Ca2+ signaling in lymphocytes. IP3 phosphorylation by IP3 3-kinases generates inositol 1,3,4,5-tetrakisphosphate (IP4), an essential soluble regulator of PH domain binding to PIP3 in developing T cells. Besides PIP2, PIP3, IP3, and IP4, lymphocytes produce multiple other phosphoinositides and soluble inositol phosphates that could have important physiological functions. To aid their analysis, detailed protocols that allow one to simultaneously measure the levels of multiple different phosphoinositide or inositol phosphate isomers in lymphocytes are provided here. They are based on thin layer, conventional and high-performance liquid chromatographic separation methods followed by radiolabeling or non-radioactive metal-dye detection. Finally, less broadly applicable nonchromatographic methods for detection of specific phosphoinositide or inositol phosphate isomers are discussed. Support protocols describe how to obtain pure unstimulated CD4+CD8+ thymocyte populations for analyses of inositol phosphate turnover during positive and negative selection, key steps in T cell development. PMID:19918943

  15. A-21st-century-approach to firefighting in the Western US: How microwave-based seismic networks can change fire suppression from reactive to proactive

    NASA Astrophysics Data System (ADS)

    Kent, G. M.; Smith, K. D.; Williams, M. C.; Slater, D. E.; Plank, G.; McCarthy, M.; Rojas-Gonzalez, R.; Vernon, F.; Driscoll, N. W.; Hidley, G.

    2015-12-01

    The Nevada Seismological Laboratory (NSL) at UNR has recently embarked on a bold technical initiative, installing a high-speed (up to 190 Mb/sec) mountaintop-based Internet Protocol (IP) microwave network, enabling a myriad of sensor systems for Multi-Hazard Early Warning detection and response. In the Tahoe Basin, this system is known as AlertTahoe; a similar network has been deployed in north-central Nevada as part of a 5-year-long grant with BLM. The UNR network mirrors the successful HPWREN multi-hazard network run through UCSD; the UNR "Alert" program (Access to Leverage Emergency information in Real Time) has expanded on the original concept by providing a framework for early fire detection and discovery. Both systems do not rely on open-access public Internet services such as those provided by cellular service providers. Instead, they utilize private wireless communication networks to collect data 24/7 in real-time from multiple sensors throughout the system. Utilizing this restricted-access private communication platform enhances system reliability, capability, capacity and versatility for staff and its community of certified users. Both UNR and UCSD fire camera systems are presently being confederated under a common framework to provide end users (e.g., BLM, USFS, CalFire) a unified interface. Earthquake response has been both organizations' primary mission for decades; high-speed IP microwave fundamentally changes the playing field allowing for rapid early detection of wildfires, earthquakes and other natural disasters, greatly improving local and regional disaster response/recovery. For example, networked cameras can be optimally placed for wildfire detection and are significantly less vulnerable due infrastructure hardening and the ability to avoid extreme demands by the public on cellular and other public networks during a crisis. These systems also provide a backup for emergency responders to use when public access communications become overwhelmed or fail during an event. The crowd-sourced fire cameras can be viewed year round through AlertTahoe and AlertSoCal websites with on-demand time-lapse, an integrated real time lightning map, and other useful features.

  16. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol

    PubMed Central

    Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.

    2015-01-01

    Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. PMID:26023213

  17. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    PubMed

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. © 2015 American Physical Therapy Association.

  18. Limitations and possibilities of low cell number ChIP-seq

    PubMed Central

    2012-01-01

    Background Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-seq) offers high resolution, genome-wide analysis of DNA-protein interactions. However, current standard methods require abundant starting material in the range of 1–20 million cells per immunoprecipitation, and remain a bottleneck to the acquisition of biologically relevant epigenetic data. Using a ChIP-seq protocol optimised for low cell numbers (down to 100,000 cells / IP), we examined the performance of the ChIP-seq technique on a series of decreasing cell numbers. Results We present an enhanced native ChIP-seq method tailored to low cell numbers that represents a 200-fold reduction in input requirements over existing protocols. The protocol was tested over a range of starting cell numbers covering three orders of magnitude, enabling determination of the lower limit of the technique. At low input cell numbers, increased levels of unmapped and duplicate reads reduce the number of unique reads generated, and can drive up sequencing costs and affect sensitivity if ChIP is attempted from too few cells. Conclusions The optimised method presented here considerably reduces the input requirements for performing native ChIP-seq. It extends the applicability of the technique to isolated primary cells and rare cell populations (e.g. biobank samples, stem cells), and in many cases will alleviate the need for cell culture and any associated alteration of epigenetic marks. However, this study highlights a challenge inherent to ChIP-seq from low cell numbers: as cell input numbers fall, levels of unmapped sequence reads and PCR-generated duplicate reads rise. We discuss a number of solutions to overcome the effects of reducing cell number that may aid further improvements to ChIP performance. PMID:23171294

  19. Architecting Communication Network of Networks for Space System of Systems

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  20. Known TCP Implementation Problems

    NASA Technical Reports Server (NTRS)

    Paxson, Vern (Editor); Allman, Mark; Dawson, Scott; Fenner, William; Griner, Jim; Heavens, Ian; Lahey, K.; Semke, J.; Volz, B.

    1999-01-01

    This memo catalogs a number of known TCP implementation problems. The goal in doing so is to improve conditions in the existing Internet by enhancing the quality of current TCP/IP implementations. It is hoped that both performance and correctness issues can be resolved by making implementors aware of the problems and their solutions. In the long term, it is hoped that this will provide a reduction in unnecessary traffic on the network, the rate of connection failures due to protocol errors, and load on network servers due to time spent processing both unsuccessful connections and retransmitted data. This will help to ensure the stability of the global Internet. Each problem is defined as follows: Name of Problem The name associated with the problem. In this memo, the name is given as a subsection heading. Classification one or more problem categories for which the problem is classified: "congestion control", "performance", "reliability", "resource management". Description A definition of the problem, succinct but including necessary background material. Significance A brief summary of the sorts of environments for which the problem is significant.

  1. A comparative study of the use of the Istanbul Protocol amongst civil society organizations in low-income countries.

    PubMed

    Kelly, Toby; Jensen, Steffen; Koch Andersen, Morten; Christiansen, Catrine; Sharma, Jeevan Raj

    2016-01-01

    The Istanbul Protocol (IP) is one of the great success stories of the global anti-torture movement, setting out universal guidelines for the production of rigorous, objective and reliable evidence about allegations of torture and ill-treatment. The IP is explicitly designed to outline 'minimum standards for States'. However, it is all too often left to civil society organizations to investigate allegations of torture and ill-treatment. In this context, important questions remain as to how and where the IP can be used best by such organizations. These questions are particularly acute in situations where human rights groups may have limited institutional capacity. This paper explores the practical challenges faced by civil society in using the IP in Low-Income Countries. It is based on qualitative research in three case studies: Nepal, Kenya and Bangladesh. This research involved over 80 interviews with human rights practitioners. The conclusions of the paper are that the Istanbul Protocol provides a useful framework for documentation, but more comprehensive forms of documentation will often be limited to a very small - albeit important - number of legal cases. In many cases, the creation of precise and standardized forms of evidence is not necessarily the most effective form of documentation for redress or accountability. In the absence of legal systems willing and able to respond effectively to allegations of torture and ill-treatment, there are severe limitations on the practical effectiveness of detailed and technical forms of documentation.

  2. Design and Implement AN Interoperable Internet of Things Application Based on AN Extended Ogc Sensorthings Api Standard

    NASA Astrophysics Data System (ADS)

    Huang, C. Y.; Wu, C. H.

    2016-06-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.

  3. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Voice Call Analysis

    DTIC Science & Technology

    2015-09-01

    Gateway 2 4. Voice Packet Flow: SIP , Session Description Protocol (SDP), and RTP 3 5. Voice Data Analysis 5 6. Call Analysis 6 7. Call Metrics 6...analysis processing is designed for a general VoIP system architecture based on Session Initiation Protocol ( SIP ) for negotiating call sessions and...employs Skinny Client Control Protocol for network communication between the phone and the local CallManager (e.g., for each dialed digit), SIP

  4. Validation of the Pangao PG-800B26 upper arm blood pressure monitor in the general population according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Chen, Liang; Li, Jiyu; Wen, Jing; Guo, Changfeng; Zhang, Jingying; Yu, Zhen

    2018-02-01

    This study aimed to evaluate the accuracy of the automated oscillometric upper arm blood pressure monitor Pangao PG-800B26 for home blood pressure monitoring according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocols. Systolic and diastolic blood pressures were measured sequentially in 33 and 85 adults, respectively, on the basis of the ESH-IP and BHS protocols using a mercury sphygmomanometer (two observers) and the device (one supervisor). The procedures and analysis methods of the protocols were followed precisely. The device fulfilled the criteria of the ESH-IP, with device-observer differences of 1.01±5.16 and -0.58±4.17 mmHg for systolic and diastolic blood pressure, respectively. Furthermore, the A/A grade of the BHS protocol was also achieved for overall grading and for the three pressure levels, with average differences of 0.85±6.35 and -0.15±5.65 mmHg for systolic and diastolic blood pressure, respectively, which also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation. The Pangao PG-800B26 fulfilled the criteria of the ESH-IP 2010 and achieved the A/A grade of the BHS protocol, and hence can be recommended for home use in adults.

  5. Validation of the Pangao PG-800A36 automatic wrist blood pressure monitor according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Zhao, Hairong; Qiao, Weichang; Zhang, Rui; Cui, Peng; Hou, Fanglin; Zhang, Wenli

    2018-02-01

    The aim of this study was to validate the PG-800A36 automatic wrist blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocols. A total of 33 participants were initially included on the basis of the ESH-IP, followed by examination of 85 participants according to the BHS protocol. The procedures and analysis methods of the protocols were followed precisely with left arm/wrist sequential measurements by two trained observers using a mercury sphygmomanometer and one supervisor using the device. The device passed the ESH-IP with an average difference of 1.45±6.46 mmHg for systolic blood pressure and 1.25±5.10 mmHg for diastolic blood pressure. Furthermore, the A/A grade of the BHS protocol was achieved with an average difference of 1.84±6.94 mmHg for systolic blood pressure and 1.15±6.49 mmHg for diastolic blood pressure, and thus, the device also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation. The Pangao PG-800A36 passed the requirements of the ESH-IP revision 2010 and achieved the A/A grade of the BHS protocol, which can be recommended for self-measurement in the general population.

  6. Designing a Virtual Classroom for Distance Learning Students through the Internet.

    ERIC Educational Resources Information Center

    Bradshaw, Allen

    Advantages to using the Internet to deliver instruction include the fact that Hypertext Markup Language (HTML) can be accessed on any computer, broadening the student base to anyone with an Internet browser and a PPP (Point-to-Point Protocol) account. In addition, instructions, lectures, and examples can be linked together for use as students need…

  7. Virtual and flexible digital signal processing system based on software PnP and component works

    NASA Astrophysics Data System (ADS)

    He, Tao; Wu, Qinghua; Zhong, Fei; Li, Wei

    2005-05-01

    An idea about software PnP (Plug & Play) is put forward according to the hardware PnP. And base on this idea, a virtual flexible digital signal processing system (FVDSPS) is carried out. FVDSPS is composed of a main control center, many sub-function modules and other hardware I/O modules. Main control center sends out commands to sub-function modules, and manages running orders, parameters and results of sub-functions. The software kernel of FVDSPS is DSP (Digital Signal Processing) module, which communicates with the main control center through some protocols, accept commands or send requirements. The data sharing and exchanging between the main control center and the DSP modules are carried out and managed by the files system of the Windows Operation System through the effective communication. FVDSPS real orients objects, orients engineers and orients engineering problems. With FVDSPS, users can freely plug and play, and fast reconfigure a signal process system according to engineering problems without programming. What you see is what you get. Thus, an engineer can orient engineering problems directly, pay more attention to engineering problems, and promote the flexibility, reliability and veracity of testing system. Because FVDSPS orients TCP/IP protocol, through Internet, testing engineers, technology experts can be connected freely without space. Engineering problems can be resolved fast and effectively. FVDSPS can be used in many fields such as instruments and meter, fault diagnosis, device maintenance and quality control.

  8. Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance

    DTIC Science & Technology

    2006-09-01

    and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with

  9. Network Configuration Analysis for Formation Flying Satellites

    NASA Technical Reports Server (NTRS)

    Knoblock, Eric J.; Wallett, Thomas M.; Konangi, Vijay K.; Bhasin, Kul B.

    2001-01-01

    The performance of two networks to support autonomous multi-spacecraft formation flying systems is presented. Both systems are comprised of a ten-satellite formation, with one of the satellites designated as the central or 'mother ship.' All data is routed through the mother ship to the terrestrial network. The first system uses a TCP/EP over ATM protocol architecture within the formation, and the second system uses the IEEE 802.11 protocol architecture within the formation. The simulations consist of file transfers using either the File Transfer Protocol (FTP) or the Simple Automatic File Exchange (SAFE) Protocol. The results compare the IP queuing delay, IP queue size and IP processing delay at the mother ship as well as end-to-end delay for both systems. In all cases, using IEEE 802.11 within the formation yields less delay. Also, the throughput exhibited by SAFE is better than FTP.

  10. Evolution of IPv6 Internet topology with unusual sudden changes

    NASA Astrophysics Data System (ADS)

    Ai, Jun; Zhao, Hai; Kathleen, M. Carley; Su, Zhan; Li, Hui

    2013-07-01

    The evolution of Internet topology is not always smooth but sometimes with unusual sudden changes. Consequently, identifying patterns of unusual topology evolution is critical for Internet topology modeling and simulation. We analyze IPv6 Internet topology evolution in IP-level graph to demonstrate how it changes in uncommon ways to restructure the Internet. After evaluating the changes of average degree, average path length, and some other metrics over time, we find that in the case of a large-scale growing the Internet becomes more robust; whereas in a top—bottom connection enhancement the Internet maintains its efficiency with links largely decreased.

  11. Non-Viral Generation of Marmoset Monkey iPS Cells by a Six-Factor-in-One-Vector Approach

    PubMed Central

    Debowski, Katharina; Warthemann, Rita; Lentes, Jana; Salinas-Riester, Gabriela; Dressel, Ralf; Langenstroth, Daniel; Gromoll, Jörg; Sasaki, Erika; Behr, Rüdiger

    2015-01-01

    Groundbreaking studies showed that differentiated somatic cells of mouse and human origin could be reverted to a stable pluripotent state by the ectopic expression of only four proteins. The resulting pluripotent cells, called induced pluripotent stem (iPS) cells, could be an alternative to embryonic stem cells, which are under continuous ethical debate. Hence, iPS cell-derived functional cells such as neurons may become the key for an effective treatment of currently incurable degenerative diseases. However, besides the requirement of efficacy testing of the therapy also its long-term safety needs to be carefully evaluated in settings mirroring the clinical situation in an optimal way. In this context, we chose the long-lived common marmoset monkey (Callithrix jacchus) as a non-human primate species to generate iPS cells. The marmoset monkey is frequently used in biomedical research and is gaining more and more preclinical relevance due to the increasing number of disease models. Here, we describe, to our knowledge, the first-time generation of marmoset monkey iPS cells from postnatal skin fibroblasts by non-viral means. We used the transposon-based, fully reversible piggyback system. We cloned the marmoset monkey reprogramming factors and established robust and reproducible reprogramming protocols with a six-factor-in-one-construct approach. We generated six individual iPS cell lines and characterized them in comparison with marmoset monkey embryonic stem cells. The generated iPS cells are morphologically indistinguishable from marmoset ES cells. The iPS cells are fully reprogrammed as demonstrated by differentiation assays, pluripotency marker expression and transcriptome analysis. They are stable for numerous passages (more than 80) and exhibit euploidy. In summary, we have established efficient non-viral reprogramming protocols for the derivation of stable marmoset monkey iPS cells, which can be used to develop and test cell replacement therapies in preclinical settings. PMID:25785453

  12. Non-viral generation of marmoset monkey iPS cells by a six-factor-in-one-vector approach.

    PubMed

    Debowski, Katharina; Warthemann, Rita; Lentes, Jana; Salinas-Riester, Gabriela; Dressel, Ralf; Langenstroth, Daniel; Gromoll, Jörg; Sasaki, Erika; Behr, Rüdiger

    2015-01-01

    Groundbreaking studies showed that differentiated somatic cells of mouse and human origin could be reverted to a stable pluripotent state by the ectopic expression of only four proteins. The resulting pluripotent cells, called induced pluripotent stem (iPS) cells, could be an alternative to embryonic stem cells, which are under continuous ethical debate. Hence, iPS cell-derived functional cells such as neurons may become the key for an effective treatment of currently incurable degenerative diseases. However, besides the requirement of efficacy testing of the therapy also its long-term safety needs to be carefully evaluated in settings mirroring the clinical situation in an optimal way. In this context, we chose the long-lived common marmoset monkey (Callithrix jacchus) as a non-human primate species to generate iPS cells. The marmoset monkey is frequently used in biomedical research and is gaining more and more preclinical relevance due to the increasing number of disease models. Here, we describe, to our knowledge, the first-time generation of marmoset monkey iPS cells from postnatal skin fibroblasts by non-viral means. We used the transposon-based, fully reversible piggyback system. We cloned the marmoset monkey reprogramming factors and established robust and reproducible reprogramming protocols with a six-factor-in-one-construct approach. We generated six individual iPS cell lines and characterized them in comparison with marmoset monkey embryonic stem cells. The generated iPS cells are morphologically indistinguishable from marmoset ES cells. The iPS cells are fully reprogrammed as demonstrated by differentiation assays, pluripotency marker expression and transcriptome analysis. They are stable for numerous passages (more than 80) and exhibit euploidy. In summary, we have established efficient non-viral reprogramming protocols for the derivation of stable marmoset monkey iPS cells, which can be used to develop and test cell replacement therapies in preclinical settings.

  13. Enabling end-user network monitoring via the multicast consolidated proxy monitor

    NASA Astrophysics Data System (ADS)

    Kanwar, Anshuman; Almeroth, Kevin C.; Bhattacharyya, Supratik; Davy, Matthew

    2001-07-01

    The debugging of problems in IP multicast networks relies heavily on an eclectic set of stand-alone tools. These tools traditionally neither provide a consistent interface nor do they generate readily interpretable results. We propose the ``Multicast Consolidated Proxy Monitor''(MCPM), an integrated system for collecting, analyzing and presenting multicast monitoring results to both the end user and the network operator at the user's Internet Service Provider (ISP). The MCPM accesses network state information not normally visible to end users and acts as a proxy for disseminating this information. Functionally, through this architecture, we aim to a) provide a view of the multicast network at varying levels of granularity, b) provide end users with a limited ability to query the multicast infrastructure in real time, and c) protect the infrastructure from overwhelming amount of monitoring load through load control. Operationally, our scheme allows scaling to the ISPs dimensions, adaptability to new protocols (introduced as multicast evolves), threshold detection for crucial parameters and an access controlled, customizable interface design. Although the multicast scenario is used to illustrate the benefits of consolidated monitoring, the ultimate aim is to scale the scheme to unicast IP networks.

  14. Performance analysis of signaling protocols on OBS switches

    NASA Astrophysics Data System (ADS)

    Kirci, Pinar; Zaim, A. Halim

    2005-10-01

    In this paper, Just-In-Time (JIT), Just-Enough-Time (JET) and Horizon signalling schemes for Optical Burst Switched Networks (OBS) are presented. These signaling schemes run over a core dWDM network and a network architecture based on Optical Burst Switches (OBS) is proposed to support IP, ATM and Burst traffic. In IP and ATM traffic several packets are assembled in a single packet called burst and the burst contention is handled by burst dropping. The burst length distribution in IP traffic is arbitrary between 0 and 1, and is fixed in ATM traffic at 0,5. Burst traffic on the other hand is arbitrary between 1 and 5. The Setup and Setup ack length distributions are arbitrary. We apply the Poisson model with rate λ and Self-Similar model with pareto distribution rate α to identify inter-arrival times in these protocols. We consider a communication between a source client node and a destination client node over an ingress and one or more multiple intermediate switches.We use buffering only in the ingress node. The communication is based on single burst connections in which, the connection is set up just before sending a burst and then closed as soon as the burst is sent. Our analysis accounts for several important parameters, including the burst setup, burst setup ack, keepalive messages and the optical switching protocol. We compare the performance of the three signalling schemes on the network under as burst dropping probability under a range of network scenarios.

  15. A Filtration-based Method of Preparing High-quality Nuclei from Cross-linked Skeletal Muscle for Chromatin Immunoprecipitation.

    PubMed

    Nohara, Kazunari; Chen, Zheng; Yoo, Seung-Hee

    2017-07-06

    Chromatin immunoprecipitation (ChIP) is a powerful method to determine protein binding to chromatin DNA. Fiber-rich skeletal muscle, however, has been a challenge for ChIP due to technical difficulty in isolation of high-quality nuclei with minimal contamination of myofibrils. Previous protocols have attempted to purify nuclei before cross-linking, which incurs the risk of altered DNA-protein interaction during the prolonged nuclei preparation process. In the current protocol, we first cross-linked the skeletal muscle tissue collected from mice, and the tissues were minced and sonicated. Since we found that ultracentrifugation was not able to separate nuclei from myofibrils using cross-linked muscle tissue, we devised a sequential filtration procedure to obtain high-quality nuclei devoid of significant myofibril contamination. We subsequently prepared chromatin by using an ultrasonicator, and ChIP assays with anti-BMAL1 antibody revealed robust circadian binding pattern of BMAL1 to target gene promoters. This filtration protocol constitutes an easily applicable method to isolate high-quality nuclei from cross-linked skeletal muscle tissue, allowing consistent sample processing for circadian and other time-sensitive studies. In combination with next-generation sequencing (NGS), our method can be deployed for various mechanistic and genomic studies focusing on skeletal muscle function.

  16. Research and Simulation on Application of the Mobile IP Network

    NASA Astrophysics Data System (ADS)

    Yibing, Deng; Wei, Hu; Minghui, Li; Feng, Gao; Junyi, Shen

    The paper analysed the mobile node, home agent, and foreign agent of mobile IP network firstly, some key technique, such as mobile IP network basical principle, protocol work principle, agent discovery, registration, and IP packet transmission, were discussed. Then a network simulation model was designed, validating the characteristic of mobile IP network, and some advantages, which were brought by mobile network, were testified. Finally, the conclusion is gained: mobile IP network could realize the expectation of consumer that they can communicate with others anywhere.

  17. Network Upgrade for the SLC: PEP II Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Call, M.; Clark, S.

    2011-09-09

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status informationmore » is included.« less

  18. ChIP-chip.

    PubMed

    Kim, Tae Hoon; Dekker, Job

    2018-05-01

    ChIP-chip can be used to analyze protein-DNA interactions in a region-wide and genome-wide manner. DNA microarrays contain PCR products or oligonucleotide probes that are designed to represent genomic sequences. Identification of genomic sites that interact with a specific protein is based on competitive hybridization of the ChIP-enriched DNA and the input DNA to DNA microarrays. The ChIP-chip protocol can be divided into two main sections: Amplification of ChIP DNA and hybridization of ChIP DNA to arrays. A large amount of DNA is required to hybridize to DNA arrays, and hybridization to a set of multiple commercial arrays that represent the entire human genome requires two rounds of PCR amplifications. The relative hybridization intensity of ChIP DNA and that of the input DNA is used to determine whether the probe sequence is a potential site of protein-DNA interaction. Resolution of actual genomic sites bound by the protein is dependent on the size of the chromatin and on the genomic distance between the probes on the array. As with expression profiling using gene chips, ChIP-chip experiments require multiple replicates for reliable statistical measure of protein-DNA interactions. © 2018 Cold Spring Harbor Laboratory Press.

  19. Internet Protocol Geolocation: Development of a Delay-Based Hybrid Methodology for Locating the Geographic Location of a Network Node

    DTIC Science & Technology

    2007-03-01

    provides a means for anyone who has access to an Internet connection to collect or disseminate information on a global scale at a very low cost. The......AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED

  20. Internet-based remote counseling to support stress management: preventing interruptions to regular exercise in elderly people

    NASA Astrophysics Data System (ADS)

    Hashimoto, Sayuri; Munakata, Tsunestugu; Hashimoto, Nobuyuki; Okunaka, Jyunzo; Koga, Tatsuzo

    2006-01-01

    Our research showed that a high degree of life-stress has a negative mental health effect that may interrupt regular exercise. We used an internet based, remotely conducted, face to face, preventive counseling program using video monitors to reduce the source of life-stresses that interrupts regular exercise and evaluated the preventative effects of the program in elderly people. NTSC Video signals were converted to the IP protocol and facial images were transmitted to a PC display using the exclusive optical network lines of JGN2. Participants were 22 elderly people in Hokkaido, Japan, who regularly played table tennis. A survey was conducted before the intervention in August 2003. IT remote counseling was conducted on two occasions for one hour on each occasion. A post intervention survey was conducted in February 2004 and a follow-up survey was conducted in March 2005. Network quality was satisfactory with little data loss and high display quality. Results indicated that self-esteem increased significantly, trait anxiety decreased significantly, cognition of emotional support by people other than family members had a tendency to increase, and source of stress had a tendency to decrease after the intervention. Follow-up results indicated that cognition of emotional support by family increased significantly, and interpersonal dependency decreased significantly compared to before the intervention. These results suggest that face to face IT remote counseling using video monitors is useful to keep elderly people from feeling anxious and to make them confident to continue exercising regularly. Moreover, it has a stress management effect.

  1. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  2. Covert Channels in SIP for VoIP Signalling

    NASA Astrophysics Data System (ADS)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  3. Using the ACR/NEMA standard with TCP/IP and Ethernet

    NASA Astrophysics Data System (ADS)

    Chimiak, William J.; Williams, Rodney C.

    1991-07-01

    There is a need for a consolidated picture archival and communications system (PACS) in hospitals. At the Bowman Gray School of Medicine of Wake Forest University (BGSM), the authors are enhancing the ACR/NEMA Version 2 protocol using UNIX sockets and TCP/IP to greatly improve connectivity. Initially, nuclear medicine studies using gamma cameras are to be sent to PACS. The ACR/NEMA Version 2 protocol provides the functionality of the upper three layers of the open system interconnection (OSI) model in this implementation. The images, imaging equipment information, and patient information are then sent in ACR/NEMA format to a software socket. From there it is handed to the TCP/IP protocol, which provides the transport and network service. TCP/IP, in turn, uses the services of IEEE 802.3 (Ethernet) to complete the connectivity. The advantage of this implementation is threefold: (1) Only one I/O port is consumed by numerous nuclear medicine cameras, instead of a physical port for each camera. (2) Standard protocols are used which maximize interoperability with ACR/NEMA compliant PACSs. (3) The use of sockets allows a migration path to the transport and networking services of OSIs TP4 and connectionless network service as well as the high-performance protocol being considered by the American National Standards Institute (ANSI) and the International Standards Organization (ISO) -- the Xpress Transfer Protocol (XTP). The use of sockets also gives access to ANSI's Fiber Distributed Data Interface (FDDI) as well as other high-speed network standards.

  4. Autoconfiguration and Service Discovery

    NASA Astrophysics Data System (ADS)

    Manner, Jukka

    To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.

  5. Internet-Based Acceptance and Commitment Therapy for Psychological Distress Experienced by People With Hearing Problems: Study Protocol for a Randomized Controlled Trial.

    PubMed

    Molander, Peter; Hesser, Hugo; Weineland, Sandra; Bergwall, Kajsa; Buck, Sonia; Hansson-Malmlöf, Johan; Lantz, Henning; Lunner, Thomas; Andersson, Gerhard

    2015-09-01

    Psychological distress and psychiatric symptoms are prevalent among people with hearing loss or other audiological conditions, but psychological interventions for these groups are rare. This article describes the study protocol for a randomized controlled trial for evaluating the effect of a psychological treatment delivered over the Internet for individuals with hearing problems and concurrent psychological distress. Participants who are significantly distressed will be randomized to either an 8-week Internet-delivered acceptance-based cognitive behavioral therapy (i.e., acceptance and commitment therapy [ACT]), or wa it-list control. We aim to include measures of distress associated with hearing difficulties, anxiety, and depression. In addition, we aim to measure acceptance associated with hearing difficulties as well as quality of life. The results of the trial may further our understanding of how to best treat people who present problems with both psychological distress and hearing in using the Internet.

  6. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  7. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first

  8. Internet Connections: Understanding Your Access Options.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1994-01-01

    Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…

  9. Interfacing the Controllogics PLC over Ethernet/IP.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kasemir, K. U.; Dalesio, L. R.

    2001-01-01

    The Allen-Bradley ControlLogix [1] line of programmable logic controllers (PLCs) offers several interfaces: Ethernet, ControlNet, DeviceNet, RS-232 and others. The ControlLogix Ethernet interface module 1756-ENET uses EtherNet/IP, the ControlNet protocol [2], encapsulated in Ethernet packages, with specific service codes [3]. A driver for the Experimental Physics and Industrial Control System (EPICS) has been developed that utilizes this EtherNet/IP protocol for controllers running the vxWorks RTOS as well as a Win32 and Unix/Linux test program. Features, performance and limitations of this interface are presented.

  10. In-Space Networking On NASA's SCaN Testbed

    NASA Technical Reports Server (NTRS)

    Brooks, David; Eddy, Wesley M.; Clark, Gilbert J., III; Johnson, Sandra K.

    2016-01-01

    The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios (SDRs) and a programmable flight computer. The purpose of the Testbed is to conduct inspace research in the areas of communication, navigation, and networking in support of NASA missions and communication infrastructure. Multiple reprogrammable elements in the end to end system, along with several communication paths and a semi-operational environment, provides a unique opportunity to explore networking concepts and protocols envisioned for the future Solar System Internet (SSI). This paper will provide a general description of the system's design and the networking protocols implemented and characterized on the testbed, including Encapsulation, IP over CCSDS, and Delay-Tolerant Networking (DTN). Due to the research nature of the implementation, flexibility and robustness are considered in the design to enable expansion for future adaptive and cognitive techniques. Following a detailed design discussion, lessons learned and suggestions for future missions and communication infrastructure elements will be provided. Plans for the evolving research on SCaN Testbed as it moves towards a more adaptive, autonomous system will be discussed.

  11. Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems

    PubMed Central

    Abu-Nimeh, Faisal T.; Choong, Woon-Seng

    2017-01-01

    Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card’s ring buffers, bypassing the operating system kernel’s networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity. PMID:28630948

  12. Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems.

    PubMed

    Abu-Nimeh, Faisal T; Choong, Woon-Seng

    2017-03-01

    Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card's ring buffers, bypassing the operating system kernel's networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity.

  13. Hardware platform for multiple mobile robots

    NASA Astrophysics Data System (ADS)

    Parzhuber, Otto; Dolinsky, D.

    2004-12-01

    This work is concerned with software and communications architectures that might facilitate the operation of several mobile robots. The vehicles should be remotely piloted or tele-operated via a wireless link between the operator and the vehicles. The wireless link will carry control commands from the operator to the vehicle, telemetry data from the vehicle back to the operator and frequently also a real-time video stream from an on board camera. For autonomous driving the link will carry commands and data between the vehicles. For this purpose we have developed a hardware platform which consists of a powerful microprocessor, different sensors, stereo- camera and Wireless Local Area Network (WLAN) for communication. The adoption of IEEE802.11 standard for the physical and access layer protocols allow a straightforward integration with the internet protocols TCP/IP. For the inspection of the environment the robots are equipped with a wide variety of sensors like ultrasonic, infrared proximity sensors and a small inertial measurement unit. Stereo cameras give the feasibility of the detection of obstacles, measurement of distance and creation of a map of the room.

  14. A new Information publishing system Based on Internet of things

    NASA Astrophysics Data System (ADS)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  15. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  16. Using VoIP to compete.

    PubMed

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  17. An Analysis for an Internet Grid to Support Space Based Operations

    NASA Technical Reports Server (NTRS)

    Bradford, Robert; McNair, Ann R. (Technical Monitor)

    2002-01-01

    Currently, and in the past, dedicated communication circuits and "network services" with very stringent performance requirements have been used to support manned and unmanned mission critical ground operations at GSFC, JSC, MSFC, KSC and other NASA facilities. Because of the evolution of network technology, it is time to investigate other approaches to providing mission services for space ground and flight operations. In various scientific disciplines, effort is under way to develop network/komputing grids. These grids consisting of networks and computing equipment are enabling lower cost science. Specifically, earthquake research is headed in this direction. With a standard for network and computing interfaces using a grid, a researcher would not be required to develop and engineer NASA/DoD specific interfaces with the attendant increased cost. Use of the Internet Protocol (IP), CCSDS packet spec, and reed-solomon for satellite error correction etc. can be adopted/standardized to provide these interfaces. Generally most interfaces are developed at least to some degree end to end. This study would investigate the feasibility of using existing standards and protocols necessary to implement a SpaceOps Grid. New interface definitions or adoption/modification of existing ones for the various space operational services is required for voice both space based and ground, video, telemetry, commanding and planning may play a role to some undefined level. Security will be a separate focus in the study since security is such a large issue in using public networks. This SpaceOps Grid would be transparent to users. It would be anagulous to the Ethernet protocol's ease of use in that a researcher would plug in their experiment or instrument at one end and would be connected to the appropriate host or server without further intervention. Free flyers would be in this category as well. They would be launched and would transmit without any further intervention with the researcher or ground ops personnel. The payback in developing these new approaches in support of manned and unmanned operations is lower cost and will enable direct participation by more people in organizations and educational institutions in space based science. By lowering the high cost of space based operations and networking, more resource will be available to the science community for science. With a specific grid in place, experiment development and operations would be much less costly by using standardized network interfaces. Because of the extensive connectivity on a global basis, significant numbers of people would participate in science who otherwise would not be able to participate.

  18. Interplay of ICP and IXP over the Internet with power-law features

    NASA Astrophysics Data System (ADS)

    Fan, Zhongyan; Tang, Wallace Kit-Sang

    The Internet is the largest artificial network consisting of billions of IP devices, managed by tens of thousands of autonomous systems (ASes). Due to its importance, the Internet has received much attention and its topological features, mainly in AS-level, have been widely explored from the complex network perspective. However, most of the previous studies assume a homogeneous model in which nodes are indistinguishable in nature. It may be good for a general study of topological structure, but unfortunately it fails to reflect the functionality. The Internet ecology is in fact heterogeneous and highly complex. It consists of various elements such as Internet Exchange Points (IXPs), Internet Content Providers (ICPs), and normal Autonomous System (ASes), realizing different roles in the Internet. In this paper, we propose level-structured network models for investigating how ICP performs under the AS-topology with power-law features and how IXP enhances its performance from a complex network perspective. Based on real data, our results reveal that the power-law nature of the Internet facilitates content delivery not only in efficiency but also in path redundancy. Moreover, the proposed multi-level framework is able to clearly illustrate the significant benefits gained by ICP from IXP peerings.

  19. Adding tools to the open source toolbox: The Internet

    NASA Technical Reports Server (NTRS)

    Porth, Tricia

    1994-01-01

    The Internet offers researchers additional sources of information not easily available from traditional sources such as print volumes or commercial data bases. Internet tools such as e-mail and file transfer protocol (ftp) speed up the way researchers communicate and transmit data. Mosaic, one of the newest additions to the Internet toolbox, allows users to combine tools such as ftp, gopher, wide area information server, and the world wide web with multimedia capabilities. Mosaic has quickly become a popular means of making information available on the Internet because it is versatile and easily customizable.

  20. Internet-based interventions for the prevention and treatment of depression in people living in developing countries: A systematic review.

    PubMed

    Martínez, Pablo; Rojas, Graciela; Martínez, Vania; Lara, María Asunción; Pérez, J Carola

    2018-07-01

    Internet-based interventions for depression may be a valuable resource to reduce the treatment gap for those living in developing countries. However, evidence comes mainly from developed countries. This systematic review summarized the evidence on preventive or therapeutic Internet-based interventions for depression for people who reside in developing countries. CINAHL, EMBASE, PubMed, SciELO Citation Indexes, the Journal of Medical Internet Research, and the Telemedicine and e-Health journal, were searched up to June 2017, to identify feasibility or effectiveness studies of preventive or therapeutic Internet-based interventions for depression, with or without human support. Studies included subjects residing in developing countries, and were published in English or Spanish. Study protocols were included. Risk of bias and/or quality of the reporting of the studies included was assessed. Five feasibility studies, aimed at the prevention of depression, and a study protocol were included in this systematic review. Reports came mostly from the Americas (n = 4). Internet-based interventions aimed at the prevention of depression presented low levels of human support, were useful and acceptable to their users, and require further design refinements to improve their use and retention. No gray literature was searched or included in this systematic review. Searches were limited to English and Spanish languages. Internet-based interventions aimed at the prevention of depression in people who reside in developing countries are in an early phase of development, limiting the generalizability of the results. Future studies must employ persuasive designs to improve user retention, incorporating larger samples and a control group to conclusively determine feasibility. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Multi-board kernel communication using socket programming for embedded applications

    NASA Astrophysics Data System (ADS)

    Mishra, Ashish; Girdhar, Neha; Krishnia, Nikita

    2016-03-01

    It is often seen in large application projects, there is a need to communicate between two different processors or two different kernels. The aim of this paper is to communicate between two different kernels and use efficient method to do so. The TCP/IP protocol is implemented to communicate between two boards via the Ethernet port and use lwIP (lightweight IP) stack, which is a smaller independent implementation of the TCP/IP stack suitable for use in embedded systems. While retaining TCP/IP functionality, lwIP stack reduces the use of memory and even size of the code. In this process of communication we made Raspberry pi as an active client and Field programmable gate array(FPGA) board as a passive server and they are allowed to communicate via Ethernet. Three applications based on TCP/IP client-server network communication have been implemented. The Echo server application is used to communicate between two different kernels of two different boards. Socket programming is used as it is independent of platform and programming language used. TCP transmit and receive throughput test applications are used to measure maximum throughput of the transmission of data. These applications are based on communication to an open source tool called iperf. It is used to measure the throughput transmission rate by sending or receiving some constant piece of data to the client or server according to the test application.

  2. A Learning-Based Approach for IP Geolocation

    NASA Astrophysics Data System (ADS)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  3. Enhancing the Classification Accuracy of IP Geolocation

    DTIC Science & Technology

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  4. CERT Research Annual Report 2009

    DTIC Science & Technology

    2009-01-01

    Domain Name System (DNS), which maps names to IP addresses, is a vital component of the Internet. Nearly every transaction on the Internet begins by...many different ASNs (Autonomous System Numbers, which map to Internet Service Providers) there are. If there are more than 20, then it is extremely...functions, that is, mappings from their domains to ranges, or inputs to outputs. These mappings are pre-defined as a starting point for the FX

  5. Need low-cost networking? Consider DeviceNet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moss, W.H.

    1996-11-01

    The drive to reduce production costs and optimize system performance in manufacturing facilities causes many end users to invest in network solutions. Because of distinct differences between the way tasks are performed and the way data are handled for various applications, it is clear than more than one network will be needed in most facilities. What is not clear is which network is most appropriate for a given application. The information layer is the link between automation and information environments via management information systems (MISs) and manufacturing execution systems (MESs) and manufacturing execution systems (MESs). Here the market has chosenmore » a de facto standard in Ethernet, primarily transmission control protocol/internet protocol (TCP/IP) and secondarily manufacturing messaging system (MMS). There is no single standard at the device layer. However, the DeviceNet communication standard has made strides to reach this goal. This protocol eliminates expensive hardwiring and provides improved communication between devices and important device-level diagnostics not easily accessible or available through hardwired I/O interfaces. DeviceNet is a low-cost communications link connecting industrial devices to a network. Many original equipment manufacturers and end users have chosen the DeviceNet platform for several reasons, but most frequently because of four key features: interchangeability; low cost; advanced diagnostics; insert devices under power.« less

  6. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    ERIC Educational Resources Information Center

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  7. The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information.

    ERIC Educational Resources Information Center

    Wiggins, Rich

    1993-01-01

    Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…

  8. Personal digital assistant-based, internet-enabled remote communication system for a wearable pneumatic biventricular assist device.

    PubMed

    Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung

    2007-11-01

    Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.

  9. Consideration of IP Telephony Quality on the IEEE802.11a Wireless LAN

    NASA Astrophysics Data System (ADS)

    Miyashita, Michifumi; Takamatsu, Hideyuki; Kurono, Masahiro

    Recently, IP telephony services in wired network are started, and paid attention for its charge-free nature due to IP technology. On the other hand, the Hot-Spot service, which provides one to access the Internet at the public space such as cafe, using the IEEE wireless LAN has been evolved, and it is expected that the IP telephony service on the Hot-Spot network will be developed. However, the IP telephony quality on the IEEE802.11a wireless LAN has not been fully studied yet. In this paper, we discuss about the quality of IP telephony service on the IEEE802.11a wireless LAN from the aspect of R-value, and show ability to improve the IP telephony quality on the Hot-Spot network employing PLC function defined in the ITU-T Recommendation G.711 Appendix I.

  10. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    PubMed

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  11. The anti-CMS technique for genome-wide mapping of 5-hydroxymethylcytosine.

    PubMed

    Huang, Yun; Pastor, William A; Zepeda-Martínez, Jorge A; Rao, Anjana

    2012-10-01

    5-Hydroxymethylcytosine (5hmC) is a recently discovered base in the mammalian genome, produced upon oxidation of 5-methylcytosine (5mC) in a process catalyzed by TET proteins. The biological functions of 5hmC and further oxidation products of 5mC are under intense investigation, as they are likely intermediates in DNA demethylation pathways. Here we describe a novel protocol to profile 5hmC at a genome-wide scale. This approach is based on sodium bisulfite-mediated conversion of 5hmC to cytosine-5-methylenesulfonate (CMS); CMS-containing DNA fragments are then immunoprecipitated using a CMS-specific antiserum. The anti-CMS technique is highly specific with a low background, and is much less dependent on 5hmC density than anti-5hmC immunoprecipitation (IP). Moreover, it does not enrich for CA and CT repeats, as noted for 5hmC DNA IP using antibodies to 5hmC. The anti-CMS protocol takes 3 d to complete.

  12. Performance Analysis of Power Saving Class of Type I for Voice Service in Two-Way Communication in IEEE 802.16e

    NASA Astrophysics Data System (ADS)

    Hwang, Eunju; Kim, Kyung Jae; Choi, Bong Dae

    In IEEE 802.16e, power saving is one of the important issues for battery-powered mobile stations (MSs). We present a performance analysis of power saving class (PSC) of type I in IEEE 802.16e standard for voice over Internet protocol (VoIP) service with silence suppression in two-way communication. On-off pattern of a voice user in two-way communication is characterized by the modified Brady model, which includes short silence gaps less than 200ms and talkspurt periods shorter than 15ms, and so differs from the Brady model. Our analysis of PSC I follows the standard-based procedure for the deactivation of the sleep mode, where a uplink packet arrival during a mutual silence period wakes up the MS immediately while a downlink packet arrival waits to be served until the next listening window. We derive the delay distribution of the first downlink packet arriving during a mutual silence period, and find the dropping probability of downlink packets since a voice packet drops if it is not transmitted within maximum delay constraint. In addition, we calculate the average power consumption under the modified Brady model. Analysis and simulation results show that the sleep mode operation for the MS with VoIP service yields 32 ∼ 39% reduction in the power consumption of the MS. Finally we obtain the optimal initial/final-sleep windows that yield the minimum average power consumption while satisfying QoS constraints on the packet dropping probability and the maximum delay.

  13. Future optical communication networks beyond 160 Gbit/s based on OTDM

    NASA Astrophysics Data System (ADS)

    Prati, Giancarlo; Bogoni, Antonella; Poti, Luca

    2005-01-01

    The virtually unlimited bandwidth of optical fibers has caused a great increase in data transmission speed over the past decade and, hence, stimulated high-demand multimedia services such as distance learning, video-conferencing and peer to peer applications. For this reason data traffic is exceeding telephony traffic, and this trend is driving the convergence of telecommunications and computer communications. In this scenario Internet Protocol (IP) is becoming the dominant protocol for any traffic, shifting the attention of the network designers from a circuit switching approach to a packet switching approach. A role of paramount importance in packet switching networks is played by the router that must implement the functionalities to set up and maintain the inter-nodal communications. The main functionalities a router must implement are routing, forwarding, switching, synchronization, contention resolution, and buffering. Nowadays, opto-electronic conversion is still required at each network node to process the incoming signal before routing that to the right output port. However, when the single channel bit rate increases beyond electronic speed limit, Optical Time Division Multiplexing (OTDM) becomes a forced choice, and all-optical processing must be performed to extract the information from the incoming packet. In this paper enabling techniques for ultra-fast all-optical network will be addressed. First a 160 Gbit/s complete transmission system will be considered. As enabling technique, an overview for all-optical logics will be discussed and experimental results will be presented using a particular reconfigurable NOLM based on Self-Phase-Modulation (SPM) or Cross-Phase-Modulation (XPM). Finally, a rough experiment on label extraction, all-optical switching and packet forwarding is shown.

  14. FilterGate, or Knowing What We're Walling In or Walling Out.

    ERIC Educational Resources Information Center

    Wolinsky, Art

    2001-01-01

    Discusses problems with Internet filtering when it results in erroneously blocked Web sites. Topics include the Children's Online Protection Act (CIPA); blocking all sites on an Internet Service Provider (ISP) through Round Robin DNS; blocking by URL or by IP number; and questioning the need for filters. (LRW)

  15. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  16. The future of interaction on the Internet

    NASA Technical Reports Server (NTRS)

    Maybury, Mark T.

    1994-01-01

    The federated collection of heterogeneous computers we collectively term the Internet has been the force behind revolutionary change, both in terms of actual practice and imagination of what might be. The raw numbers are staggering: IP registrations are now ten times that of only five years ago; and between 1992 - 1993 the amount of information being transferred tripled. Changes in three key areas: knowledge discovery; intelligent information access; and collaboration on the Internet are discussed.

  17. IoT real time data acquisition using MQTT protocol

    NASA Astrophysics Data System (ADS)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  18. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  19. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  20. Analysis of Protein-DNA Interaction by Chromatin Immunoprecipitation and DNA Tiling Microarray (ChIP-on-chip).

    PubMed

    Gao, Hui; Zhao, Chunyan

    2018-01-01

    Chromatin immunoprecipitation (ChIP) has become the most effective and widely used tool to study the interactions between specific proteins or modified forms of proteins and a genomic DNA region. Combined with genome-wide profiling technologies, such as microarray hybridization (ChIP-on-chip) or massively parallel sequencing (ChIP-seq), ChIP could provide a genome-wide mapping of in vivo protein-DNA interactions in various organisms. Here, we describe a protocol of ChIP-on-chip that uses tiling microarray to obtain a genome-wide profiling of ChIPed DNA.

Top