DOT National Transportation Integrated Search
2004-01-01
This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.
Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan
2015-09-22
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things
Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan
2015-01-01
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683
Space Internet-Embedded Web Technologies Demonstration
NASA Technical Reports Server (NTRS)
Foltz, David A.
2001-01-01
The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.
The Interplanetary Internet: A Communications Infrastructure for Mars Exploration
NASA Astrophysics Data System (ADS)
Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.
2002-01-01
A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5
106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink
2017-07-31
Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit
48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).
Code of Federal Regulations, 2011 CFR
2011-10-01
... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...
NASA Astrophysics Data System (ADS)
Huang, C. Y.; Wu, C. H.
2016-06-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.
A History of the Improvement of Internet Protocols Over Satellites Using ACTS
NASA Technical Reports Server (NTRS)
Allman, Mark; Kruse, Hans; Ostermann, Shawn
2000-01-01
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.
Intranets: Just Another Bandwagon?
ERIC Educational Resources Information Center
Lynch, Gary
1997-01-01
Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José
2016-07-22
The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.
Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José
2016-01-01
The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265
Internet Data Delivery for Future Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.
Protocol for a Delay-Tolerant Data-Communication Network
NASA Technical Reports Server (NTRS)
Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin
2004-01-01
As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.
Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young
2016-03-01
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.
Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.
ERIC Educational Resources Information Center
McCulley, P. Michael
1995-01-01
Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…
Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6
ERIC Educational Resources Information Center
Pazdrowski, Tomasz
2013-01-01
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Real-Time Multimedia on the Internet: What Will It Take?
ERIC Educational Resources Information Center
Sodergren, Mike
1998-01-01
Considers the requirements for real-time, interactive multimedia over the Internet. Topics include demand for interactivity; new pricing models for Internet service; knowledgeable suppliers; consumer education on standards; enhanced infrastructure, including bandwidth; and new technology, including RSVP, and end-to-end Internet-working protocol.…
Towards an interplanetary internet: a proposed strategy for standardization
NASA Technical Reports Server (NTRS)
Hooke, A. J.
2002-01-01
This paper reviews the current set of standard data communications capabilities that exist to support advanced missions, discusses the architectural concepts for the future Interplanetary Internet, and suggests how a standardized set of space communications protocols that can grow to support future scenarios where human intelligence is widely distributed across the Solar System.
Rethinking the NTCIP Design and Protocols - Analyzing the Issues
DOT National Transportation Integrated Search
1998-03-03
This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...
Demonstrating a Realistic IP Mission Prototype
NASA Technical Reports Server (NTRS)
Rash, James; Ferrer, Arturo B.; Goodman, Nancy; Ghazi-Tehrani, Samira; Polk, Joe; Johnson, Lorin; Menke, Greg; Miller, Bill; Criscuolo, Ed; Hogie, Keith
2003-01-01
Flight software and hardware and realistic space communications environments were elements of recent demonstrations of the Internet Protocol (IP) mission concept in the lab. The Operating Missions as Nodes on the Internet (OMNI) Project and the Flight Software Branch at NASA/GSFC collaborated to build the prototype of a representative space mission that employed unmodified off-the-shelf Internet protocols and technologies for end-to-end communications between the spacecraft/instruments and the ground system/users. The realistic elements used in the prototype included an RF communications link simulator and components of the TRIANA mission flight software and ground support system. A web-enabled camera connected to the spacecraft computer via an Ethernet LAN represented an on-board instrument creating image data. In addition to the protocols at the link layer (HDLC), transport layer (UDP, TCP), and network (IP) layer, a reliable file delivery protocol (MDP) at the application layer enabled reliable data delivery both to and from the spacecraft. The standard Network Time Protocol (NTP) performed on-board clock synchronization with a ground time standard. The demonstrations of the prototype mission illustrated some of the advantages of using Internet standards and technologies for space missions, but also helped identify issues that must be addressed. These issues include applicability to embedded real-time systems on flight-qualified hardware, range of applicability of TCP, and liability for and maintenance of commercial off-the-shelf (COTS) products. The NASA Earth Science Technology Office (ESTO) funded the collaboration to build and demonstrate the prototype IP mission.
Internet Data Delivery for Future Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.
SEnviro: a sensorized platform proposal using open hardware and open standards.
Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín
2015-03-06
The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and theWeb of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented.
SEnviro: A Sensorized Platform Proposal Using Open Hardware and Open Standards
Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín
2015-01-01
The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and the Web of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented. PMID:25756864
Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network
2014-01-01
SIPRNet Secret Internet Protocol Router Network SOP Standard Operating Procedure SVTC Secure Video Teleconference (or –Conferencing) TTP Tactics...Voice over internet protocol (VOIP) telephone connectivity • Email • Web browsing • Secure video teleconferencing (SVTC...10, 2012. As of January 15, 2013: http://www.guardian.co.uk/world/2012/oct/10/us-troops-jordan-syria-crisis Baldor, Lolita C., and Pauline Jelinek
NASA STI Program Coordinating Council Twelfth Meeting: Standards
NASA Technical Reports Server (NTRS)
1994-01-01
The theme of this NASA Scientific and Technical Information Program Coordinating Council Meeting was standards and their formation and application. Topics covered included scientific and technical information architecture, the Open Systems Interconnection Transmission Control Protocol/Internet Protocol, Machine-Readable Cataloging (MARC) open system environment procurement, and the Government Information Locator Service.
Internet Technology for Future Space Missions
NASA Technical Reports Server (NTRS)
Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith
2002-01-01
Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.
From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans
2014-06-01
Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any
2008-03-01
Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote
Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.
2015-01-01
Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. PMID:26023213
Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S
2015-10-01
Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. © 2015 American Physical Therapy Association.
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Use of IPsec by Manned Space Missions
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.
2009-01-01
NASA's Constellation Program is developing its next generation manned space systems for missions to the International Space Station (ISS) and the Moon. The Program is embarking on a path towards standards based Internet Protocol (IP) networking for space systems communication. The IP based communications will be paired with industry standard security mechanisms such as Internet Protocol Security (IPsec) to ensure the integrity of information exchanges and prevent unauthorized release of sensitive information in-transit. IPsec has been tested in simulations on the ground and on at least one Earth orbiting satellite, but the technology is still unproven in manned space mission situations and significant obstacles remain.
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
OSI in the NASA science internet: An analysis
NASA Technical Reports Server (NTRS)
Nitzan, Rebecca
1990-01-01
The Open Systems Interconnection (OSI) protocol suite is a result of a world-wide effort to develop international standards for networking. OSI is formalized through the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The goal of OSI is to provide interoperability between network products without relying on one particular vendor, and to do so on a multinational basis. The National Institute for Standards and Technology (NIST) has developed a Government OSI Profile (GOSIP) that specified a subset of the OSI protocols as a Federal Information Processing Standard (FIPS 146). GOSIP compatibility has been adopted as the direction for all U.S. government networks. OSI is extremely diverse, and therefore adherence to a profile will facilitate interoperability within OSI networks. All major computer vendors have indicated current or future support of GOSIP-compliant OSI protocols in their products. The NASA Science Internet (NSI) is an operational network, serving user requirements under NASA's Office of Space Science and Applications. NSI consists of the Space Physics Analysis Network (SPAN) that uses the DECnet protocols and the NASA Science Network (NSN) that uses TCP/IP protocols. The NSI Project Office is currently working on an OSI integration analysis and strategy. A long-term goal is to integrate SPAN and NSN into one unified network service, using a full OSI protocol suite, which will support the OSSA user community.
TCP Performance Enhancement Over Iridium
NASA Technical Reports Server (NTRS)
Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James
2007-01-01
In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.
Satellite-Friendly Protocols and Standards
NASA Astrophysics Data System (ADS)
Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.
2002-01-01
We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.
Enhanced International Space Station Ku-Band Telemetry Service
NASA Technical Reports Server (NTRS)
Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason
2014-01-01
(1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.
ERIC Educational Resources Information Center
Radack, Shirley M.
1994-01-01
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
NASA Technical Reports Server (NTRS)
Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)
2000-01-01
The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.
NASA Astrophysics Data System (ADS)
Phister, P. W., Jr.
1983-12-01
Development of the Air Force Institute of Technology's Digital Engineering Laboratory Network (DELNET) was continued with the development of an initial draft of a protocol standard for all seven layers as specified by the International Standards Organization's (ISO) Reference Model for Open Systems Interconnections. This effort centered on the restructuring of the Network Layer to perform Datagram routing and to conform to the developed protocol standards and actual software module development of the upper four protocol layers residing within the DELNET Monitor (Zilog MCZ 1/25 Computer System). Within the guidelines of the ISO Reference Model the Transport Layer was developed utilizing the Internet Header Format (IHF) combined with the Transport Control Protocol (TCP) to create a 128-byte Datagram. Also a limited Application Layer was created to pass the Gettysburg Address through the DELNET. This study formulated a first draft for the DELNET Protocol Standard and designed, implemented, and tested the Network, Transport, and Application Layers to conform to these protocol standards.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
DARPA Internet Program. Internet and Transmission Control Specifications,
1981-09-01
Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information
Experimental Evaluation of Unicast and Multicast CoAP Group Communication
Ishaq, Isam; Hoebeke, Jeroen; Moerman, Ingrid; Demeester, Piet
2016-01-01
The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP. PMID:27455262
Open Source Cybersecurity for the 21st Century
2013-03-01
would eventually develop into Transmission Control Protocol/Internet Protocol ( TCP /IP) based on the following ground rules:12 Each distinct...The internet’s design permits any device conforming to modern day protocol standards ( TCP /IP being the most prevalent) to communicate across the... factors , coupled with the internet’s global reach and low cost of entry, are what make securing the cyber domain one of the most complex challenges we
Sriram, Vinay K; Montgomery, Doug
2017-07-01
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.
NASA Technical Reports Server (NTRS)
Randolph, Lynwood P.
1994-01-01
The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.
Internet Protocol Transition Workbook
1982-03-01
U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute
DWTP: a basis for networked VR on the Internet
NASA Astrophysics Data System (ADS)
Broll, Wolfgang; Schick, Daniel
1998-04-01
Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.
ERIC Educational Resources Information Center
Needleman, Mark H.
1996-01-01
Reviews developments related to standards in electronic and networked information. Discusses traditional library and Internet communities, and notes the importance of having a supporting infrastructure in place. Topics include: Z39.50; Z39.56 Serial Item/Contribution Identifier (SICI); Interlibrary Loan (ILL) Protocol; character set standards;…
ERIC Educational Resources Information Center
Tennant, Roy
1992-01-01
Explains how users can find and access information resources available on the Internet. Highlights include network information centers (NICs); lists, both formal and informal; computer networking protocols, including international standards; electronic mail; remote log-in; and file transfer. (LRW)
Defense Simulation Internet: next generation information highway.
Lilienthal, M G
1995-06-01
The Department of Defense has been engaged in the Defense Modeling and Simulation Initiative (DMSI) to provide advanced distributed simulation warfighters in geographically distributed localities. Lessons learned from the Defense Simulation Internet (DSI) concerning architecture, standards, protocols, interoperability, information sharing, and distributed data bases are equally applicable to telemedicine. Much of the vision and objectives of the DMSI are easily translated into the vision for world wide telemedicine.
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Glover, Daniel R.; vonDeak, Thomas C.; Bhasin, Kul B.
1998-01-01
The realization of the full potential of the National Information Infrastructure (NH) and Global Information Infrastructure (GII) requires seamless interoperability of emerging satellite networks with terrestrial networks. This requires a cooperative effort between industry, academia and government agencies to develop and advocate new, satellite-friendly communication protocols and modifications to existing communication protocol standards. These groups have recently come together to actively participating in a number of standards making bodies including: the Internet Engineering Task Force (IETF), the Asynchronous Transfer Mode (ATM) Forum, the International Telecommunication Union (ITU) and the Telecommunication Industry Association MA) to ensure that issues regarding efficient use of these protocols over satellite links are not overlooked. This paper will summarize the progress made toward standards development to achieve seamless integration and accelerate the deployment of multimedia applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-15
...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...
An energy-efficient transmission scheme for real-time data in wireless sensor networks.
Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun
2015-05-20
The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.
An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks
Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun
2015-01-01
The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722
Improving Service Management in the Internet of Things
Sammarco, Chiara; Iera, Antonio
2012-01-01
In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).
Internetting tactical security sensor systems
NASA Astrophysics Data System (ADS)
Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.
1998-08-01
The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.
Computer Networks and Networking: A Primer.
ERIC Educational Resources Information Center
Collins, Mauri P.
1993-01-01
Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…
Internet Protocol Enhanced over Satellite Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
1999-01-01
Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.
Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung
2007-11-01
Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.
Cath, Corinne; Floridi, Luciano
2017-04-01
The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet's architecture. The technical decisions made by Internet Standard Developing Organisations (SDOs) that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights it protects and which practices it enables. In this article, we contribute to the debate on SDOs' ethical responsibility to bring their work in line with human rights. We defend three theses. First, SDOs' work is inherently political. Second, the Internet Engineering Task Force (IETF), one of the most influential SDOs, has a moral obligation to ensure its work is coherent with, and fosters, human rights. Third, the IETF should enable the actualisation of human rights through the protocols and standards it designs by implementing a responsibility-by-design approach to engineering. We conclude by presenting some initial recommendations on how to ensure that work carried out by the IETF may enable human rights.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-03
... Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP... waivers for one year because the record demonstrates that it is technologically infeasible for VRS and IP... standards for VRS and IP Relay will expire on July 1, 2011, or until the Commission addresses pending...
Internet over the VDL-2 Subnetwork: the VDL-2/IP Aviation Datalink System
NASA Technical Reports Server (NTRS)
Grappel, R. D.
2000-01-01
This report describes the design to operate the standard Internet communications protocols (IP) over the VHF aviation Data Link Mode 2 (VDL-2) subnetwork. The VDL-2/IP system specified in this report can operate transparently with the current aviation users of VDL-2 (Airline Communications and Reporting System, ACARS and Aeronautical Telecommunications Network, ATN) and proposed users (Flight Information Service via Broadcast, FIS-B). The VDL-2/IP system provides a straightforward mechanisms to utilize inexpensive, commercial off-the-shelf (COTS) communications packages developed for the Internet as part of the aviation datalink system.
A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability.
Huang, Chih-Yuan; Wu, Cheng-Hung
2016-08-31
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human's daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner.
History, structure, and function of the Internet.
Glowniak, J
1998-04-01
The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.
Traffic management mechanism for intranets with available-bit-rate access to the Internet
NASA Astrophysics Data System (ADS)
Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed
1997-10-01
The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.
The Internet and Education: Some Lessons on Privacy and Pitfalls.
ERIC Educational Resources Information Center
Descy, Don E.
1997-01-01
Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…
Internet Technology on Spacecraft
NASA Technical Reports Server (NTRS)
Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)
2000-01-01
The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current approaches. The cost to implement is much less than current approaches due to the availability of highly reliable and standard Internet tools. Use of standard Internet applications onboard reduces the risk of obsolescence inherent in custom protocols due to extremely wide use across all domains. These basic building blocks provide the framework for building onboard software to support direct user communication with payloads including payload control. Other benefits are payload to payload communication from dissimilar spacecraft, constellations of spacecraft, and reconfigurability on orbit. This work is funded through contract with the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC).
Secure HL7 transactions using Internet mail (Internet draft).
Schadow, Gunther; Tucker, Mark; Rishel, Wes
2002-01-01
The document describes the applicability of the Internet standardisation efforts on secure electronic data interchange (EDI) transactions for Health Level-7 (HL7), an EDI standard for Healthcare used world-wide. The document heavily relies on the work in progress by the IETF EDIINT working group. It is in most parts a restatement of the EDIINTs requirements document and application statement 1 (AS#1) tailored to the needs of the HL7 audience. The authors tried to make the document as self consistent as possible. The goal is to give to the reader who is not a security or Internet standards expert enough foundational and detail information to enable him to build communication software that complies to the Internet standards. Even though the authors rely on and promote the respective Internet standards and drafts, they did not withstand from commenting on and criticising the work where they see upcoming problems in use with HL7 or other EDI protocols that have not been in the initial focus of the EDIINT working group. The authors make suggestions to add parameters to the specification of the MIME type for EDI messages in RFC 1767 in order to enhance functionality. The authors give use cases for a larger subset of disposition types and modifiers of message disposition notifications. One key issue where the document goes beyond the current EDIINT drafts is the concept of non-repudiation of commitment to an EDI transaction. Secure EDI transactions should be regarded as "distributed contracts," i.e. not only the sending and receiving of single messages should be non-refutable but also the connection between messages interchanges. In anticipation of this requirement HL7 usually requires a response message to be sent to acknowledge every transaction. The authors therefore have the requirement to securely couple an EDI response message to its request message. Given the current shape of RFC 1767 this is generally possible only if a response message is coupled with an MDN receipt and the combination of both signed by the responder. The document describes a protocol to bundle MDN and response that uses the MIME multi-part/related content type in RFC 2112.
Code of Federal Regulations, 2014 CFR
2014-10-01
... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...
Code of Federal Regulations, 2013 CFR
2013-10-01
... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...
Code of Federal Regulations, 2012 CFR
2012-10-01
... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...
Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)
2006-12-01
Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a
Jin, Wenquan; Kim, DoHyeun
2018-05-26
The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.
Sousa, Pedro; Fonseca, Helena; Gaspar, Pedro; Gaspar, Filomena
2014-04-01
This paper describes the design and rationale of a controlled trial that aims to determine the effectiveness of an intervention programme in which the internet is used. Adolescent obesity is a major health problem, there being urgency to find effective interventions that induce behavioural change. The inclusion of the internet in the intervention may improve adolescents' adherence to the weight management programme and lead to adoption of healthier lifestyles. A clinical trial with a control group (non-randomized). Participants are adolescents with appointments at a paediatric obesity clinic (Portugal). Sample size was calculated according to the power analysis. The experimental group will follow the standard treatment protocol and receive free access to the e-therapeutic platform. The control group will follow the standard treatment protocol and join a waiting list. Intervention length will be 36 weeks (24 weeks of direct intervention with a follow-up for 12 weeks). This study was approved by the Ethical Committee for Health (Lisbon, Portugal) in January 2012 and funded by the Foundation for Science and Technology (Portugal) in December 2012. The results of this research will promote reflection on new approaches directed to treat adolescent obesity and on the promotion of healthy behaviours. We expect to gather empirical evidence of the intervention programme effectiveness. The expectations lie on the population health gains, empowerment in decision-making and adoption of healthier lifestyles. © 2013 John Wiley & Sons Ltd.
Command and Control of Space Assets Through Internet-Based Technologies Demonstrated
NASA Technical Reports Server (NTRS)
Foltz, David A.
2002-01-01
The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space experiment. A second Internet connection at the demonstration area was implemented to provide Internet connectivity to a group of workstations to serve as platforms for controlling the simulated space experiment. Installation of this Internet connection was coordinated with an Internet service provider (ISP) and local NASA Johnson Space Center personnel. Not only did this TCP/IP-based architecture prove that a principal investigator on the Internet can securely command and control on-orbit assets, it also demonstrated that valuable virtual testing of planned on-orbit activities can be conducted over the Internet prior to actual deployment in space.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-07
...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-15
...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...
Design and Development of a Network-Based Electronic Library.
ERIC Educational Resources Information Center
Larson, Ray R.
1994-01-01
Describes collaboration between the University of California at Berkeley and four other universities to develop interoperable servers containing each participant's Computer Science Technical Reports and to make them available over the Internet using standard protocols. The proposed library architecture, approaches to indexing and retrieval, and…
Incorpoaration of Geosensor Networks Into Internet of Things for Environmental Monitoring
NASA Astrophysics Data System (ADS)
Habibi, R.; Alesheikh, A. A.
2015-12-01
Thanks to the recent advances of miniaturization and the falling costs for sensors and also communication technologies, Internet specially, the number of internet-connected things growth tremendously. Moreover, geosensors with capability of generating high spatial and temporal resolution data, measuring a vast diversity of environmental data and automated operations provide powerful abilities to environmental monitoring tasks. Geosensor nodes are intuitively heterogeneous in terms of the hardware capabilities and communication protocols to take part in the Internet of Things scenarios. Therefore, ensuring interoperability is an important step. With this respect, the focus of this paper is particularly on incorporation of geosensor networks into Internet of things through an architecture for monitoring real-time environmental data with use of OGC Sensor Web Enablement standards. This approach and its applicability is discussed in the context of an air pollution monitoring scenario.
ACTS 118x: High Speed TCP Interoperability Testing
NASA Technical Reports Server (NTRS)
Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.
1999-01-01
With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.
The Interplanetary Internet: a communications infrastructure for Mars exploration.
Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard
2003-01-01
A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.
The Interplanetary Internet: a communications infrastructure for Mars exploration
NASA Technical Reports Server (NTRS)
Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard
2003-01-01
A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.
A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability
Huang, Chih-Yuan; Wu, Cheng-Hung
2016-01-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human’s daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner. PMID:27589759
Standardized terminology for clinical trial protocols based on top-level ontological categories.
Heller, B; Herre, H; Lippoldt, K; Loeffler, M
2004-01-01
This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.
Internet Protocol Implementation Guide.
1982-08-01
RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first
Internet Connections: Understanding Your Access Options.
ERIC Educational Resources Information Center
Notess, Greg R.
1994-01-01
Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…
NASA Technical Reports Server (NTRS)
Shepard, Timothy J.; Partridge, Craig; Coulter, Robert
1997-01-01
The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.
The Wiley Protocol: an analysis of ethical issues.
Rosenthal, M Sara
2008-01-01
: This review explores the ethical issues surrounding an unregulated protocol that is advertised to women through consumer books, the popular press, and the Internet, known as the Wiley Protocol. : A content analysis of relevant documents was conducted, followed by telephone interviews with investigators and former participants to verify facts. : The Wiley Protocol is an example of unregulated research involving potentially unsafe doses of bioidentical hormones applied to an unselected population of women. This protocol fails to use research ethics guidelines such as informed consent, investigator expertise, sound methodology, standardized data collection, and data safety monitoring. : Clinical ethics breaches include lack of full disclosure of risks, coercive influences, as well as misinformation about the study goals and safety. Breaches of professional ethics include conflicts of interest with respect to financial incentives, patient accrual, and inadequate standards of awareness and proficiency among participating investigators. It appears evident that the failure to regulate nutriceuticals and products of compounding pharmacy has provided the opportunity for these ethical violations.
Ternström, Elin; Hildingsson, Ingegerd; Haines, Helen; Karlström, Annika; Sundin, Örjan; Ekdahl, Johanna; Segeblad, Birgitta; Larsson, Birgitta; Rondung, Elisabet; Rubertsson, Christine
2017-10-01
Fear of birth is a concern that requires evidence based treatment. The aim of this study is to present the protocol of a randomized controlled multi-center trial to compare internet-based cognitive therapy with counseling as standard care for pregnant women reporting fear of birth. Participants will be recruited in mid-pregnancy. Women who score 60 or above on the Fear of Birth Scale will be offered to participate in this study. Data will be collected by questionnaires including validated instruments at baseline and follow-ups at gestational weeks 30 and 36, two months and one year after birth. The primary outcome will be level of fear of birth measured with the Fear of Birth Scale at 36 weeks of gestation. Secondary outcome measures are level of fear of birth at two months and one year after giving birth, preferences for mode of birth, requests for elective cesarean section, compliance and satisfaction with treatment and birth outcomes. A power calculation based on a 20% reduction of fear implies that approximately 200 will be included in the trial. The study outlined in this protocol will be the first randomized controlled trial comparing internet-based cognitive therapy with counseling for women reporting fear of birth. An effective treatment may result in better overall health for women with fear of birth and a reduction in cesarean sections for non-medical reasons. Evidence regarding treatment options of fear of birth will also provide a greater choice for women. Copyright © 2017 Elsevier B.V. All rights reserved.
ISS and STS Commercial Off-the-Shelf Router Testing
NASA Technical Reports Server (NTRS)
Ivancie, William D.; Bell, Terry L.; Shell, Dan
2002-01-01
This report documents the results of testing performed with commercial off-the-shelf (COTS) routers and Internet Protocols (IPs) to determine if COTS equipment and IP could be utilized to upgrade NASA's current Space Transportation System (STS), the Shuttle, and the International Space Station communication infrastructure. Testing was performed by NASA Glenn Research Center (GRC) personnel within the Electronic Systems Test Laboratory (ESTE) with cooperation from the Mission Operations Directorate (MOD) Qualification and Utilization of Electronic System Technology (QUEST) personnel. The ESTE testing occurred between November 1 and 9, 2000. Additional testing was performed at NASA Glenn Research Center in a laboratory environment with equipment configured to emulate the STS. This report documents those tests and includes detailed test procedures, equipment interface requirements, test configurations and test results. The tests showed that a COTS router and standard Transmission Control Protocols and Internet Protocols (TCP/IP) could be used for both the Shuttle and the Space Station if near-error-free radio links are provided.
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Research into alternative network approaches for space operations
NASA Technical Reports Server (NTRS)
Kusmanoff, Antone L.; Barton, Timothy J.
1990-01-01
The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.
ERIC Educational Resources Information Center
Nieuwenhuysen, Paul
1997-01-01
Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…
The Behavior of TCP and Its Extensions in Space
NASA Technical Reports Server (NTRS)
Wang, Ruhai; Horan, Stephen
2001-01-01
The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-25
... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...
Secure Web-based Ground System User Interfaces over the Open Internet
NASA Technical Reports Server (NTRS)
Langston, James H.; Murray, Henry L.; Hunt, Gary R.
1998-01-01
A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.
Not Just a Prayer before a Test: Theodicy among Students
ERIC Educational Resources Information Center
Daugherty, Timothy K.; Han, Suejung
2016-01-01
The purpose of this study was to examine the potential social and academic impact of theodicy, perceived control of events by God. The sample included 428 college students from two public universities, consenting to complete internet-based protocols. Standardized measures included the Theodicy Scale (Daugherty et al., 2009), Work Related…
Baby Steps: Starting Out on the World Wide Web.
ERIC Educational Resources Information Center
Simpson, Carol; McElmeel, Sharron L.
1997-01-01
While the Internet is the physical medium used to transport data, the World Wide Web is the collection of protocols and standards used to access the information. This article provides a basic explanation of what the Web is and describes common browser commands. Discusses graphic Web browsers; universal resource locators (URLs); file, message,…
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
MDP: Reliable File Transfer for Space Missions
NASA Technical Reports Server (NTRS)
Rash, James; Criscuolo, Ed; Hogie, Keith; Parise, Ron; Hennessy, Joseph F. (Technical Monitor)
2002-01-01
This paper presents work being done at NASA/GSFC by the Operating Missions as Nodes on the Internet (OMNI) project to demonstrate the application of the Multicast Dissemination Protocol (MDP) to space missions to reliably transfer files. This work builds on previous work by the OMNI project to apply Internet communication technologies to space communication. The goal of this effort is to provide an inexpensive, reliable, standard, and interoperable mechanism for transferring files in the space communication environment. Limited bandwidth, noise, delay, intermittent connectivity, link asymmetry, and one-way links are all possible issues for space missions. Although these are link-layer issues, they can have a profound effect on the performance of transport and application level protocols. MDP, a UDP-based reliable file transfer protocol, was designed for multicast environments which have to address these same issues, and it has done so successfully. Developed by the Naval Research Lab in the mid 1990's, MDP is now in daily use by both the US Post Office and the DoD. This paper describes the use of MDP to provide automated end-to-end data flow for space missions. It examines the results of a parametric study of MDP in a simulated space link environment and discusses the results in terms of their implications for space missions. Lessons learned are addressed, which suggest minor enhancements to the MDP user interface to add specific features for space mission requirements, such as dynamic control of data rate, and a checkpoint/resume capability. These are features that are provided for in the protocol, but are not implemented in the sample MDP application that was provided. A brief look is also taken at the status of standardization. A version of MDP known as NORM (Neck Oriented Reliable Multicast) is in the process of becoming an IETF standard.
Controlador para un Reloj GPS de Referencia en el Protocolo NTP
NASA Astrophysics Data System (ADS)
Hauscarriaga, F.; Bareilles, F. A.
The synchronization between computers in a local network plays a very important role on enviroments similar to IAR. Calculations for exact time are needed before, during and after an observation. For this purpose the IAR's GNU/Linux Software Development Team implemented a driver inside NTP protocol (an internet standard for time synchronization of computers) for a GPS receiver acquired a few years ago by IAR, which did not have support in such protocol. Today our Institute has a stable and reliable time base synchronized to atomic clocks on board GPS Satellites according to computers's synchronization standard, offering precise time services to all scientific community and particularly to the University of La Plata. FULL TEXT IN SPANISH
ERIC Educational Resources Information Center
Perigo, Levi
2013-01-01
In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…
Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection
2003-06-01
Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA
An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication
NASA Technical Reports Server (NTRS)
Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.
2012-01-01
NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.
Web tools for large-scale 3D biological images and atlases
2012-01-01
Background Large-scale volumetric biomedical image data of three or more dimensions are a significant challenge for distributed browsing and visualisation. Many images now exceed 10GB which for most users is too large to handle in terms of computer RAM and network bandwidth. This is aggravated when users need to access tens or hundreds of such images from an archive. Here we solve the problem for 2D section views through archive data delivering compressed tiled images enabling users to browse through very-large volume data in the context of a standard web-browser. The system provides an interactive visualisation for grey-level and colour 3D images including multiple image layers and spatial-data overlay. Results The standard Internet Imaging Protocol (IIP) has been extended to enable arbitrary 2D sectioning of 3D data as well a multi-layered images and indexed overlays. The extended protocol is termed IIP3D and we have implemented a matching server to deliver the protocol and a series of Ajax/Javascript client codes that will run in an Internet browser. We have tested the server software on a low-cost linux-based server for image volumes up to 135GB and 64 simultaneous users. The section views are delivered with response times independent of scale and orientation. The exemplar client provided multi-layer image views with user-controlled colour-filtering and overlays. Conclusions Interactive browsing of arbitrary sections through large biomedical-image volumes is made possible by use of an extended internet protocol and efficient server-based image tiling. The tools open the possibility of enabling fast access to large image archives without the requirement of whole image download and client computers with very large memory configurations. The system was demonstrated using a range of medical and biomedical image data extending up to 135GB for a single image volume. PMID:22676296
Ship to Shore Data Communication and Prioritization
2011-12-01
First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final... Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband...
Digital Motion Imagery, Interoperability Challenges for Space Operations
NASA Technical Reports Server (NTRS)
Grubbs, Rodney
2012-01-01
With advances in available bandwidth from spacecraft and between terrestrial control centers, digital motion imagery and video is becoming more practical as a data gathering tool for science and engineering, as well as for sharing missions with the public. The digital motion imagery and video industry has done a good job of creating standards for compression, distribution, and physical interfaces. Compressed data streams can easily be transmitted or distributed over radio frequency, internet protocol, and other data networks. All of these standards, however, can make sharing video between spacecraft and terrestrial control centers a frustrating and complicated task when different standards and protocols are used by different agencies. This paper will explore the challenges presented by the abundance of motion imagery and video standards, interfaces and protocols with suggestions for common formats that could simplify interoperability between spacecraft and ground support systems. Real-world examples from the International Space Station will be examined. The paper will also discuss recent trends in the development of new video compression algorithms, as well likely expanded use of Delay (or Disruption) Tolerant Networking nodes.
48 CFR 3439.701 - Internet Protocol version 6.
Code of Federal Regulations, 2013 CFR
2013-10-01
... REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...
Browsing for the Best Internet Access Provider?
ERIC Educational Resources Information Center
Weil, Marty
1996-01-01
Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…
Internet Protocol Handbook. Volume 4. The Domain Name System (DNS) handbook
1989-08-01
Mockapetris [Page 1] 4-11 INTERNET PROTOCOL HA TDBOOK - Voue Four 1989 RFC 1034 Domain Concepts and Facilities November 1987 bandwidth consumed in distributing...Domain Names- Concepts and Facilities KFC 1034 RFC 1034 Domain Concepts and Facilities November 1’)87 - Queries contain a bit called recursion desired...during periodic sweeps to reclaim the memory consumed by old RRS. Mockapetris [Page 33] 4-43 INTERNET PROTOCOL HANDBOOK - Volume Four 1989 RFC 1034
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
48 CFR 3439.701 - Internet Protocol version 6.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...
48 CFR 3439.701 - Internet Protocol version 6.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...
1999-12-01
compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not
Protocol Support for a New Satellite-Based Airspace Communication Network
NASA Technical Reports Server (NTRS)
Shang, Yadong; Hadjitheodosiou, Michael; Baras, John
2004-01-01
We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.
NASA Technical Reports Server (NTRS)
Benbenek, Daniel B.; Walsh, William
2010-01-01
This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.
DDN (Defense Data Network) Protocol Handbook. Volume 2. DARPA Internet Protocols
1985-12-01
header padding is used to ensure that the internet header ends on a 32 bit boundary. The padding is zero . 3.2. Discussion The implementation of a... zeros . The first of these would be interpreted as the end-of-options option, and the remainder as internet header padding , Every internet module must...several octets in length. The internet header Padding field is used to ensure that the data begins on 32 bit word boundary. The padding is zero
On Ramps: Options and Issues in Accessing the Internet.
ERIC Educational Resources Information Center
Bocher, Bob
1995-01-01
Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…
48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).
Code of Federal Regulations, 2013 CFR
2013-10-01
... (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION... Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the following...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...
Using an internet questionnaire to characterize bat survey efforts in the United States and Canada
Theodore J. Weller; William J. Zielinski
2006-01-01
Standardized survey methods are important for obtaining reliable information on wildlife populations. As a precursor to creating a regional bat-survey (Chiroptera) protocol, we distributed a questionnaire via e-mail to biologists responsible for conducting bat surveys in the United States and Canada. We received 415 responses from 45 states and 7 Canadian provinces or...
Continued Development of Internet Protocols under the IBM OS/MVS Operating System
1985-01-25
developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP
48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).
Code of Federal Regulations, 2012 CFR
2012-10-01
... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...
48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).
Code of Federal Regulations, 2014 CFR
2014-10-01
... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...
An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.
ERIC Educational Resources Information Center
Chao, Han-Chieh
2001-01-01
Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…
Advances on Sensor Web for Internet of Things
NASA Astrophysics Data System (ADS)
Liang, S.; Bermudez, L. E.; Huang, C.; Jazayeri, M.; Khalafbeigi, T.
2013-12-01
'In much the same way that HTML and HTTP enabled WWW, the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), envisioned in 2001 [1] will allow sensor webs to become a reality.'. Due to the large number of sensor manufacturers and differing accompanying protocols, integrating diverse sensors into observation systems is not a simple task. A coherent infrastructure is needed to treat sensors in an interoperable, platform-independent and uniform way. SWE standardizes web service interfaces, sensor descriptions and data encodings as building blocks for a Sensor Web. SWE standards are now mature specifications (version 2.0) with approved OGC compliance test suites and tens of independent implementations. Many earth and space science organizations and government agencies are using the SWE standards to publish and share their sensors and observations. While SWE has been demonstrated very effective for scientific sensors, its complexity and the computational overhead may not be suitable for resource-constrained tiny sensors. In June 2012, a new OGC Standards Working Group (SWG) was formed called the Sensor Web Interface for Internet of Things (SWE-IoT) SWG. This SWG focuses on developing one or more OGC standards for resource-constrained sensors and actuators (e.g., Internet of Things devices) while leveraging the existing OGC SWE standards. In the near future, billions to trillions of small sensors and actuators will be embedded in real- world objects and connected to the Internet facilitating a concept called the Internet of Things (IoT). By populating our environment with real-world sensor-based devices, the IoT is opening the door to exciting possibilities for a variety of application domains, such as environmental monitoring, transportation and logistics, urban informatics, smart cities, as well as personal and social applications. The current SWE-IoT development aims on modeling the IoT components and defining a standard web service that makes the observations captured by IoT devices easily accessible and allows users to task the actuators on the IoT devices. The SWE IoT model links things with sensors and reuses the OGC Observation and Model (O&M) to link sensors with features of interest and observed properties Unlike most SWE standards, the SWE-IoT defines a RESTful web interface for users to perform CRUD (i.e., create, read, update, and delete) functions on resources, including Things, Sensors, Actuators, Observations, Tasks, etc. Inspired by the OASIS Open Data Protocol (OData), the SWE-IoT web service provides the multi-faceted query, which means that users can query from different entity collections and link from one entity to other related entities. This presentation will introduce the latest development of the OGC SWE-IoT standards. Potential applications and implications in Earth and Space science will also be discussed. [1] Mike Botts, Sensor Web Enablement White Paper, Open GIS Consortium, Inc. 2002
Internetworking in the military environment
NASA Astrophysics Data System (ADS)
Davies, B. H.; Bates, A. S.
1981-07-01
The increasing requirement for data communications in the military environment and the heterogeneous nature of the network technologies and protocols involved are highlighted. The design of a military internet architecture, influenced by the military requirements, especially that of survivability, is discussed. Comparison with the civilian PTT approach to internetworking shows that while there are economic advantages to using civilian international standards where possible, these standards do not satisfy the military requirements. In particular the strategies for routing in a heavily damaged network environment and addressing hosts that migrate from one network to another must form an integral part of the overall architectural design. This results in gateways whose routing tables have a finer degree of detail of the internet topology than is usually required but which do not contain connection oriented information. Finally, practical experience gained on the ARPA catenet system is described.
A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang
2007-06-01
Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in governmentmore » network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.« less
Cockayne, Nicole L; Christensen, Helen M; Griffiths, Kathleen M; Naismith, Sharon L; Hickie, Ian B; Thorndike, Frances P; Ritterband, Lee M; Glozier, Nick S
2015-02-05
Insomnia is a significant risk factor for depression onset, can result in more disabling depressive illness, and is a common residual symptom following treatment cessation that can increase the risk of relapse. Internet-based cognitive behavioural therapy for insomnia has demonstrated efficacy and acceptability to men who are less likely than women to seek help in standard care. We aim to evaluate whether internet delivered cognitive behavioural therapy for insomnia as an adjunct to a standard depression therapeutic plan can lead to improved mood outcomes. Male participants aged 50 years or more, meeting Diagnostic and Statistical Manual of Mental Disorders criteria for current Major Depressive Episode and/or Dysthymia and self-reported insomnia symptoms, will be screened to participate in a single-centre double-blind randomised controlled trial with two parallel groups involving adjunctive internet-delivered cognitive behavioural therapy for insomnia and an internet-based control program. The trial will consist of a nine-week insomnia intervention period with a six-month follow-up period. During the insomnia intervention period participants will have their depression management coordinated by a psychiatrist using standard guideline-based depression treatments. The study will be conducted in urban New South Wales, Australia, where 80 participants from primary and secondary care and direct from the local community will be recruited. The primary outcome is change in the severity of depressive symptoms from baseline to week 12. This study will provide evidence on whether a widely accessible, evidence-based, internet-delivered cognitive behavioural therapy for insomnia intervention can lead to greater improvements than standard treatment for depression alone, in a group who traditionally do not readily access psychotherapy. The study is designed to establish effect size, feasibility and processes associated with implementing e-health solutions alongside standard clinical care, to warrant undertaking a larger more definitive clinical trial. Australian and New Zealand Clinical Trials Registry ACTRN12612000985886 .
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldsmith, Steven Y.; Spires, Shannon V.
There are currently two proposed standards for agent communication languages, namely, KQML (Finin, Lobrou, and Mayfield 1994) and the FIPA ACL. Neither standard has yet achieved primacy, and neither has been evaluated extensively in an open environment such as the Internet. It seems prudent therefore to design a general-purpose agent communications facility for new agent architectures that is flexible yet provides an architecture that accepts many different specializations. In this paper we exhibit the salient features of an agent communications architecture based on distributed metaobjects. This architecture captures design commitments at a metaobject level, leaving the base-level design and implementationmore » up to the agent developer. The scope of the metamodel is broad enough to accommodate many different communication protocols, interaction protocols, and knowledge sharing regimes through extensions to the metaobject framework. We conclude that with a powerful distributed object substrate that supports metaobject communications, a general framework can be developed that will effectively enable different approaches to agent communications in the same agent system. We have implemented a KQML-based communications protocol and have several special-purpose interaction protocols under development.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-17
...The National Telecommunications and Information Administration (NTIA), on behalf of the U.S. Department of Commerce (Department), will hold a workshop on September 28, 2010, on the importance of the adoption and deployment of Internet Protocol version six (IPv6) addresses for industry, the U.S. Government, and the Internet economy.
Study of intelligent building system based on the internet of things
NASA Astrophysics Data System (ADS)
Wan, Liyong; Xu, Renbo
2017-03-01
In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.
Proposed DoD (Department of Defense) Internet Protocol Standard.
1982-07-06
parameters fall into two categories: service quality parameters and service options. Service quality parameters influence the transmission service provided...Corporation 6 July 1982 -7- TM-7172/481/OO o Service Quality Parameters - Precedence : attempts preferential treatment for high importance datagrams...select the transmission quality. IP passes the type of service (TOS) command set for service quality to the SNP where it is mapped into subnetwork
Entanglement percolation on a quantum internet with scale-free and clustering characters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu Liang; Zhu Shiqun
The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.
Entanglement percolation on a quantum internet with scale-free and clustering characters
NASA Astrophysics Data System (ADS)
Wu, Liang; Zhu, Shiqun
2011-11-01
The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.
UPM: unified policy-based network management
NASA Astrophysics Data System (ADS)
Law, Eddie; Saxena, Achint
2001-07-01
Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.
Experience with Delay-Tolerant Networking from Orbit
NASA Technical Reports Server (NTRS)
Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.
2010-01-01
We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol
48 CFR 3439.701 - Internet Protocol version 6.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
Chun, Seung-Man; Park, Jong-Tae
2017-01-01
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.
Chun, Seung-Man; Park, Jong-Tae
2017-01-12
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Internet Cruising with the Internet Hunt.
ERIC Educational Resources Information Center
Gates, Rick
1993-01-01
Describes the Internet Hunt, a game designed to challenge and inform librarians about information sources available on the Internet. The use of telnet, and FTP (File Transfer Protocol) are described, and the results of the first Internet Hunt are provided. (EA)
Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate; John, Ann
2017-01-01
Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums' (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518).
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 1 2013-10-01 2013-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 1 2014-10-01 2014-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 1 2012-10-01 2012-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 1 2011-10-01 2011-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 1 2010-10-01 2010-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Treatment Considerations in Internet and Video Game Addiction: A Qualitative Discussion.
Greenfield, David N
2018-04-01
Internet and video game addiction has been a steadily developing consequence of modern living. Behavioral and process addictions and particularly Internet and video game addiction require specialized treatment protocols and techniques. Recent advances in addiction medicine have improved our understanding of the neurobiology of substance and behavioral addictions. Novel research has expanded the ways we understand and apply well-established addiction treatments as well as newer therapies specific to Internet and video game addiction. This article reviews the etiology, psychology, and neurobiology of Internet and video game addiction and presents treatment strategies and protocols for addressing this growing problem. Copyright © 2017 Elsevier Inc. All rights reserved.
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
Achieving quality of service in IP networks
NASA Astrophysics Data System (ADS)
Hays, Tim
2001-07-01
The Internet Protocol (IP) has served global networks well, providing a standardized method to transmit data among many disparate systems. But IP is designed for simplicity, and only enables a `best effort' service that can be subject to delays and loss of data. For data networks, this is an acceptable trade-off. In the emerging world of convergence, driven by new applications such as video streaming and IP telephony, minimizing latency and packet loss as well as jitter can be critical. Simply increasing the size of the IP network `pipe' to meet those demands is not always sufficient. In this environment, vendors and standards bodies are endeavoring to create technologies and techniques to enable IP to improve the quality of service it can provide, while retaining the characteristics that has enabled it to become the dominant networking protocol.
A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang
2006-06-01
Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deploymentmore » begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.« less
Ylönen, Minna; Viljamaa, Jaakko; Isoaho, Hannu; Junttila, Kristiina; Leino-Kilpi, Helena; Suhonen, Riitta
2015-10-01
To describe the study protocol for a study of the effectiveness of an internet-based learning program on venous leg ulcer nursing care (eVLU) in home health care. The prevalence of venous leg ulcers is increasing as population age. The majority of these patients are treated in a municipal home healthcare setting. However, studies show nurses' lack of knowledge of ulcer nursing care. Quasi-experimental study with pre- and postmeasurements and non-equivalent intervention and comparison groups. During the study, nurses taking care of patients with a chronic leg ulcer in home health care in one Finnish municipality will use the eVLU. Nurses working in home health care in another Finnish municipality will not use it providing standard care. Nurses will complete three questionnaires during the study and they will also be observed three times at patients' homes. Nurses' perceived and theoretical knowledge is the primary outcome of the study. Funding for this study was received from the Finnish Foundation for Nursing Education in 2014. Data from this study will provide information about the effectiveness of an internet-based educational program. After completing the program nurses will be accustomed to using internet-based resources that can aid them in the nursing care of patients with a VLU. Nurses will also have better knowledge of VLU nursing care. This study is registered with the International Clinical Trials Registry, identifier NCT02224300. © 2015 John Wiley & Sons Ltd.
Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Best, Susan; Nichols, Kelvin; Bradford, Robert
2003-01-01
This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.
Law, Emily F.; Beals-Erickson, Sarah E.; Fisher, Emma; Lang, Emily A.; Palermo, Tonya M.
2017-01-01
Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache. PMID:29503787
Law, Emily F; Beals-Erickson, Sarah E; Fisher, Emma; Lang, Emily A; Palermo, Tonya M
2017-01-01
Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache.
Protocol Architecture Model Report
NASA Technical Reports Server (NTRS)
Dhas, Chris
2000-01-01
NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.
An Educators' Guide to Information Access across the Internet.
ERIC Educational Resources Information Center
Hazari, Sunil
1994-01-01
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...
Internet for Library Media Specialists.
ERIC Educational Resources Information Center
Simpson, Carol Mann
This guide introduces the library media specialist to the Internet, its history and features, and provides information on specific uses of the Internet in school libraries and specific areas. Section 1, "What is the Internet?" introduces the reader to the Internet; electronic mail; telnet; file transfer protocol (FTP); wide area…
Telemedicine using free voice over internet protocol (VoIP) technology.
Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H
2011-01-01
Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.
76 FR 18490 - Contributions to the Telecommunications Relay Service Fund
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-04
... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...
The Historian and Electronic Research: File Transfer Protocol (FTP).
ERIC Educational Resources Information Center
McCarthy, Michael J.
1993-01-01
Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-16
... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 4 2013-10-01 2013-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 4 2012-10-01 2012-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
... video programming and apparatus closed captioning requirements. This notice is consistent with the Order... Delivered Using Internet Protocol, and Apparatus Closed Caption Requirements. Form Number: N/A. Respondents... rules governing the closed captioning capabilities of certain apparatus on which consumers view video...
Internet Resources on Aging: Parts of the Internet.
ERIC Educational Resources Information Center
Post, Joyce A.
1996-01-01
Provides a brief history of the Internet and a listing of various resources on aging that can be obtained through the Internet. Components of the Internet discussed are electronic-mail applications (listservs, USENET Newsgroups, Bulletin Board Systems, Freenets, and Commercial Services); File Transfer Protocol; Telnet/Remote Login; Gophers; Wide…
Internet-Protocol-Based Satellite Bus Architecture Designed
NASA Technical Reports Server (NTRS)
Slywczak, Richard A.
2004-01-01
NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.
Space-Based Telemetry and Range Safety (STARS) Study
NASA Technical Reports Server (NTRS)
Hogie, Keith; Crisuolo, Ed; Parise, Ron
2004-01-01
This presentation will describe the design, development, and testing of a system to collect telemetry, format it into UDP/IP packets, and deliver it to a ground test range using standard IP technologies over a TDRSS link. This presentation will discuss the goal of the STARS IP Formatter along with the overall design. It will also present performance results of the current version of the IP formatter. Finally, it will discuss key issues for supporting constant rate telemetry data delivery when using standard components such as PCI/104 processors, the Linux operating system, Internet Protocols, and synchronous serial interfaces.
CoAP-Based Mobility Management for the Internet of Things
Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae
2015-01-01
Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
An Internet Primer for Community College Administrators.
ERIC Educational Resources Information Center
Brumbaugh, Kenneth E.; McRae, Mary S.
1995-01-01
Provides information designed to assist administrators in utilizing the advanced information technologies available on the Internet. Describes the uses of such elements of the Internet as "e-mail,""ftp (file transfer protocol),""gopher," and "telnet." Indicates that administrators can use the internet to…
Gaining Access to the Internet.
ERIC Educational Resources Information Center
Notess, Greg R.
1992-01-01
Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Experimental GMPLS-Based Provisioning for Future All-Optical DPRing-Based MAN
NASA Astrophysics Data System (ADS)
Mu�oz, Ra�l; V�ctor Mart�nez Rivera, Ricardo; Sorribes, Jordi; Junyent Giralt, Gabriel
2005-10-01
Given the abundance and strategic importance of ring fiber plants in metropolitan area networks (MANs), and the accelerating growth of Internet traffic, it is crucial to extend the existing Internet protocol (IP)-based generalized multiprotocol label switching (GMPLS) framework to provision dynamic wavelength division multiplexing (WDM) optical rings. Nevertheless, the emerging GMPLS-based lightpath provisioning does not cover the intricacies of optical rings. No GMPLS standard exists for optical add-drop multiplexer (OADM) rings, relying instead upon proprietary static solution. The objective of this paper is to propose and evaluate novel GMPLS-based lightpath signaling and wavelength reservation schemes specifically designed for dedicated protection ring (DPRing)-based MANs. Performance evaluation has been carried out in a GMPLS-based testbed named ADRENALINE.
High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications
NASA Technical Reports Server (NTRS)
Callahan, John; Montgomery, Todd; Whetten, Brian
1997-01-01
Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.
Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate
2017-01-01
Background Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. Methods We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Results Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. Conclusions There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums’ (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518). PMID:28813437
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs
NASA Astrophysics Data System (ADS)
Mudassir, Mumajjed Ul; Akram, Adeel
In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.
Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David
2003-09-01
As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, whichmore » determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept were developed, and results from this research were transferred to industry via standards in the Optical Internetworking Forum (OIF).« less
Why You Should Establish a Connection to the Internet.
ERIC Educational Resources Information Center
Hill, Judy A.; Misic, Mark M.
1996-01-01
Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…
On the Effective Evaluation of TCP
NASA Technical Reports Server (NTRS)
Allman, Mark; Falk, Aaron
2000-01-01
Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testing methods exist to evaluate TCP performance, however all have pitfalls an that need to be understood prior to obtaining useful results. Simulating TCP is difficult because of the wide range of variables, environments, and implementations available. Testing TCP modifications in the global Internet may not be the answer either: testing new protocols on real networks endangers other people's traffic and, if not done correctly, may also yield inaccurate or misleading results. In order for TCP research to be independently evaluated in the Internet research community there is a set of questions that researchers should try to answer. This paper attempts to list some of those questions and make recommendations as to how TCP testing can be structured to be provide useful answers.
2010-11-26
accomplishes these actions by developing, recommending, and briefing the scheme of fires, including both lethal fires and nonlethal actions (electronic...Install and operate the corps information technology help desk. Provide voice, video teleconference, e-mail—Non-Secure Internet Protocol Router...Network (NIPRNET), SECRET Internet Protocol Router Network (SIPRNET), and other communication networks—assistance, and other help desk functions
NASA Astrophysics Data System (ADS)
Foswell, Stuart D.; McLaren, David; Paramanatham, Daran; Taylor, Chris; Stanton, Dai; Farrell, Stephen
2012-08-01
This paper describes the outcome of analysis and simulation of how to deploy CFDP and DTN protocol engines onboard a spacecraft, so as to support the Space Internet, and the resulting spacecraft resource utilisation, under an ESA TRP contract [1].
47 CFR 12.3 - 911 and E911 analyses and reports.
Code of Federal Regulations, 2013 CFR
2013-10-01
... wireless 911 rules set forth in § 20.18 of this chapter; and interconnected Voice over Internet Protocol... Public Safety and Homeland Security Bureau (PSHSB) has the delegated authority to implement and activate... generation Internet Protocol-based E911 platform. (b) These reports are due 120 days from the date that the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-11
... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...
"SWING": A European project for a new application of an ionospheric network
NASA Astrophysics Data System (ADS)
Zolesi, B.; Bianchi, C.; Meloni, A.; Baskaradas, J. A.; Belehaki, A.; Altadill, D.; Dalle Mese, E.
2016-05-01
The SWING (Short Wave critical Infrastructure Network based on a new Generation high survival radio communication system) is a European project aimed at studying a high survival high-frequency (HF) radio network to link European Critical Infrastructures (ECIs). This system is thought to replace broadband internet communication, maintaining the minimum flux of essential information for the ECIs management and control, in case of wide-scale threats, including terrorist attacks, able to put out of order internet links over the Mediterranean region. SWING is designed to evaluate the threat and increase the security awareness, as well as the level of protection, of analogous and/or interdependent ECIs. In order to meet these goals, SWING was finalized to recognize how and when the internet communication fails and to develop the standard software and hardware tools necessary for implementing communication protocols suited for a reliable and interoperable short-wave (SW) or high-frequency (HF) radio network backup. The internet broadband description and internet failure recognition were taken into consideration in the project but are not treated in this paper. It has been assessed that in case of complete failure of the internet broadband communication fundamental information for the management and control of ECIs over the Mediterranean region can be maintained with a HF network, even in case of moderate ionospheric perturbations.
Very High-Speed Report File System
1992-12-15
1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Louie, Dexter L; Earp, Brandon E; Blazar, Philip E
2012-07-01
The Internet is available to researchers as a tool for studying long-term outcomes, but no recent research exists on how to best use it. The authors hypothesize that using the Internet can be at least 75% effective in locating patients lost to follow-up. With Institutional Review Board approval, the authors searched for 66 patients lost to follow-up after a period of 10 years or more with no contact. They tested an Internet searching protocol developed in 2004 and developed an alternate protocol. In all, 74% (49/66) of patients were located. Copyright 2012, SLACK Incorporated.
Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources
NASA Astrophysics Data System (ADS)
Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.
2018-04-01
The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.
ERIC Educational Resources Information Center
Branzburg, Jeffrey
2005-01-01
Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
NASA Astrophysics Data System (ADS)
Balitanas, Maricel; Kim, Tai-Hoon
This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.
ERIC Educational Resources Information Center
Wahid, Wazira Ali Abdul; Ahmed, Eqbal Sulaiman; Wahid, Muntaha Ali Abdul
2015-01-01
This issue expresses a research study based on the online interactions of English teaching specially conversation through utilizing VOIP (Voice over Internet Protocol) and cosmopolitan online theme. Data has been achieved by interviews. Simplifiers indicate how oral tasks require to be planned upon to facilitate engagement models propitious to…
TeleHealth networks: Instant messaging and point-to-point communication over the internet
NASA Astrophysics Data System (ADS)
Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios
2006-12-01
This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.
A Guide for Using the Internet.
ERIC Educational Resources Information Center
Brown, Herb
This manual provides an instructional overview of Internet resources with student exercises. The work consists of nine chapters: (1) Introduction to the Internet; (2) How to Access the Internet; (3) Electronic Mail; (4) Gopher; (5) File Transfer Protocol-FTP; (6) Newsgroups & Newsreaders; (7) Telnet & TN3270; (8) World Wide Web; and (9)…
Fundamental rate-loss trade-off for the quantum internet
NASA Astrophysics Data System (ADS)
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-11-01
The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.
Fundamental rate-loss trade-off for the quantum internet.
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-11-25
The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.
System Software Framework for System of Systems Avionics
NASA Technical Reports Server (NTRS)
Ferguson, Roscoe C.; Peterson, Benjamin L; Thompson, Hiram C.
2005-01-01
Project Constellation implements NASA's vision for space exploration to expand human presence in our solar system. The engineering focus of this project is developing a system of systems architecture. This architecture allows for the incremental development of the overall program. Systems can be built and connected in a "Lego style" manner to generate configurations supporting various mission objectives. The development of the avionics or control systems of such a massive project will result in concurrent engineering. Also, each system will have software and the need to communicate with other (possibly heterogeneous) systems. Fortunately, this design problem has already been solved during the creation and evolution of systems such as the Internet and the Department of Defense's successful effort to standardize distributed simulation (now IEEE 1516). The solution relies on the use of a standard layered software framework and a communication protocol. A standard framework and communication protocol is suggested for the development and maintenance of Project Constellation systems. The ARINC 653 standard is a great start for such a common software framework. This paper proposes a common system software framework that uses the Real Time Publish/Subscribe protocol for framework-to-framework communication to extend ARINC 653. It is highly recommended that such a framework be established before development. This is important for the success of concurrent engineering. The framework provides an infrastructure for general system services and is designed for flexibility to support a spiral development effort.
Use of the Delay-Tolerant Networking Bundle Protocol from Space
NASA Technical Reports Server (NTRS)
Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex
2009-01-01
The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.
Need low-cost networking? Consider DeviceNet
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, W.H.
1996-11-01
The drive to reduce production costs and optimize system performance in manufacturing facilities causes many end users to invest in network solutions. Because of distinct differences between the way tasks are performed and the way data are handled for various applications, it is clear than more than one network will be needed in most facilities. What is not clear is which network is most appropriate for a given application. The information layer is the link between automation and information environments via management information systems (MISs) and manufacturing execution systems (MESs) and manufacturing execution systems (MESs). Here the market has chosenmore » a de facto standard in Ethernet, primarily transmission control protocol/internet protocol (TCP/IP) and secondarily manufacturing messaging system (MMS). There is no single standard at the device layer. However, the DeviceNet communication standard has made strides to reach this goal. This protocol eliminates expensive hardwiring and provides improved communication between devices and important device-level diagnostics not easily accessible or available through hardwired I/O interfaces. DeviceNet is a low-cost communications link connecting industrial devices to a network. Many original equipment manufacturers and end users have chosen the DeviceNet platform for several reasons, but most frequently because of four key features: interchangeability; low cost; advanced diagnostics; insert devices under power.« less
Internet Architecture: Lessons Learned and Looking Forward
2006-12-01
Internet Architecture: Lessons Learned and Looking Forward Geoffrey G. Xie Department of Computer Science Naval Postgraduate School April 2006... Internet architecture. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...readers are referred there for more information about a specific protocol or concept. 2. Origin of Internet Architecture The Internet is easily
Bipolar disorder affects behavior and social skills on the Internet.
Martini, Thaís; Czepielewski, Letícia Sanguinetti; Fijtman, Adam; Sodré, Leonardo; Wollenhaupt-Aguiar, Bianca; Pereira, Caroline Silveira; Vianna-Sulzbach, Mireia; Goi, Pedro D; Rosa, Adriane Ribeiro; Kapczinski, Flavio; Kunz, Maurício; Kauer-Sant'anna, Marcia
2013-01-01
Bipolar disorder (BD) is a significant cause of functional, cognitive, and social impairment. However, classic studies of functioning and social skills have not investigated how BD may impact behavior on the Internet. Given that the digital age has been changing the way people communicate, this study aims to investigate the pattern of Internet use in patients with BD. This cross-sectional study assessed 30 patients with BD I or II and 30 matched controls. Patients were not in an acute mood episode, according to DSM-IV. A standard protocol examined sociodemographic variables and social behavior on the Internet, assessed by Facebook number of friends (FBN) and lifetime estimated number of offline contacts (social network number, SNN). SNN (p<0.001) and FBN (p = 0.036) of patients with BD were significantly lower than those of controls. Also, variables related with Internet use were significantly lower in patients, e.g., close contacts on Facebook (p = 0.021), Internet experience (p = 0.020), and knowledge of terms associated with social networking sites (p = 0.042). Also, patients showed lower rates of the expected pattern of Internet use (based on their age generation), including a poorer knowledge of SNS (p = 0.018) and a lower frequency of Internet use (p = 0.010). This study suggests that patients with BD show smaller social networks both in real-world settings and on the Internet. Also, patients tend to use the Internet and social networking sites less frequently and show a poorer knowledge of Internet and social media than healthy controls, below the expected for their generation. These significant differences between patients and controls suggest that the effects of BD on social relationships and functioning extend to electronic media.
Bipolar Disorder Affects Behavior and Social Skills on the Internet
Martini, Thaís; Czepielewski, Letícia Sanguinetti; Fijtman, Adam; Sodré, Leonardo; Wollenhaupt-Aguiar, Bianca; Pereira, Caroline Silveira; Vianna-Sulzbach, Mireia; Goi, Pedro D.; Rosa, Adriane Ribeiro; Kapczinski, Flavio; Kunz, Maurício; Kauer-Sant'Anna, Marcia
2013-01-01
Background Bipolar disorder (BD) is a significant cause of functional, cognitive, and social impairment. However, classic studies of functioning and social skills have not investigated how BD may impact behavior on the Internet. Given that the digital age has been changing the way people communicate, this study aims to investigate the pattern of Internet use in patients with BD. Methods This cross-sectional study assessed 30 patients with BD I or II and 30 matched controls. Patients were not in an acute mood episode, according to DSM-IV. A standard protocol examined sociodemographic variables and social behavior on the Internet, assessed by Facebook number of friends (FBN) and lifetime estimated number of offline contacts (social network number, SNN). Results SNN (p<0.001) and FBN (p = 0.036) of patients with BD were significantly lower than those of controls. Also, variables related with Internet use were significantly lower in patients, e.g., close contacts on Facebook (p = 0.021), Internet experience (p = 0.020), and knowledge of terms associated with social networking sites (p = 0.042). Also, patients showed lower rates of the expected pattern of Internet use (based on their age generation), including a poorer knowledge of SNS (p = 0.018) and a lower frequency of Internet use (p = 0.010). Discussion This study suggests that patients with BD show smaller social networks both in real-world settings and on the Internet. Also, patients tend to use the Internet and social networking sites less frequently and show a poorer knowledge of Internet and social media than healthy controls, below the expected for their generation. These significant differences between patients and controls suggest that the effects of BD on social relationships and functioning extend to electronic media. PMID:24244541
Deployment of Directory Service for IEEE N Bus Test System Information
NASA Astrophysics Data System (ADS)
Barman, Amal; Sil, Jaya
2008-10-01
Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.
ERIC Educational Resources Information Center
Chen, Charlie C.; Vannoy, Sandra
2013-01-01
Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…
Bandwidth Management in Resource Constrained Networks
2012-03-01
Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching
Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.
The Internet for Educators: A User's Guide.
ERIC Educational Resources Information Center
Monahan, Brian D.; Dharm, Matthew
1995-01-01
Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)
Web-based monitoring and management system for integrated enterprise-wide imaging networks
NASA Astrophysics Data System (ADS)
Ma, Keith; Slik, David; Lam, Alvin; Ng, Won
2003-05-01
Mass proliferation of IP networks and the maturity of standards has enabled the creation of sophisticated image distribution networks that operate over Intranets, Extranets, Communities of Interest (CoI) and even the public Internet. Unified monitoring, provisioning and management of such systems at the application and protocol levels represent a challenge. This paper presents a web based monitoring and management tool that employs established telecom standards for the creation of an open system that enables proactive management, provisioning and monitoring of image management systems at the enterprise level and across multi-site geographically distributed deployments. Utilizing established standards including ITU-T M.3100, and web technologies such as XML/XSLT, JSP/JSTL, and J2SE, the system allows for seamless device and protocol adaptation between multiple disparate devices. The goal has been to develop a unified interface that provides network topology views, multi-level customizable alerts, real-time fault detection as well as real-time and historical reporting of all monitored resources, including network connectivity, system load, DICOM transactions and storage capacities.
2003-04-01
usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M
ERIC Educational Resources Information Center
1996
This 66-minute videotape is part of an ongoing Internet education series, exploring the fascinating resources of the Internet. It is a step-by-step guide demonstrating effective techniques for using the World Wide Web, e-mail, file transfer protocol and other technologies. The program examines the Internet phenomenon from the educator's point of…
Monitoring intervention fidelity of a lifestyle behavioral intervention delivered through telehealth
Sineath, Ashley; Lambert, Lauren; Verga, Catherine; Wagstaff, Miranda
2017-01-01
Background Technology-based lifestyle behavioral interventions (i.e., telehealth, mHealth, eHealth, and/or digital health) are becoming an alternative standard of care and possess several advantages over traditional clinical settings such as convenience, cost, and the ability to tailor plans and feedback to a participant’s individual needs. These technology-based interventions also present unique challenges to intervention fidelity due to extra elements involved in executing the intervention. Intervention fidelity monitoring is essential to ensure internal and external validity, yet the development and utilization of fidelity protocols is under-reported in the literature. The purpose of this paper is to describe the intervention fidelity protocol for the 24-START study, a behavior change intervention delivered through telephone and internet. This paper also discusses the results of a pilot audit conducted to determine the feasibility of monitoring adherence to the fidelity protocol. Methods The 24-START fidelity protocol was developed in accordance with the five fidelity areas outlined by the NIH Behavior Change Consortium (NIH BCC) including: design of study, provider training, delivery of treatment, receipt of treatment, and enactment of treatment. The fidelity strategies provided by the NIH BCC in each area were tailored to fit the specific design of the 24-START study. Twenty-six total fidelity strategies were developed in accordance with the five areas and a corresponding fidelity monitoring plan was created. Because these strategies are only beneficial if implemented, the fidelity monitoring plan was developed to ensure the fidelity strategies are consistently implemented over the course of the intervention. Results A pilot audit of nine participant files was conducted to test the feasibility of the fidelity protocol developed. Out of the nine participant files reviewed, 89% of scheduled phone calls between a telehealth coach and participant were successfully completed. Of the completed calls, telehealth coaches delivered the intervention as intended 85.3% of the time, and 74% of planned secondary contacts made through the internet were delivered successfully. Additionally, between treatment group dosing was found to be equal. Several weak areas in the fidelity protocol were identified for improvement. The results were satisfactory and the audit was deemed feasible for ongoing use. Conclusions The NIH BCC provides a valuable framework for telehealth interventions to develop fidelity protocols ultimately contributing to improved internal and external validity, better translation of results, increased transparency, and increased opportunities for replication within the field. The 24-START pilot audit found the fidelity protocol efficacious and feasible while also identifying areas of weakness in need of revision. The refined protocol will continue to be utilized throughout the data collection phase. Future telehealth interventions should develop and disclose fidelity protocols to improve the overall quality and standard of telehealth interventions. PMID:28894745
Sineath, Ashley; Lambert, Lauren; Verga, Catherine; Wagstaff, Miranda; Wingo, Brooks C
2017-01-01
Technology-based lifestyle behavioral interventions (i.e., telehealth, mHealth, eHealth, and/or digital health) are becoming an alternative standard of care and possess several advantages over traditional clinical settings such as convenience, cost, and the ability to tailor plans and feedback to a participant's individual needs. These technology-based interventions also present unique challenges to intervention fidelity due to extra elements involved in executing the intervention. Intervention fidelity monitoring is essential to ensure internal and external validity, yet the development and utilization of fidelity protocols is under-reported in the literature. The purpose of this paper is to describe the intervention fidelity protocol for the 24-START study, a behavior change intervention delivered through telephone and internet. This paper also discusses the results of a pilot audit conducted to determine the feasibility of monitoring adherence to the fidelity protocol. The 24-START fidelity protocol was developed in accordance with the five fidelity areas outlined by the NIH Behavior Change Consortium (NIH BCC) including: design of study, provider training, delivery of treatment, receipt of treatment, and enactment of treatment. The fidelity strategies provided by the NIH BCC in each area were tailored to fit the specific design of the 24-START study. Twenty-six total fidelity strategies were developed in accordance with the five areas and a corresponding fidelity monitoring plan was created. Because these strategies are only beneficial if implemented, the fidelity monitoring plan was developed to ensure the fidelity strategies are consistently implemented over the course of the intervention. A pilot audit of nine participant files was conducted to test the feasibility of the fidelity protocol developed. Out of the nine participant files reviewed, 89% of scheduled phone calls between a telehealth coach and participant were successfully completed. Of the completed calls, telehealth coaches delivered the intervention as intended 85.3% of the time, and 74% of planned secondary contacts made through the internet were delivered successfully. Additionally, between treatment group dosing was found to be equal. Several weak areas in the fidelity protocol were identified for improvement. The results were satisfactory and the audit was deemed feasible for ongoing use. The NIH BCC provides a valuable framework for telehealth interventions to develop fidelity protocols ultimately contributing to improved internal and external validity, better translation of results, increased transparency, and increased opportunities for replication within the field. The 24-START pilot audit found the fidelity protocol efficacious and feasible while also identifying areas of weakness in need of revision. The refined protocol will continue to be utilized throughout the data collection phase. Future telehealth interventions should develop and disclose fidelity protocols to improve the overall quality and standard of telehealth interventions.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
A Beginner's Guide to the Internet.
ERIC Educational Resources Information Center
McAdams, Charles A.; Nelson, Mark A.
1995-01-01
Maintains that the Internet offers services and opportunities for music teachers and students. Provides an overview of topics such as electronic mail, File Transfer Protocol (FTP), Gopher, and the World Wide Web (WWW). Includes two lists of music resources available on the Internet. (CFR)
ERIC Educational Resources Information Center
Beaton, Susan J.; Forster, Peter M.
2013-01-01
A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…
Aggregating quantum repeaters for the quantum internet
NASA Astrophysics Data System (ADS)
Azuma, Koji; Kato, Go
2017-09-01
The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.
González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina
2015-10-31
Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.
Zwerenz, Rüdiger; Gerzymisch, Katharina; Edinger, Jens; Holme, Martin; Knickenberg, Rudolf J; Spörl-Dönch, Sieglinde; Kiwus, Ulrich; Beutel, Manfred E
2013-01-25
Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202).
2013-01-01
Background Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Methods Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. Discussion We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. Trial registration International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202) PMID:23351836
ERIC Educational Resources Information Center
Dealy, Jacqueline
1994-01-01
Offers instructions and resources for Internet novices wanting to access Internet services. Instructions are offered for connecting to 13 education listservs, 9 electronic journals and newsletters, 3 education databases, 7 Telnet gopher sites, Veronica and Archie search tools, and File Transfer Protocol (FTP). (Contains 16 references.) (SLW)
Internet-based videoconferencing and data collaboration for the imaging community.
Poon, David P; Langkals, John W; Giesel, Frederik L; Knopp, Michael V; von Tengg-Kobligk, Hendrik
2011-01-01
Internet protocol-based digital data collaboration with videoconferencing is not yet well utilized in the imaging community. Videoconferencing, combined with proven low-cost solutions, can provide reliable functionality and speed, which will improve rapid, time-saving, and cost-effective communications, within large multifacility institutions or globally with the unlimited reach of the Internet. The aim of this project was to demonstrate the implementation of a low-cost hardware and software setup that facilitates global data collaboration using WebEx and GoToMeeting Internet protocol-based videoconferencing software. Both products' features were tested and evaluated for feasibility across 2 different Internet networks, including a video quality and recording assessment. Cross-compatibility with an Apple OS is also noted in the evaluations. Departmental experiences with WebEx pertaining to clinical trials are also described. Real-time remote presentation of dynamic data was generally consistent across platforms. A reliable and inexpensive hardware and software setup for complete Internet-based data collaboration/videoconferencing can be achieved.
The future of 3D and video coding in mobile and the internet
NASA Astrophysics Data System (ADS)
Bivolarski, Lazar
2013-09-01
The current Internet success has already changed our social and economic world and is still continuing to revolutionize the information exchange. The exponential increase of amount and types of data that is currently exchanged on the Internet represents significant challenge for the design of future architectures and solutions. This paper reviews the current status and trends in the design of solutions and research activities in the future Internet from point of view of managing the growth of bandwidth requirements and complexity of the multimedia that is being created and shared. Outlines the challenges that are present before the video coding and approaches to the design of standardized media formats and protocols while considering the expected convergence of multimedia formats and exchange interfaces. The rapid growth of connected mobile devices adds to the current and the future challenges in combination with the expected, in near future, arrival of multitude of connected devices. The new Internet technologies connecting the Internet of Things with wireless visual sensor networks and 3D virtual worlds requires conceptually new approaches of media content handling from acquisition to presentation in the 3D Media Internet. Accounting for the entire transmission system properties and enabling adaptation in real-time to context and content throughout the media proceeding path will be paramount in enabling the new media architectures as well as the new applications and services. The common video coding formats will need to be conceptually redesigned to allow for the implementation of the necessary 3D Media Internet features.
Fundamental rate-loss trade-off for the quantum internet
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-01-01
The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172
WebTag: Web browsing into sensor tags over NFC.
Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio
2012-01-01
Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.
WebTag: Web Browsing into Sensor Tags over NFC
Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Álvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio
2012-01-01
Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm. PMID:23012511
Wilkins, Sara Anne; Shannon, Chevis N; Brown, Steven T; Vance, E Haley; Ferguson, Drew; Gran, Kimberly; Crowther, Marshall; Wellons, John C; Johnston, James M
2014-01-01
Recent legislation and media coverage have heightened awareness of concussion in youth sports. Previous work by the authors' group defined significant variation of care in management of children with concussion. To address this variation, a multidisciplinary concussion program was established based on a uniform management protocol, with emphasis on community outreach via traditional media sources and the Internet. This retrospective study evaluates the impact of standardization of concussion care and resource utilization before and after standardization in a large regional pediatric hospital center. This retrospective study included all patients younger than 18 years of age evaluated for sports-related concussion between January 1, 2007, and December 31, 2011. Emergency department, sports medicine, and neurosurgery records were reviewed. Data collected included demographics, injury details, clinical course, Sports Concussion Assessment Tool-2 (SCAT2) scores, imaging, discharge instructions, and referral for specialty care. The cohort was analyzed comparing patients evaluated before and after standardization of care. Five hundred eighty-nine patients were identified, including 270 before standardization (2007-2011) and 319 after standardization (2011-2012). Statistically significant differences (p < 0.0001) were observed between the 2 groups for multiple variables: there were more girls, more first-time concussions, fewer initial presentations to the emergency department, more consistent administration of the SCAT2, and more consistent supervision of return to play and return to think after adoption of the protocol. A combination of increased public awareness and legislation has led to a 5-fold increase in the number of youth athletes presenting for concussion evaluation at the authors' center. Establishment of a multidisciplinary clinic with a standardized protocol resulted in significantly decreased institutional resource utilization and more consistent concussion care for this growing patient population.
Interactive browsing of 3D environment over the Internet
NASA Astrophysics Data System (ADS)
Zhang, Cha; Li, Jin
2000-12-01
In this paper, we describe a system for wandering in a realistic environment over the Internet. The environment is captured by the concentric mosaic, compressed via the reference block coder (RBC), and accessed and delivered over the Internet through the virtual media (Vmedia) access protocol. Capturing the environment through the concentric mosaic is easy. We mount a camera at the end of a level beam, and shoot images as the beam rotates. The huge dataset of the concentric mosaic is then compressed through the RBC, which is specifically designed for both high compression efficiency and just-in-time (JIT) rendering. Through the JIT rendering function, only a portion of the RBC bitstream is accessed, decoded and rendered for each virtual view. A multimedia communication protocol -- the Vmedia protocol, is then proposed to deliver the compressed concentric mosaic data over the Internet. Only the bitstream segments corresponding to the current view are streamed over the Internet. Moreover, the delivered bitstream segments are managed by a local Vmedia cache so that frequently used bitstream segments need not be streamed over the Internet repeatedly, and the Vmedia is able to handle a RBC bitstream larger than its memory capacity. A Vmedia concentric mosaic interactive browser is developed where the user can freely wander in a realistic environment, e.g., rotate around, walk forward/backward and sidestep, even under a tight bandwidth of 33.6 kbps.
The Effects of Pushing the Digital Divide to the Fighting Hole
2006-02-03
information technologies (IT), and new ways of horizontally fusing information across the battlespace...The opportunity to exploit this new “digital...brought technology , such as the Internet Protocol (IP), to the forefront. It is incumbent upon the leaders of the communications community to ensure...in a recent interview with SIGNAL magazine: In terms of potential, I see the fundamental technologies associated with Internet Protocol (IP
Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows
2013-09-01
bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing
Augmenting Instruction in Business Communication Courses with the Internet.
ERIC Educational Resources Information Center
Cohen, Lance
1994-01-01
Outlines ways in which instructors of business communication can use the Internet more effectively while teaching. Argues that by augmenting business communication courses with e-mail and Internet protocols, instructors can reach larger segments of their classes, stimulate discussions, create simulations, and strengthen their relationships with…
Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.
Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli
2018-01-23
So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand.
Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic
Kerkhove, Dwight; Tian, Le; Munteanu, Adrian; De Poorter, Eli
2018-01-01
So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand. PMID:29360798
Research on an IP disaster recovery storage system
NASA Astrophysics Data System (ADS)
Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng
2008-12-01
According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.
Plugfest 2009: Global Interoperability in Telerobotics and Telemedicine
King, H. Hawkeye; Hannaford, Blake; Kwok, Ka-Wai; Yang, Guang-Zhong; Griffiths, Paul; Okamura, Allison; Farkhatdinov, Ildar; Ryu, Jee-Hwan; Sankaranarayanan, Ganesh; Arikatla, Venkata; Tadano, Kotaro; Kawashima, Kenji; Peer, Angelika; Schauß, Thomas; Buss, Martin; Miller, Levi; Glozman, Daniel; Rosen, Jacob; Low, Thomas
2014-01-01
Despite the great diversity of teleoperator designs and applications, their underlying control systems have many similarities. These similarities can be exploited to enable inter-operability between heterogeneous systems. We have developed a network data specification, the Interoperable Telerobotics Protocol, that can be used for Internet based control of a wide range of teleoperators. In this work we test interoperable telerobotics on the global Internet, focusing on the telesurgery application domain. Fourteen globally dispersed telerobotic master and slave systems were connected in thirty trials in one twenty four hour period. Users performed common manipulation tasks to demonstrate effective master-slave operation. With twenty eight (93%) successful, unique connections the results show a high potential for standardizing telerobotic operation. Furthermore, new paradigms for telesurgical operation and training are presented, including a networked surgery trainer and upper-limb exoskeleton control of micro-manipulators. PMID:24748993
47 CFR 54.503 - Other supported special services.
Code of Federal Regulations, 2010 CFR
2010-10-01
... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...
NASA Technical Reports Server (NTRS)
Dhas, Chris
2000-01-01
NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.
Network Quality of Service Monitoring for IP Telephony.
ERIC Educational Resources Information Center
Ghita, B. V.; Furnell, S. M.; Lines, B. M.; Le-Foll, D.; Ifeachor, E. C.
2001-01-01
Discusses the development of real-time applications on the Internet for telecommunications and presents a non-intrusive way of determining network performance parameters for voice packet flows within a voice over IP (Internet Protocol), or Internet telephony call. Considers measurement of quality of service and describes results of a preliminary…
GINSU: Guaranteed Internet Stack Utilization
2005-11-01
Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC
How I Found Out about the Internet.
ERIC Educational Resources Information Center
Pawloski, Bob
1994-01-01
A Nebraska consultant/former teacher explains his role in developing Internet accounts for teachers while working on a wetlands distance-learning project and an arts-education consortium. He explains ARTnet and other Internet services, including Telnet, FTP (file transfer protocol), the Gopher retrieval system, NetNews, and Listservs. Sidebars…
A Scholar's Journey: Using the Internet for Adult and Distance Education Research.
ERIC Educational Resources Information Center
Ellsworth, Jill H.
1993-01-01
Discusses use of the Internet for research on adult and distance education. Highlights include a description of the Internet; scholarly discussion lists; Telnet; FTP (File Transfer Protocol); scholarship and research, including access to university library catalogs and electronic journals; and online information about networks, including user…
Architectural Methodology Report
NASA Technical Reports Server (NTRS)
Dhas, Chris
2000-01-01
The establishment of conventions between two communicating entities in the end systems is essential for communications. Examples of the kind of decisions that need to be made in establishing a protocol convention include the nature of the data representation, the for-mat and the speed of the date representation over the communications path, and the sequence of control messages (if any) which are sent. One of the main functions of a protocol is to establish a standard path between the communicating entities. This is necessary to create a virtual communications medium with certain desirable characteristics. In essence, it is the function of the protocol to transform the characteristics of the physical communications environment into a more useful virtual communications model. The final function of a protocol is to establish standard data elements for communications over the path; that is, the protocol serves to create a virtual data element for exchange. Other systems may be constructed in which the transferred element is a program or a job. Finally, there are special purpose applications in which the element to be transferred may be a complex structure such as all or part of a graphic display. NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to describe the methodologies used in developing a protocol architecture for an in-space Internet node. The node would support NASA:s four mission areas: Earth Science; Space Science; Human Exploration and Development of Space (HEDS); Aerospace Technology. This report presents the methodology for developing the protocol architecture. The methodology addresses the architecture for a computer communications environment. It does not address an analog voice architecture.
NASA Technical Reports Server (NTRS)
Hooke, A. J.
2000-01-01
Architectural design of the interplanetary internet is now underway and prototype flight testing of some of the candidate protocols is anticipated within a year. This talk will describe the current status of the project.
NASA Astrophysics Data System (ADS)
Hortos, William S.
2003-07-01
Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.
2006-12-01
Robert N. Beck, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY...THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT...Warfighter Information Network – Tactical 1 I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT APPLIED PROJECT PLAN A. TENTATIVE PROJECT TITLE
ERIC Educational Resources Information Center
Packer, Jaclyn; Reuschel, William
2018-01-01
Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…
Cloud Computing Security Issue: Survey
NASA Astrophysics Data System (ADS)
Kamal, Shailza; Kaur, Rajpreet
2011-12-01
Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.
Williams, Alishia D; Blackwell, Simon E; Holmes, Emily A; Andrews, Gavin
2013-10-29
The current randomised controlled trial will evaluate the efficacy of an internet-delivered positive imagery cognitive bias modification (CBM) intervention for depression when compared with an active control condition and help establish the additive benefit of positive imagery CBM when delivered in combination with internet cognitive behavioural therapy for depression. Patients meeting diagnostic criteria for a current major depressive episode will be recruited through the research arm of a not-for-profit clinical and research unit in Australia. The minimum sample size for each group (α set at 0.05, power at 0.80) was identified as 29, but at least 10% more will be recruited to hedge against expected attrition. We will measure the impact of CBM on primary measures of depressive symptoms (Beck Depression Inventory-second edition (BDI-II), Patient Health Questionnaire (PHQ9)) and interpretive bias (ambiguous scenarios test-depression), and on a secondary measure of psychological distress (Kessler-10 (K10)) following the 1-week CBM intervention. Secondary outcome measures of psychological distress (K10), as well as disability (WHO disability assessment schedule-II), repetitive negative thinking (repetitive thinking questionnaire), and anxiety (state trait anxiety inventory-trait version) will be evaluated following completion of the 11-week combined intervention, in addition to the BDI-II and PHQ9. Intent-to-treat marginal and mixed effect models using restricted maximum likelihood estimation will be used to evaluate the primary hypotheses. Clinically significant change will be defined as high-end state functioning (a BDI-II score <14) combined with a total score reduction greater than the reliable change index score. Maintenance of gains will be assessed at 3-month follow-up. The current trial protocol has been approved by the Human Research Ethics Committee of St Vincent's Hospital and the University of New South Wales, Sydney. Australian New Zealand Clinical Trials Registry: ACTRN12613000139774 and Clinicaltrials.gov: NCT01787513. This trial protocol is written in compliance with the Standard Protocol Items: recommendations for Interventional Trials (SPIRIT) guidelines.
Using the Internet in Rural Special Education: Accessing Resources.
ERIC Educational Resources Information Center
Bull, Kay S.; Kimball, Sarah L.
This paper provides basic information on searching the Internet and describes sites of interest in the area of rural special education. The first section traces the evolution of the Internet through various phases--ARPANET, NSFNET, CERNET, and the beginnings of the World Wide Web--and describes various protocols (methods and tools) developed to…
ERIC Educational Resources Information Center
Dillon, Martin; And Others
1992-01-01
Describes a project that examined textual information available on the Internet and potential means of providing access to this information. Highlights include an overview of Internet resources, a profile of a document sample, description of FTP (File Transfer Protocol) sites, and an automated method of categorizing files. (MES)
Tools to Ease Your Internet Adventures: Part I.
ERIC Educational Resources Information Center
Descy, Don E.
1993-01-01
This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)
ERIC Educational Resources Information Center
McClain, Tim
This paper provides easy-to-understand guidelines for citing online information in student bibliographies. Citation structure and examples are provided for each type of Internet source. Guidelines are included for the following Internet sources: electronic mail; Gopher; File Transfer Protocol (FTP); Telnet; World Wide Web; Usenet Newsgroups;…
A Teacher's Project Guide to the Internet.
ERIC Educational Resources Information Center
Crotchett, Kevin R.
This book is a step-by-step guide to the Internet, suggesting creative K-12 classroom projects ranging from one of the most basic Internet functions, e-mail, to one of the more difficult, writing World Wide Web homepages. Intervening chapters describe projects using Usenet Newsgroups, File Transfer Protocols (FTP), Gopher, Veronica, the World Wide…
automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Measurement issues related to data collection on the World Wide Web.
Strickland, Ora L; Moloney, Margaret F; Dietrich, Alexa S; Myerburg, Stuart; Cotsonis, George A; Johnson, Robert V
2003-01-01
As the World Wide Web has become more prominent as a mode of communication, it has opened up new possibilities for research data collection. This article identifies measurement issues that occur with Internet data collection that are relevant to qualitative and quantitative research approaches as they occurred in a triangulated Internet study of perimenopausal women with migraine headaches. Issues associated with quantitative data collection over the Internet include (a) selecting and designing Internet data collection protocols that adequately address study aims while also taking advantage of the Internet, (b) ensuring the reliability and validity of Internet data collected, (c) adapting quantitative paper-and-pencil data collection protocols for the Internet, (d) making Internet data collection practical for respondents and researchers, and (e) ensuring the quality of quantitative data collected. Qualitative data collection over the Internet needs to remain true to the philosophical stance of the qualitative approach selected. Researcher expertise in qualitative data collection must be combined with expertise in computer technology and information services if data are to be of ultimate quality The advantages and limitations of collecting qualitative data in real time or at a later time are explored, as well as approaches to enhance qualitative data collection over the Internet. It was concluded that like any research approach or method, Internet data collection requires considerable creativity, expertise, and planning to take advantage of the technology for the collection of reliable and valid research data.
Vogel, Adam P; Block, Susan; Kefalianos, Elaina; Onslow, Mark; Eadie, Patricia; Barth, Ben; Conway, Laura; Mundt, James C; Reilly, Sheena
2015-04-01
To investigate the feasibility of adopting automated interactive voice response (IVR) technology for remotely capturing standardized speech samples from stuttering children. Participants were 10 6-year-old stuttering children. Their parents called a toll-free number from their homes and were prompted to elicit speech from their children using a standard protocol involving conversation, picture description and games. The automated IVR system was implemented using an off-the-shelf telephony software program and delivered by a standard desktop computer. The software infrastructure utilizes voice over internet protocol. Speech samples were automatically recorded during the calls. Video recordings were simultaneously acquired in the home at the time of the call to evaluate the fidelity of the telephone collected samples. Key outcome measures included syllables spoken, percentage of syllables stuttered and an overall rating of stuttering severity using a 10-point scale. Data revealed a high level of relative reliability in terms of intra-class correlation between the video and telephone acquired samples on all outcome measures during the conversation task. Findings were less consistent for speech samples during picture description and games. Results suggest that IVR technology can be used successfully to automate remote capture of child speech samples.
Santos, Veruska Andrea; Freire, Rafael; Zugliani, Morená; Cirillo, Patricia; Santos, Hugo Henrique; Nardi, Antonio Egidio; King, Anna Lucia
2016-03-22
The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient's life. This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives.
Multimedia telehomecare system using standard TV set.
Guillén, S; Arredondo, M T; Traver, V; García, J M; Fernández, C
2002-12-01
Nowadays, there are a very large number of patients that need specific health support at home. The deployment of broadband communication networks is making feasible the provision of home care services with a proper quality of service. This paper presents a telehomecare multimedia platform that runs over integrated services digital network and internet protocol using videoconferencing standards H.320 and H.323, and standard TV set for patient interaction. This platform allows online remote monitoring: ECG, heart sound, blood pressure. Usability, affordability, and interoperability were considered for the design and development of its hardware and software components. A first evaluation of technical and usability aspects were carried forward with 52 patients of a private clinic and 10 students in the University. Results show a high rate (mean = 4.33, standard deviation--SD = 1.63 in a five-points Likert scale) in the global perception of users on the quality of images, voice, and feeling of virtual presence.
FTP Extensions for Variable Protocol Specification
NASA Technical Reports Server (NTRS)
Allman, Mark; Ostermann, Shawn
2000-01-01
The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.
Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO
NASA Technical Reports Server (NTRS)
Griffin, Robert I.; Lopez, Isaac (Technical Monitor)
2002-01-01
The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.
Gražulis, Saulius; Daškevič, Adriana; Merkys, Andrius; Chateigner, Daniel; Lutterotti, Luca; Quirós, Miguel; Serebryanaya, Nadezhda R.; Moeck, Peter; Downs, Robert T.; Le Bail, Armel
2012-01-01
Using an open-access distribution model, the Crystallography Open Database (COD, http://www.crystallography.net) collects all known ‘small molecule / small to medium sized unit cell’ crystal structures and makes them available freely on the Internet. As of today, the COD has aggregated ∼150 000 structures, offering basic search capabilities and the possibility to download the whole database, or parts thereof using a variety of standard open communication protocols. A newly developed website provides capabilities for all registered users to deposit published and so far unpublished structures as personal communications or pre-publication depositions. Such a setup enables extension of the COD database by many users simultaneously. This increases the possibilities for growth of the COD database, and is the first step towards establishing a world wide Internet-based collaborative platform dedicated to the collection and curation of structural knowledge. PMID:22070882
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863
NASA Astrophysics Data System (ADS)
Graham, Jim; Jarnevich, Catherine S.; Simpson, Annie; Newman, Gregory J.; Stohlgren, Thomas J.
2011-06-01
Invasive species are a universal global problem, but the information to identify them, manage them, and prevent invasions is stored around the globe in a variety of formats. The Global Invasive Species Information Network is a consortium of organizations working toward providing seamless access to these disparate databases via the Internet. A distributed network of databases can be created using the Internet and a standard web service protocol. There are two options to provide this integration. First, federated searches are being proposed to allow users to search "deep" web documents such as databases for invasive species. A second method is to create a cache of data from the databases for searching. We compare these two methods, and show that federated searches will not provide the performance and flexibility required from users and a central cache of the datum are required to improve performance.
Graham, Jim; Jarnevich, Catherine S.; Simpson, Annie; Newman, Gregory J.; Stohlgren, Thomas J.
2011-01-01
Invasive species are a universal global problem, but the information to identify them, manage them, and prevent invasions is stored around the globe in a variety of formats. The Global Invasive Species Information Network is a consortium of organizations working toward providing seamless access to these disparate databases via the Internet. A distributed network of databases can be created using the Internet and a standard web service protocol. There are two options to provide this integration. First, federated searches are being proposed to allow users to search “deep” web documents such as databases for invasive species. A second method is to create a cache of data from the databases for searching. We compare these two methods, and show that federated searches will not provide the performance and flexibility required from users and a central cache of the datum are required to improve performance.
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
IoT real time data acquisition using MQTT protocol
NASA Astrophysics Data System (ADS)
Atmoko, R. A.; Riantini, R.; Hasin, M. K.
2017-05-01
The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.
Guest, G F
2000-08-15
At the onset of the new millennium the Internet has become the new standard means of distributing information. In the last two to three years there has been an explosion of e-commerce with hundreds of new web sites being created every minute. For most corporate entities, a web site is as essential as the phone book listing used to be. Twenty years ago technologist directed how computer-based systems were utilized. Now it is the end users of personal computers that have gained expertise and drive the functionality of software applications. The computer, initially invented for mathematical functions, has transitioned from this role to an integrated communications device that provides the portal to the digital world. The Web needs to be used by healthcare professionals, not only for professional activities, but also for instant access to information and services "just when they need it." This will facilitate the longitudinal use of information as society continues to gain better information access skills. With the demand for current "just in time" information and the standards established by Internet protocols, reference sources of information may be maintained in dynamic fashion. News services have been available through the Internet for several years, but now reference materials such as online journals and digital textbooks have become available and have the potential to change the traditional publishing industry. The pace of change should make us consider Will Rogers' advice, "It isn't good enough to be moving in the right direction. If you are not moving fast enough, you can still get run over!" The intent of this article is to complement previous articles on Internet Resources published in this journal, by presenting information about web sites that present information on computer and Internet technologies, reference materials, news information, and information that lets us improve personal productivity. Neither the author, nor the Journal endorses any of the sites or products listed, but include these references and links as a matter of convenience for its readers.
Designing a Virtual Classroom for Distance Learning Students through the Internet.
ERIC Educational Resources Information Center
Bradshaw, Allen
Advantages to using the Internet to deliver instruction include the fact that Hypertext Markup Language (HTML) can be accessed on any computer, broadening the student base to anyone with an Internet browser and a PPP (Point-to-Point Protocol) account. In addition, instructions, lectures, and examples can be linked together for use as students need…
Searching Internet Archive Sites with Archie: Why, What, Where, and How.
ERIC Educational Resources Information Center
Simmonds, Curtis
1993-01-01
Describes Archie, an online catalog of electronic holdings of anonymous FTP (File Transfer Protocol) archive sites on the Internet. Accessing Archie through e-mail and using it in a telnet session are discussed. The Internet Gopher and Whatis, which can be used with Archie, are also explained, and search examples are included. (four references)…
Robust Multi-unit Auction Protocol against False-name Bids
NASA Astrophysics Data System (ADS)
Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo
This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.
An International Survey of Brain Banking Operation and Characterization Practices
Palmer-Aronsten, Beatrix; McCrossin, Toni; Kril, Jillian
2016-01-01
Brain banks continue to make a major contribution to the study of neurological and psychiatric disorders. The current complexity and scope of research heighten the need for well-characterized cases and the demand for larger cohorts and necessitate strategies, such as the establishment of bank networks based in regional areas. While individual brain banks have developed protocols that meet researchers' needs within the confines of resources and funding, to further promote collaboration, standardization and scientific validity and understanding of the current protocols of participating banks are required. A survey was sent to brain banks, identified by an Internet search, to investigate operational protocols, case characterization, cohort management, data collection, standardization, and degree of collaboration between banks. The majority of the 24 banks that returned the survey have been established for more than 20 years, and most are affiliated with a regional network. While prospective donor programs were the primary source of donation, the data collected on donors varied. Longitudinal information assists case characterization and enhances the analysis capabilities of research. However, acquiring this information depended on the availability of qualified staff. Respondents indicated a high level of importance for standardization, but only 8 of 24 considered this occurred between banks. Standard diagnostic criteria were not achieved in the classification of controls, and some banks relied on the researcher to indicate the criteria for classification of controls. Although the capacity to collaborate with other banks was indicated by 16 of 24 banks, this occurred infrequently. Engagement of all brain banks to participate toward a consensus of diagnostic tools, especially for controls, will strengthen collaboration. PMID:27399803
An International Survey of Brain Banking Operation and Characterization Practices.
Palmer-Aronsten, Beatrix; Sheedy, Donna; McCrossin, Toni; Kril, Jillian
2016-12-01
Brain banks continue to make a major contribution to the study of neurological and psychiatric disorders. The current complexity and scope of research heighten the need for well-characterized cases and the demand for larger cohorts and necessitate strategies, such as the establishment of bank networks based in regional areas. While individual brain banks have developed protocols that meet researchers' needs within the confines of resources and funding, to further promote collaboration, standardization and scientific validity and understanding of the current protocols of participating banks are required. A survey was sent to brain banks, identified by an Internet search, to investigate operational protocols, case characterization, cohort management, data collection, standardization, and degree of collaboration between banks. The majority of the 24 banks that returned the survey have been established for more than 20 years, and most are affiliated with a regional network. While prospective donor programs were the primary source of donation, the data collected on donors varied. Longitudinal information assists case characterization and enhances the analysis capabilities of research. However, acquiring this information depended on the availability of qualified staff. Respondents indicated a high level of importance for standardization, but only 8 of 24 considered this occurred between banks. Standard diagnostic criteria were not achieved in the classification of controls, and some banks relied on the researcher to indicate the criteria for classification of controls. Although the capacity to collaborate with other banks was indicated by 16 of 24 banks, this occurred infrequently. Engagement of all brain banks to participate toward a consensus of diagnostic tools, especially for controls, will strengthen collaboration.
The design of the m-health service application using a Nintendo DS game console.
Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho
2011-03-01
In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
The 10 Hottest Technologies in Telecom.
ERIC Educational Resources Information Center
Flanagan, Patrick
1997-01-01
Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…
Internet Technologies for Space-based Communications: State of the Art and Challenges
NASA Technical Reports Server (NTRS)
Bhasin, K.; DePaula, R.; Edwards, C.
2000-01-01
The Internet is rapidly changing the ways we communicate information around the globe today. The desire to provide Internet-based services to anyone, anywhere, anytime has brought satellite communications to the forefront to become an integral part of the Internet. In spite of the distances involved, satellite links are proving to be capable of providing Internet services based on Internet protocol (TCP/IP) stack. This development has led to the question particularly at NASA; can satellites and other space platforms become an Internet-node in space? This will allow the direct transfer of information directly from space to the users on Earth and even be able to control the spacecraft and its instruments. NASA even wants to extend the near earth space Internet to deep space applications where scientists and the public here on Earth may view space exploration in real time via the Internet. NASA's future solar system exploration will involve intensive in situ investigations of planets, moons, asteroids, and comets. While past missions typically involved a single fly-by or orbiting science spacecraft, future missions will begin to use fleets of small, highly intelligent robotic vehicles to carry out collaborative investigations. The resulting multi-spacecraft topologies will effectively create a wide area network spanning the solar system. However, this will require significant development in Internet technologies for space use. This paper provides the status'of the Internet for near earth applications and the potential extension of the Internet for use in deep space planetary exploration. The paper will discuss the overall challenges of implementing the space Internet and how the space Internet will integrate into the complex terrestrial systems those forms the Internet of today in a hybrid set of networks. Internet. We envision extending to the deep space environment such Internet concepts as a well-designed layered architecture. This effort will require an ability to develop and infuse new physical layer technology to increase network bandwidth at very low-bit error rates. In addition, we identify network technologies such as routers and switches needed to maintain standard application layer interfaces, while providing low-cost, efficient, modular networking solutions. We will describe the overall architectural approach to extending the concept of the Internet to space and highlight the important technological challenges and initiatives that will make it a reality.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
Low-earth-orbit Satellite Internet Protocol Communications Concept and Design
NASA Technical Reports Server (NTRS)
Slywezak, Richard A.
2004-01-01
This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.
Koburger, Nicole; Larkin, Celine; Karwig, Gillian; Coffey, Claire; Maxwell, Margaret; Harris, Fiona; Rummel-Kluge, Christine; van Audenhove, Chantal; Sisask, Merike; Alexandrova-Karamanova, Anna; Perez, Victor; Purebl, György; Cebria, Annabel; Palao, Diego; Costa, Susana; Mark, Lauraliisa; Tóth, Mónika Ditta; Gecheva, Marieta; Ibelshäuser, Angela; Gusmão, Ricardo; Hegerl, Ulrich
2015-01-01
Background Depression incurs significant morbidity and confers increased risk of suicide. Many individuals experiencing depression remain untreated due to systemic and personal barriers to care. Guided Internet-based psychotherapeutic programs represent a promising means of overcoming such barriers and increasing the capacity for self-management of depression. However, existing programs tend to be available only in English and can be expensive to access. Furthermore, despite evidence of the effectiveness of a number of Internet-based programs, there is limited evidence regarding both the acceptability of such programs and feasibility of their use, for users and health care professionals. Objective This paper will present the protocol for the development, implementation, and evaluation of the iFightDepression tool, an Internet-based self-management tool. This is a cost-free, multilingual, guided, self-management program for mild to moderate depression cases. Methods The Preventing Depression and Improving Awareness through Networking in the European Union consortium undertook a comprehensive systematic review of the available evidence regarding computerized cognitive behavior therapy in addition to a consensus process involving mental health experts and service users to inform the development of the iFightDepression tool. The tool was implemented and evaluated for acceptability and feasibility of its use in a pilot phase in 5 European regions, with recruitment of users occurring through general practitioners and health care professionals who participated in a standardized training program. Results Targeting mild to moderate depression, the iFightDepression tool is based on cognitive behavioral therapy and addresses behavioral activation (monitoring and planning daily activities), cognitive restructuring (identifying and challenging unhelpful thoughts), sleep regulation, mood monitoring, and healthy lifestyle habits. There is also a tailored version of the tool for young people, incorporating less formal language and additional age-appropriate modules on relationships and social anxiety. The tool is accompanied by a 3-hour training intervention for health care professionals. Conclusions It is intended that the iFightDepression tool and associated training for health care professionals will represent a valuable resource for the management of depression that will complement existing resources for health care professionals. It is also intended that the iFightDepression tool and training will represent an additional resource within a multifaceted approach to improving the care of depression and preventing suicidal behavior in Europe. PMID:26251104
Research Networks and Technology Migration (RESNETSII)
2004-07-01
Laboratory (LBNL), The International Computer Science Institute (ICSI) Center for Internet Research (ICIR) DARWIN Developing protocols and...degradation in network loss, delay and throughput AT&T Center for Internet Research at ICSI (ACIRI), AT&T Labs-Research, University Of Massachusetts
Operating CFDP in the Interplanetary Internet
NASA Technical Reports Server (NTRS)
Burleigh, S.
2002-01-01
This paper examines the design elements of CCSDS File Delivery Protocol and Interplanetary Internet technologies that will simplify their integration and discusses the resulting new capabilities, such as efficient transmission of large files via multiple relay satellites operating in parallel.
Adding tools to the open source toolbox: The Internet
NASA Technical Reports Server (NTRS)
Porth, Tricia
1994-01-01
The Internet offers researchers additional sources of information not easily available from traditional sources such as print volumes or commercial data bases. Internet tools such as e-mail and file transfer protocol (ftp) speed up the way researchers communicate and transmit data. Mosaic, one of the newest additions to the Internet toolbox, allows users to combine tools such as ftp, gopher, wide area information server, and the world wide web with multimedia capabilities. Mosaic has quickly become a popular means of making information available on the Internet because it is versatile and easily customizable.
M/A-COM linkabit eastern operations
NASA Astrophysics Data System (ADS)
Mills, D. L.; Avramovic, Z.
1983-03-01
This first Quarterly Project Report on LINKABIT's contribution to the Defense Advanced Research Projects Agency (DARPA) Internet Program covers the period from 22 December 1982 through 21 March 1983. LINKABIT's support of the Internet Program is concentrated in the areas of protocol design, implementation, testing, and evaluation. In addition, LINKABIT staff are providing integration and support services for certain computer systems to be installed at DARPA sites in Washington, D.C., and Stuttgart, West Germany. During the period covered by this report, LINKABIT organized the project activities and established staff responsibilities. Several computers and peripheral devices were made available from Government sources for use in protocol development and network testing. Considerable time was devoted to installing this equipment, integrating the software, and testing it with the Internet system.
Rapid-response Sensor Networks Leveraging Open Standards and the Internet of Things
NASA Astrophysics Data System (ADS)
Bermudez, L. E.; Lieberman, J. E.; Lewis, L.; Botts, M.; Liang, S.
2016-12-01
New sensor technologies provide an unparalleled capability to collect large numbers of diverse observations about the world around us. Networks of such sensors are especially effective for capturing and analyzing unexpected, fast moving events if they can be deployed with a minimum of time, effort, and cost. A rapid-response sensing and processing capability is extremely important in quickly unfolding events not only to collect data for future research.but also to support response efforts that may be needed by providing up-to-date knowledge of the situation. A recent pilot activity coordinated by the Open Geospatial Consortium combined Sensor Web Enablement (SWE) standards with Internet of Things (IoT) practices to understand better how to set up rapid-response sensor networks in comparable event situations involving accidents or disasters. The networks included weather and environmental sensors, georeferenced UAV and PTZ imagery collectors, and observations from "citizen sensors", as well as virtual observations generated by predictive models. A key feature of each "SWE-IoT" network was one or more Sensor Hubs that connected local, often proprietary sensor device protocols to a common set of standard SWE data types and standard Web interfaces on an IP-based internetwork. This IoT approach provided direct, common, interoperable access to all sensor readings from anywhere on the internetwork of sensors, Hubs, and applications. Sensor Hubs also supported an automated discovery protocol in which activated Hubs registered themselves with a canonical catalog service. As each sensor (wireless or wired) was activated within range of an authorized Hub, it registered itself with that Hub, which in turn registered the sensor and its capabilities with the catalog. Sensor Hub functions were implemented in a range of component types, from personal devices such as smartphones and Raspberry Pi's to full cloud-based sensor services platforms. Connected into a network "constellation" the Hubs also enabled reliable exchange and persistence of sensor data in constrained communications environments. Pilot results are being documented in public OGC engineering reports and are feeding into improved standards to support SWE-IoT networks for a range of domains and applications.
HotJava: Sun's Animated Interactive World Wide Web Browser for the Internet.
ERIC Educational Resources Information Center
Machovec, George S., Ed.
1995-01-01
Examines HotJava and Java, World Wide Web technology for use on the Internet. HotJava, an interactive, animated Web browser, based on the object-oriented Java programming language, is different from HTML-based browsers such as Netscape. Its client/server design does not understand Internet protocols but can dynamically find what it needs to know.…
Privacy & Security Notice | Argonne National Laboratory
server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The
Continued Development of Internet Protocols under the IBM OS/MVS operating System
1986-03-10
this contract, the UCLA Office of Academic Computing (OAC) continued its participation in the Internet research effort of * DARPA. OAC’s effort has...is adapted and condensed from TR51. 1.2 NAME RESOLVER The Internet research community is installing a system of name resolvers and name servers...several attributes favoring their use within the ACP. • The "C" language is heavily used within the DARPA Internet research community, giving it an
Easy Online Access to Helpful Internet Guides.
ERIC Educational Resources Information Center
Tuss, Joan
1993-01-01
Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)
Architectural and engineering issues for building an optical Internet
NASA Astrophysics Data System (ADS)
St. Arnaud, Bill
1998-10-01
Recent developments in high density Wave Division Multiplexing fiber systems allows for the deployment of a dedicated optical Internet network for large volume backbone pipes that does not require an underlying multi-service SONET/SDH and ATM transport protocol. Some intrinsic characteristics of Internet traffic such as its self similar nature, server bound congestion, routing and data asymmetry allow for highly optimized traffic engineered networks using individual wavelengths. By transmitting GigaBit Ethernet or SONET/SDH frames natively over WDM wavelengths that directly interconnect high performance routers the original concept of the Internet as an intrinsically survivable datagram network is possible. Traffic engineering, restoral, protection and bandwidth management of the network must now be carried out at the IP layer and so new routing or switching protocols such as MPLS that allow for uni- directional paths with fast restoral and protection at the IP layer become essential for a reliable production network. The deployment of high density WDM municipal and campus networks also gives carriers and ISPs the flexibility to offer customers as integrated and seamless set of optical Internet services.
Santos, Hugo Henrique
2016-01-01
Background The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient’s life. Objective This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Methods Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Results Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. Conclusions This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives. PMID:27005889
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
Use of the Internet for educational applications in prosthodontics.
van Putten, M C
1996-08-01
Internet is the common term for the information superhighway. The Internet has become a major information resource for educational, governmental, and business institutions. This article reviews the current operation of the Internet as a background for discussing educational opportunities for instruction in prosthodontics. Electronic mail, news groups, file transfer protocol, Gopher, and network navigators are discussed. The use of the World Wide Web for educational purposes by The Ohio State University College of Dentistry Department of Restorative and Prosthetic Dentistry is described.
Leymarie, Vincent; Flandrin, Georges; Noguera, Maria Elena; Leymarie, Florence; Lioure, Bruno; Daliphard, Sylvie
2006-09-01
Although modern communication technology is well developed, telehematology does not readily lend itself to practical laboratory use. Multicenter therapeutic protocols may offer preferential opportunities. The cytologists of the AML-2001 protocol established an innovative organization to demonstrate the reliability of the diagnostic assessment of acute myeloid leukemia through a rapid and decentralized exchange of information via the internet and to define the conditions optimizing expert diagnosis. Telediagnosis appears to be a powerful tool for cytological review and other issues.
DoD Needs to Reinitiate Migration to Internet Protocol Version 6 (REDACTED)
2014-12-01
whether DoD was effectively migrating to Internet Protocol Version 6 ( IPv6 ). Finding Although DoD satisfied the requirement to demonstrate IPv6 on the...enterprise network to IPv6 . This occurred because: • DoD Chief Information Officer (CIO) and U.S. Cyber Command (USCYBERCOM) did not make IPv6 a...resources to further DoD-wide transition toward IPv6 ; and • DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Secure Data Aggregation Protocol for M2M Communications
2015-03-24
networking and collaboration among various devices has experienced tremendous growth. To adapt to the trend, the concept of Internet of Things ( IoT ... IoTs ): Models, Algorithms, and Implementations, accepted Title: “Privacy-Preserving Time-Series Data Aggregation for Internet of Things ” Date...public release; distribution is unlimited. (5) Privacy-Preserving Time-Series Data Aggregation for Internet of Things Abstract In recent years, the
Impact of VoIP and QoS on Open and Distance Learning
ERIC Educational Resources Information Center
Saxena, P. C.; Jasola, Sanjay; Sharma, Ramesh C.
2006-01-01
Voice over Internet Protocol (VoIP) is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support…
ERIC Educational Resources Information Center
Microcomputers for Information Management, 1995
1995-01-01
Provides definitions for 71 terms related to the Internet, including Archie, bulletin board system, cyberspace, e-mail (electronic mail), file transfer protocol, gopher, hypertext, integrated services digital network, local area network, listserv, modem, packet switching, server, telnet, UNIX, WAIS (wide area information servers), and World Wide…
Potholes on the Infobahn: Hazardous Conditions Ahead?
ERIC Educational Resources Information Center
Laughon, Sally; Hanson, William R.
1996-01-01
Alerts educators to potentially objectionable Internet materials. Electronic mail, newsgroups, file transfer protocol sites, Internet Relay Chat (IRC), Multiuser Dungeons (MUDs), and Multiuser Object Oriented (MOOs) are services whose user anonymity can embolden discussions regarding sex, prejudice, religious dogma, and gambling. Teachers may wish…
Bundle Security Protocol for ION
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher
2011-01-01
This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.
NASA Technical Reports Server (NTRS)
Barry, Matthew R.
2006-01-01
The X-Windows Socket Widget Class ("Class" is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing network connections for graphical-user-interface (GUI) computer programs. UNIX Transmission Control Protocol/Internet Protocol (TCP/IP) socket programming libraries require many method calls to configure, operate, and destroy sockets. Most X Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Socket Widget Class encapsulates UNIX TCP/IP socket-management tasks within the framework of an X Windows widget. Using the widget framework, X Windows GUI programs can treat one or more network socket instances in the same manner as that of other graphical widgets, making it easier to program sockets. Wrapping ISP socket programming libraries inside a widget framework enables a programmer to treat a network interface as though it were a GUI.
GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application
NASA Technical Reports Server (NTRS)
McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.
2010-01-01
The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.
Survey of Usual Practice: Dysphagia Therapy in Head & Neck Cancer Patients
Krisciunas, Gintas P.; Sokoloff, William; Stepas, Katherine; Langmore, Susan E.
2012-01-01
There is no standardized dysphagia therapy for head and neck cancer patients and scant evidence to support any particular protocol, leaving institutions and individual speech language pathologists (SLPs) to determine their own protocols based on “typical” practices or anecdotal evidence. To gain an understanding of current usual practices, a national internet-based survey was developed and disseminated to SLPs who treat HNC patients. From a random sample of 4,000 ASHA SID 13 members, 1,931 fit the inclusion criteria, and 759 complete responses were recorded for a 39.3% response rate. Results were analyzed by institution type as well as by individual clinical experience. While some interesting trends emerged from the data, a lack of uniformity and consensus regarding best practices was apparent. This is undoubtedly due to a paucity of research adequately addressing the efficacy of any one therapy for dysphagia in the HNC population. PMID:22456699
SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach
NASA Astrophysics Data System (ADS)
Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore
The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.
Semi-Autonomous Vehicle Project
NASA Technical Reports Server (NTRS)
Stewart, Christopher
2016-01-01
The primary objective this summer is "evaluating standards for wireless architecture for the internet of things". The Internet of Things is the network of physical objects or "things" embedded with electronics, software, sensors and network connectivity which enables these objects to collect and exchange data and make decisions based on said data. This was accomplished by creating a semi-autonomous vehicle that takes advantage of multiple sensors, cameras, and onboard computers and combined them with a mesh network which enabled communication across large distances with little to no interruption. The mesh network took advantage of what is known as DTN - Disruption Tolerant Networking which according to NASA is the new communications protocol that is "the first step towards interplanetary internet." The use of DTN comes from the fact that it will store information if an interruption in communications is detected and even forward that information via other relays within range so that the data is not lost. This translates well into the project because as the car moves further away from whatever is sending it commands (in this case a joystick), the information can still be forwarded to the car with little to no loss of information thanks to the mesh nodes around the driving area.
Moving beyond the current state of the internet
NASA Astrophysics Data System (ADS)
Chen, Edward S.; Davison, Daniel B.
1997-06-01
Whereas the Internet has been greatly publicized in the past few years, its effects on education are still largely unexplored. Here, we discuss the future of the Internet itself and the effect on education. Expanding educational and commercial requirements will result in improved bandwidth and connectivity. Larger address spaces will be required, and the next generation of Internet Protocols will provide the addressability required. The real question—how will all of these changes affect education—is explored here. We believe that Internet resources will be a superb supplement to education, but not replace either tutored learning or written texts.
Integration of the White Sands Complex into a Wide Area Network
NASA Technical Reports Server (NTRS)
Boucher, Phillip Larry; Horan, Sheila, B.
1996-01-01
The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.
Networking Foundations for Collaborative Computing at Internet Scope
2006-01-01
network-supported synchronous multime- dia groupwork at Internet scope and for large user groups. Contributions entail an novel classification for...multimedia resources in interactive groupwork , generalized to the domain of CSCW from the “right to speak” [26]. A floor control protocol mediates access to
Collecting and Animating Online Satellite Images.
ERIC Educational Resources Information Center
Irons, Ralph
1995-01-01
Describes how to generate automated classroom resources from the Internet. Topics covered include viewing animated satellite weather images using file transfer protocol (FTP); sources of images on the Internet; shareware available for viewing images; software for automating image retrieval; procedures for animating satellite images; and storing…
Molander, Peter; Hesser, Hugo; Weineland, Sandra; Bergwall, Kajsa; Buck, Sonia; Hansson-Malmlöf, Johan; Lantz, Henning; Lunner, Thomas; Andersson, Gerhard
2015-09-01
Psychological distress and psychiatric symptoms are prevalent among people with hearing loss or other audiological conditions, but psychological interventions for these groups are rare. This article describes the study protocol for a randomized controlled trial for evaluating the effect of a psychological treatment delivered over the Internet for individuals with hearing problems and concurrent psychological distress. Participants who are significantly distressed will be randomized to either an 8-week Internet-delivered acceptance-based cognitive behavioral therapy (i.e., acceptance and commitment therapy [ACT]), or wa it-list control. We aim to include measures of distress associated with hearing difficulties, anxiety, and depression. In addition, we aim to measure acceptance associated with hearing difficulties as well as quality of life. The results of the trial may further our understanding of how to best treat people who present problems with both psychological distress and hearing in using the Internet.
Web Transfer Over Satellites Being Improved
NASA Technical Reports Server (NTRS)
Allman, Mark
1999-01-01
Extensive research conducted by NASA Lewis Research Center's Satellite Networks and Architectures Branch and the Ohio University has demonstrated performance improvements in World Wide Web transfers over satellite-based networks. The use of a new version of the Hypertext Transfer Protocol (HTTP) reduced the time required to load web pages over a single Transmission Control Protocol (TCP) connection traversing a satellite channel. However, an older technique of simultaneously making multiple requests of a given server has been shown to provide even faster transfer time. Unfortunately, the use of multiple simultaneous requests has been shown to be harmful to the network in general. Therefore, we are developing new mechanisms for the HTTP protocol which may allow a single request at any given time to perform as well as, or better than, multiple simultaneous requests. In the course of study, we also demonstrated that the time for web pages to load is at least as short via a satellite link as it is via a standard 28.8-kbps dialup modem channel. This demonstrates that satellites are a viable means of accessing the Internet.
An Environment IoT Sensor Network for Monitoring the Environment
NASA Astrophysics Data System (ADS)
Martinez, K.; Hart, J. K.; Bragg, O.; Black, A.; Bader, S.; Basford, P. J.; Bragg, G. M.; Fabre, A.
2016-12-01
The Internet of Things is a term which has emerged to describe the increase of Internet connectivity of everyday objects. While wireless sensor networks have developed highly energy efficient designs they need a step-change in their interoperability and usability to become more commonly used in Earth Science. IoT techniques can bring many of these advances while reusing some of the technologies developed for low power sensing. Here we concentrate on developing effective use of internet protocols throughout a low power sensor network. This includes 6LowPAN to provide a mesh IPv6 network, 40mW 868 MHz CC1120 radio transceivers to save power but provide kilometre range, a CC2538 ARM® Cortex®-M3 as main processor and CoAP to provide a binary HTTP-like interface to the nodes. We discuss in detail a system we deployed to monitor periglacial, peat and fluvial processes in the Scottish Highlands. The system linked initial nodes 3km away further up the mountain 2km away and used a CoAP GET sequence from a base station in the valley to gather the data. The IPv6 addressing and tunnelling allowed direct connectivity to desktops in Southampton. This provides insights into how the combination of low power techniques and emerging internet standards will bring advantages in interoperability, heterogeneity, usability and maintainability.
Secure authentication protocol for Internet applications over CATV network
NASA Astrophysics Data System (ADS)
Chin, Le-Pond
1998-02-01
An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.
Global Connections for Lasting Impressions: Experiential Learning about TCP
NASA Astrophysics Data System (ADS)
Allison, Colin; Miller, Alan; Oliver, Iain; Sturgeon, Thomas
“Tell me and I forget, Show me and I remember, Involve me and I understand”. This paper discusses the motivation for, and design of, a learning resource which allows students to explore the Transmission Control Protocol (TCP). TCP is responsible for transporting over 80% of the traffic on the Internet - all web and e-mail for example - and in addition is the primary means of achieving Internet congestion control. TCP is therefore core to modern life. It is a protocol under constant study with a view to evolution, and it is incumbent on all ICT curricula to provide education at appropriate levels about its dynamics, strengths and weaknesses. There are no shortages of good textbooks which provide information on TCP, but these are no substitute for experiential learning in order to provide a lasting understanding. The TCP Live learning resource allows students to explore the behavior of TCP on the global Internet, and see the wide variety of conditions that the protocol has to cope with, thereby extending their viewpoint outwith the limited scope of their own institutional firewalls.
Internet Addiction: A Logotherapeutic Approach
ERIC Educational Resources Information Center
Didelot, Mary J.; Hollingsworth, Lisa; Buckenmeyer, Janet A.
2012-01-01
Internet addiction (IA) is both the most rapidly growing addiction and the least understood addiction (Watson, 2005). For counselors, treatment issues surrounding the disease are also growing. At the forefront is the lack of understanding concerning treatment protocol to manage the challenging recovery and maintenance stages after IA behavior has…
Using Internet Audio to Enhance Online Accessibility
ERIC Educational Resources Information Center
Schwartz, Linda Matula
2004-01-01
Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…
Evaluating Information on the Internet.
ERIC Educational Resources Information Center
Brandt, D. Scott
1996-01-01
Evaluation of information found on the Internet requires the same assessment of reliability, credibility, perspective, purpose and author credentials as required with print materials. Things to check include whether the source is from a moderated or unmoderated list or FTP (file transfer protocol) site; directories for affiliation and biographical…
Developing Multimedia Courseware for the Internet's Java versus Shockwave.
ERIC Educational Resources Information Center
Majchrzak, Tina L.
1996-01-01
Describes and compares two methods for developing multimedia courseware for use on the Internet: an authoring tool called Shockwave, and an object-oriented language called Java. Topics include vector graphics, browsers, interaction with network protocols, data security, multithreading, and computer languages versus development environments. (LRW)
Efficient Group Coordination in Multicast Trees
2001-01-01
describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast
Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)
NASA Technical Reports Server (NTRS)
Ivancic, William D.
1997-01-01
The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.
An Analysis for an Internet Grid to Support Space Based Operations
NASA Technical Reports Server (NTRS)
Bradford, Robert; McNair, Ann R. (Technical Monitor)
2002-01-01
Currently, and in the past, dedicated communication circuits and "network services" with very stringent performance requirements have been used to support manned and unmanned mission critical ground operations at GSFC, JSC, MSFC, KSC and other NASA facilities. Because of the evolution of network technology, it is time to investigate other approaches to providing mission services for space ground and flight operations. In various scientific disciplines, effort is under way to develop network/komputing grids. These grids consisting of networks and computing equipment are enabling lower cost science. Specifically, earthquake research is headed in this direction. With a standard for network and computing interfaces using a grid, a researcher would not be required to develop and engineer NASA/DoD specific interfaces with the attendant increased cost. Use of the Internet Protocol (IP), CCSDS packet spec, and reed-solomon for satellite error correction etc. can be adopted/standardized to provide these interfaces. Generally most interfaces are developed at least to some degree end to end. This study would investigate the feasibility of using existing standards and protocols necessary to implement a SpaceOps Grid. New interface definitions or adoption/modification of existing ones for the various space operational services is required for voice both space based and ground, video, telemetry, commanding and planning may play a role to some undefined level. Security will be a separate focus in the study since security is such a large issue in using public networks. This SpaceOps Grid would be transparent to users. It would be anagulous to the Ethernet protocol's ease of use in that a researcher would plug in their experiment or instrument at one end and would be connected to the appropriate host or server without further intervention. Free flyers would be in this category as well. They would be launched and would transmit without any further intervention with the researcher or ground ops personnel. The payback in developing these new approaches in support of manned and unmanned operations is lower cost and will enable direct participation by more people in organizations and educational institutions in space based science. By lowering the high cost of space based operations and networking, more resource will be available to the science community for science. With a specific grid in place, experiment development and operations would be much less costly by using standardized network interfaces. Because of the extensive connectivity on a global basis, significant numbers of people would participate in science who otherwise would not be able to participate.
Autonomous Data Transfer Operations for Missions
NASA Technical Reports Server (NTRS)
Repaci, Max; Baker, Paul; Brosi, Fred
2000-01-01
Automating the data transfer operation can significantly reduce the cost of moving data from a spacecraft to a location on Earth. Automated data transfer methods have been developed for the terrestrial Internet. However, they often do not apply to the space environment, since in general they are based on assumptions about connectivity that are true on the Internet but not on space links. Automated file transfer protocols have been developed for use over space links that transfer data via store-and-forward of files or segments of files. This paper investigates some of the operational concepts made possible by these protocols.
[Access to the internet among nurses and type of information sought].
Muñoz-Izquierdo, Amparo; Puchades-Simó, Amparo; Marco-Gisbert, Amparo; Piquer-Bosca, Cecilia; Ferrer-Casares, Elena; Canela-Ferrer, Amparo; Gómez-Muñoz, Neus; Costa-Pastrana, M Carmen
2008-01-01
To identify how nurses use the Internet through a survey performed in May 2005. A descriptive cross-sectional study was performed. The information source was a survey sent electronically and through surface mail. The study population consisted of nursing professionals from distinct autonomous regions. The overall response rate was 40% (444 of 1,100). A total of 38.6% (184) of the nursing professionals used the Internet continually, especially men and nursing staff with a high level of English. The 5 most frequent reasons for surfing the net were searching for nursing literature (63% [264]), consulting the web pages of nursing journals (58.6% [256]), seeking information on drugs (55% [230]), seeking protocol manuals (50% [204]), and consulting the web pages of colleges of nursing (48). The behavior of nursing professionals is similar to that found among the general population in the "BBVA Foundation study of the Internet in Spain". Most nursing professionals are women. Male nursing professionals more frequently search for subjects related to nursing theory. Nurses use the Internet to search for nursing literature and consult journals, protocol manuals, and colleges of nursing, as well as to be familiar with the information aimed at patients.
Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco
2016-01-20
This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant's critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events.
TCP throughput adaptation in WiMax networks using replicator dynamics.
Anastasopoulos, Markos P; Petraki, Dionysia K; Kannan, Rajgopal; Vasilakos, Athanasios V
2010-06-01
The high-frequency segment (10-66 GHz) of the IEEE 802.16 standard seems promising for the implementation of wireless backhaul networks carrying large volumes of Internet traffic. In contrast to wireline backbone networks, where channel errors seldom occur, the TCP protocol in IEEE 802.16 Worldwide Interoperability for Microwave Access networks is conditioned exclusively by wireless channel impairments rather than by congestion. This renders a cross-layer design approach between the transport and physical layers more appropriate during fading periods. In this paper, an adaptive coding and modulation (ACM) scheme for TCP throughput maximization is presented. In the current approach, Internet traffic is modulated and coded employing an adaptive scheme that is mathematically equivalent to the replicator dynamics model. The stability of the proposed ACM scheme is proven, and the dependence of the speed of convergence on various physical-layer parameters is investigated. It is also shown that convergence to the strategy that maximizes TCP throughput may be further accelerated by increasing the amount of information from the physical layer.
Brief Internet and NREN Glossary: Part II (M-Z).
ERIC Educational Resources Information Center
Machovec, George S.
1993-01-01
Presents the second and final part of a selected glossary of terms commonly used in discussions relating to the Internet and the National Research and Education Network (NREN). Highlights include various network names; organizations; acronyms; user interfaces; network research testbeds; various protocols; remote login; and Wide Area Information…
Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.
ERIC Educational Resources Information Center
Webster, Peter
2002-01-01
Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)
47 CFR 64.613 - Numbering directory for Internet-based TRS users.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the user's Internet Protocol (IP) address. For each record associated with an IP Relay user, the URI... a VRS user's geographically appropriate NANP telephone number, the URI shall contain the IP address of the user's device. For each record associated with an IP Relay user's geographically appropriate...
ERIC Educational Resources Information Center
Descy, Don E.
1993-01-01
This introduction to the Internet with examples for Macintosh computer users demonstrates the ease of using e-mail, participating on discussion group listservs, logging in to remote sites using Telnet, and obtaining resources using the File Transfer Protocol (FTP). Included are lists of discussion groups, Telnet sites, and FTP Archive sites. (EA)
ERIC Educational Resources Information Center
Wiggins, Rich
1993-01-01
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-30
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 4 [PS Docket No. 11-82; DA 12-1962] Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final...
Enhancing Online Education Using Collaboration Solutions
ERIC Educational Resources Information Center
Ge, Shuzhi Sam; Tok, Meng Yong
2003-01-01
With the advances in Internet technologies, online education is fast gaining ground as an extension to traditional education. Webcast allows lectures conducted on campus to be viewed by students located at remote sites by streaming the audio and video content over Internet Protocol (IP) networks. However when used alone, webcast does not provide…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... legitimate relay calls, however, are not entitled to these transparency and confidentiality protections... Relay Service AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this... refresh the record regarding misuse of Internet Protocol relay service. Further comments are requested to...
CALEA: Prepare for the Worst, Hope for the Best
ERIC Educational Resources Information Center
Wigen, Wendy
2006-01-01
On August 5, 2005, nearly a year since requesting public comment on the issue, the Federal Communications Commission (FCC) voted to extend the Communications Assistance for Law Enforcement Act (CALEA) to broadband Internet and interconnected Voice-over-Internet Protocol (VoIP) providers. This includes college and university campus networks, as…
High-Frequency Mapping of the IPV6 Internet Using YARRP
2017-03-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA APPLIED CYBER OPERATIONS CAPSTONE PROJECT REPORT HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING...03-30-2017 4. TITLE AND SUBTITLE HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING YARRP 5. FUNDING NUMBERS RCKHX 6. AUTHOR(S) Eric W. Gaston 7...the U.S. Government. IRB Protocol Number: N/A. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b
Analysing efficiency of IPv6 packet transmission over 6LoWPAN network
NASA Astrophysics Data System (ADS)
Kozłowski, Adam; Sosnowski, Janusz
2017-08-01
Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.
Yang, Tsun-Po; Beazley, Claude; Montgomery, Stephen B; Dimas, Antigone S; Gutierrez-Arcelus, Maria; Stranger, Barbara E; Deloukas, Panos; Dermitzakis, Emmanouil T
2010-10-01
Genevar (GENe Expression VARiation) is a database and Java tool designed to integrate multiple datasets, and provides analysis and visualization of associations between sequence variation and gene expression. Genevar allows researchers to investigate expression quantitative trait loci (eQTL) associations within a gene locus of interest in real time. The database and application can be installed on a standard computer in database mode and, in addition, on a server to share discoveries among affiliations or the broader community over the Internet via web services protocols. http://www.sanger.ac.uk/resources/software/genevar.
Infrastructure Vulnerability Assessment and Defense
2005-03-01
companies or organizations. The connectivity and communications within and among networks are "glued" together by a set of protocols defined by the Internet ... research communities, which are modified and improved over decades of time. Those protocols are usually designed in the principle to achieve
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.
Development of wide area environment accelerator operation and diagnostics method
NASA Astrophysics Data System (ADS)
Uchiyama, Akito; Furukawa, Kazuro
2015-08-01
Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.
Identifying Internet Sites to Coordinate with National Science Education Standards
ERIC Educational Resources Information Center
Fehrenbach, Carolyn R.; Morris, Maxine G.
2004-01-01
Identifying Internet sites to coordinate with National Science Education Standards can be challenging for teachers and students. By identifying quality free Internet sites in science, teachers and students can use the extensive resources of the Internet to enhance learning and instruction while meeting National Science Education Content Standards…
Toward a Standardized Internet Measurement.
ERIC Educational Resources Information Center
Chen, Hsiang; Tan, Zixiang
This paper investigates measurement issues related to elements of the Internet and calls for a standardized measuring scheme to resolve the problem of the measurement. The dilemmas in measuring the elements of the Internet are identified, and previous studies are reviewed. Elements of the Internet are categorized into population, usage, protocol…
Insecurity of Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less
Adopting Internet Standards for Orbital Use
NASA Technical Reports Server (NTRS)
Wood, Lloyd; Ivancic, William; da Silva Curiel, Alex; Jackson, Chris; Stewart, Dave; Shell, Dave; Hodgson, Dave
2005-01-01
After a year of testing and demonstrating a Cisco mobile access router intended for terrestrial use onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we reflect on and discuss the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use, as well as reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies we have adopted and also some significant differences in operational models and assumptions that must be considered.
Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
NASA Technical Reports Server (NTRS)
Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)
2014-01-01
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
ERIC Educational Resources Information Center
Simonic, Tomaz; Mlinar, Tomi
2000-01-01
Discusses the planning and provision of mobile communications in Slovenia and suggests areas that will be developed in the future. Topics include the global mobile market; digital mobile networks; evolution from voice to multimedia services; wireless application protocol; the Internet; general packet radio service; and universal mobile…
ERIC Educational Resources Information Center
Villano, Matt
2006-01-01
The benefits of deploying a communications system that runs over the Internet Protocol are well documented. Sending voice over the Internet, a process commonly known as VoIP, has been shown to save money on long distance calls, make voice mail more accessible, and enable users to answer their phones from anywhere. The technology also makes adding…
ERIC Educational Resources Information Center
Milner, Jacob
2005-01-01
Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…
Running TCP/IP over ATM Networks.
ERIC Educational Resources Information Center
Witt, Michael
1995-01-01
Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)
Frequency Count Attribute Oriented Induction of Corporate Network Data for Mapping Business Activity
NASA Astrophysics Data System (ADS)
Tanutama, Lukas
2014-03-01
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology infrastructure backbone for business activities, corporate network connects the company to Internet and enables its activities globally. It carries data packets generated by the activities of the users performing their business tasks. Traditionally, infrastructure operations mainly maintain data carrying capacity and network devices performance. It would be advantageous if a company knows what activities are running in its network. The research provides a simple method of mapping the business activity reflected by the network data. To map corporate users' activities, a slightly modified Attribute Oriented Induction (AOI) approach to mine the network data was applied. The frequency of each protocol invoked were counted to show what the user intended to do. The collected data was samples taken within a certain sampling period. Samples were taken due to the enormous data packets generated. Protocols of interest are only Internet related while intranet protocols are ignored. It can be concluded that the method could provide the management a general overview of the usage of its infrastructure and lead to efficient, effective and secure ICT infrastructure.
Providing Internet Access to High-Resolution Lunar Images
NASA Technical Reports Server (NTRS)
Plesea, Lucian
2008-01-01
The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.
Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.
Teletesting at IABG - Technical Features and Security Issues
NASA Astrophysics Data System (ADS)
Goerner, E.
2004-08-01
In the space simulation department at IABG data handling systems are used to collect, evaluate and present all data gathered from different test chambers during thermal vacuum tests. In the year 2000 a redesign of the existing data handling systems gave us the opportunity to add some features like ethernet- based client / server systems and internet protocol TCP / IP. The results were state of the art internet-ready data handling systems. Based on this we started mid 2002 with a new project called teletesting to give our customers remote access to test data. For the realisation TCO (Total Cost of Ownership), QoS (Quality of Service), data confidentiality, restrictive access to test data and a plain and simple user interface with standard components, i.e. normal PC hardware and software, were mandatory. As a result of this project, our customers have now online access to their test data in CSV/EXCEL format, in display mode either in numerical or graphical form and through DynaWorks. ISDN teletesting is already used by our customers, internet teletesting is in test mode but some parts have already been approved and used. Although an extension to teleoperation is implemented in the control systems (WIN CC) of our test chambers, it is not yet in use.
Media perspective - new opportunities for reaching audiences
NASA Astrophysics Data System (ADS)
Haswell, Katy
2007-08-01
The world of media is experiencing a period of extreme and rapid change with the rise of internet television and the download generation. Many young people no longer watch standard TV. Instead, they go on-line, talking to friends and downloading pictures, videos, music clips to put on their own websites and watch/ listen to on their laptops and mobile phones. Gone are the days when TV controllers determined what you watched and when you watched it. Now the buzzword is IPTV, Internet Protocol Television, with companies such as JOOST offering hundreds of channels on a wide range of subjects, all of which you can choose to watch when and where you wish, on your high-def widescreen with stereo surround sound at home or on your mobile phone on the train. This media revolution is changing the way organisations get their message out. And it is encouraging companies such as advertising agencies to be creative about new ways of accessing audiences. The good news is that we have fresh opportunities to reach young people through internet-based media and material downloaded through tools such as games machines, as well as through the traditional media. And it is important for Europlanet to make the most of these new and exciting developments.
Acceptance and Commitment Therapy for Problematic Internet Pornography Use: A Randomized Trial.
Crosby, Jesse M; Twohig, Michael P
2016-05-01
Problematic Internet pornography use is the inability to control the use of pornography, the experience of negative cognitions or emotions regarding pornography use, and the resulting negative effects on quality of life or general functioning. This study compared a 12-session individual protocol of acceptance and commitment therapy (ACT) for problematic Internet pornography use to a waitlist control condition with 28 adult males, all but 1 of whom were members of the Church of Jesus Christ of Latter-day Saints. Measures of self-reported pornography viewing, standardized measures of compulsive sexual behavior and related cognitions, and quality of life occurred at pretreatment, posttreatment, and 3-month follow-up. Results demonstrate significant between-condition reductions in pornography viewing compared to the waitlist condition (93% reduction ACT vs. 21% waitlist). When combining all participants (N=26), a 92% reduction was seen at posttreatment and an 86% reduction at 3-month follow-up. Complete cessation was seen in 54% of participants at posttreatment and at least a 70% reduction was seen in 93% of participants. At the 3-month follow-up assessment, 35% of participants showed complete cessation, with 74% of participants showing at least 70% reduction in viewing. Treatment suggestions and future directions are discussed. Copyright © 2016. Published by Elsevier Ltd.
Simulation Modeling and Performance Evaluation of Space Networks
NASA Technical Reports Server (NTRS)
Jennings, Esther H.; Segui, John
2006-01-01
In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
2015-01-06
Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol
Mupparapu, Muralidhar
2008-03-01
Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Migrating an Online Service to WAP - A Case Study.
ERIC Educational Resources Information Center
Klasen, Lars
2002-01-01
Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)
Technical Assessment: Integrated Photonics
2015-10-01
in global internet protocol traffic as a function of time by local access technology. Photonics continues to play a critical role in enabling this...communication networks. This has enabled services like the internet , high performance computing, and power-efficient large-scale data centers. The...signal processing, quantum information science, and optics for free space applications. However major obstacles challenge the implementation of
ERIC Educational Resources Information Center
Chudnov, Daniel
2010-01-01
Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…
ERIC Educational Resources Information Center
Chen, Ching-chih
1996-01-01
Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)
2007-03-01
provides a means for anyone who has access to an Internet connection to collect or disseminate information on a global scale at a very low cost. The......AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED
ERIC Educational Resources Information Center
Agyapong, Parick Kwadwo
2013-01-01
Content-centric networking (CCN) has emerged as a dominant paradigm for future Internet architecture design due to its efficient support for content dissemination, which currently dominates Internet use. This dissertation shows how economic and social welfare analysis can be used to inform the design of a CCN architecture that provides network…
Approaches in highly parameterized inversion - GENIE, a general model-independent TCP/IP run manager
Muffels, Christopher T.; Schreuder, Willem A.; Doherty, John E.; Karanovic, Marinko; Tonkin, Matthew J.; Hunt, Randall J.; Welter, David E.
2012-01-01
GENIE is a model-independent suite of programs that can be used to generally distribute, manage, and execute multiple model runs via the TCP/IP infrastructure. The suite consists of a file distribution interface, a run manage, a run executer, and a routine that can be compiled as part of a program and used to exchange model runs with the run manager. Because communication is via a standard protocol (TCP/IP), any computer connected to the Internet can serve in any of the capacities offered by this suite. Model independence is consistent with the existing template and instruction file protocols of the widely used PEST parameter estimation program. This report describes (1) the problem addressed; (2) the approach used by GENIE to queue, distribute, and retrieve model runs; and (3) user instructions, classes, and functions developed. It also includes (4) an example to illustrate the linking of GENIE with Parallel PEST using the interface routine.
Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance
NASA Astrophysics Data System (ADS)
Patil, Dipali P.; Patil, G. A.
2010-11-01
Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.
Integrating DXplain into a clinical information system using the World Wide Web.
Elhanan, G; Socratous, S A; Cimino, J J
1996-01-01
The World Wide Web(WWW) offers a cross-platform environment and standard protocols that enable integration of various applications available on the Internet. The authors use the Web to facilitate interaction between their Web-based Clinical Information System and a decision-support system-DXplain, at the Massachusetts General Hospital-using local architecture and Common Gateway Interface programs. The current application translates patients laboratory test results into DXplain's terms to generate diagnostic hypotheses. Two different access methods are utilized for this model; Hypertext Transfer Protocol (HTTP) and TCP/IP function calls. While clinical aspects cannot be evaluated as yet, the model demonstrates the potential of Web-based applications for interaction and integration and how local architecture, with a controlled vocabulary server, can further facilitate such integration. This model serves to demonstrate some of the limitations of the current WWW technology and identifies issues such as control over Web resources and their utilization and liability issues as possible obstacles for further integration.
Analysis of Handoff Mechanisms in Mobile IP
NASA Astrophysics Data System (ADS)
Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar
2011-06-01
One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.
Next Generation Integrated Environment for Collaborative Work Across Internets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harvey B. Newman
2009-02-24
We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in themore » same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.« less
Yang, Tsun-Po; Beazley, Claude; Montgomery, Stephen B.; Dimas, Antigone S.; Gutierrez-Arcelus, Maria; Stranger, Barbara E.; Deloukas, Panos; Dermitzakis, Emmanouil T.
2010-01-01
Summary: Genevar (GENe Expression VARiation) is a database and Java tool designed to integrate multiple datasets, and provides analysis and visualization of associations between sequence variation and gene expression. Genevar allows researchers to investigate expression quantitative trait loci (eQTL) associations within a gene locus of interest in real time. The database and application can be installed on a standard computer in database mode and, in addition, on a server to share discoveries among affiliations or the broader community over the Internet via web services protocols. Availability: http://www.sanger.ac.uk/resources/software/genevar Contact: emmanouil.dermitzakis@unige.ch PMID:20702402
Technologies for Achieving Field Ubiquitous Computing
NASA Astrophysics Data System (ADS)
Nagashima, Akira
Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.
JavaScript Access to DICOM Network and Objects in Web Browser.
Drnasin, Ivan; Grgić, Mislav; Gogić, Goran
2017-10-01
Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.
Internet-Based Partner Services in US Sexually Transmitted Disease Prevention Programs: 2009-2013.
Moody, Victoria; Hogben, Matthew; Kroeger, Karen; Johnson, James
2015-01-01
Social networking sites have become increasingly popular venues for meeting sex partners. Today, some sexually transmitted disease (STD) programs conduct Internet-based partner services (IPS). The purpose of the study was to explore how the Internet is being used by STD prevention programs to perform partner services. We assessed US STD prevention programs receiving funds through the 2008-2013 Comprehensive STD Prevention Systems cooperative agreement. We (1) reviewed 2009 IPS protocols in 57 funding applications against a benchmark of national guidelines and (2) surveyed persons who conducted IPS in jurisdictions conducting IPS in 2012. Of the 57 project areas receiving Comprehensive STD Prevention Systems funds, 74% provided an IPS protocol. States with IPS protocols had larger populations and more gonorrhea and syphilis cases (t = 2.2-2.6; all Ps < .05), although not higher rates of infection. Most protocols included staffing (92%) and IPS documentation (87%) requirements, but fewer had evaluation plans (29%) or social networking site engagement strategies (16%). Authority to perform a complete range of IPS activities (send e-mail, use social networking sites) was associated with contacting more partners via IPSs (P < .05). This study provides a snapshot of IPS activities in STD programs in the United States. Further research is needed to move from assessment to generating data that can assist training efforts and program action and, finally, to enable efficient IPS programs that are integrated into STD prevention and control efforts.
Watson, Hunna J; McLagan, Nicole; Zerwas, Stephanie C; Crosby, Ross D; Levine, Michele D; Runfola, Cristin D; Peat, Christine M; Moessner, Markus; Zimmer, Benjamin; Hofmeier, Sara M; Hamer, Robert M; Marcus, Marsha D; Bulik, Cynthia M; Crow, Scott J
To evaluate the cost-effectiveness of Internet-based cognitive-behavioral therapy for bulimia nervosa (CBT-BN) compared to face-to-face delivery of CBT-BN. This study is a planned secondary analysis of data from a randomized clinical trial. Participants were 179 adults (98% female, mean age = 28 years) meeting DSM-IV criteria for bulimia nervosa who were randomized to group face-to-face or group Internet-based CBT-BN for 16 sessions during 20 weeks. The cost-effectiveness analysis was conducted from a third-party payor perspective, and a partial societal perspective analysis was conducted to investigate cost-utility (ie, cost per gain in quality-adjusted life-years) and patient out-of-pocket travel-related costs. Net health care costs were calculated from protocol and nonprotocol health care services using third-party payor cost estimates. The primary outcome measure in the clinical trial was abstinence from binge eating and purging, and the trial start and end dates were 2008 and 2016. The mean cost per abstinent patient at posttreatment was $7,757 (95% confidence limit [CL], $4,515, $13,361) for face-to-face and $11,870 (95% CL, $6,486, $22,188) for Internet-based CBT-BN, and at 1-year follow-up was $16,777 (95% CL, $10,298, $27,042) for face-to-face and $14,561 (95% CL, $10,165, $21,028) for Internet-based CBT-BN. There were no statistically significant differences between treatment arms in cost-effectiveness or cost-utility at posttreatment or 1-year follow-up. Out-of-pocket patient costs were significantly higher for face-to-face (mean [95% CL] = $178 [$127, $140]) than Internet-based ($50 [$50, $50]) therapy. Third-party payor cost-effectiveness of Internet-based CBT-BN is comparable with that of an accepted standard. Internet-based dissemination of CBT-BN may be a viable alternative for patients geographically distant from specialist eating disorder services who have an unmet need for treatment. ClinicalTrials.gov identifier: NCT00877786. © Copyright 2017 Physicians Postgraduate Press, Inc.
Kouchri, Farrokh Mohammadzadeh
2012-11-06
A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.
Fingerprinting Software Defined Networks and Controllers
2015-03-01
24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined
Improving Internet Archive Service through Proxy Cache.
ERIC Educational Resources Information Center
Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming
2003-01-01
Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…
On the Nets. Comparing Web Browsers: Mosaic, Cello, Netscape, WinWeb and InternetWorks Life.
ERIC Educational Resources Information Center
Notess, Greg R.
1995-01-01
World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Traffic Generator (TrafficGen) Version 1.4.2: Users Guide
2016-06-01
events, the user has to enter them manually . We will research and implement a way to better define and organize the multicast addresses so they can be...the network with Transmission Control Protocol and User Datagram Protocol Internet Protocol traffic. Each node generating network traffic in an...TrafficGen Graphical User Interface (GUI) 3 3.1 Anatomy of the User Interface 3 3.2 Scenario Configuration and MGEN Files 4 4. Working with
Corkum, Penny V; Reid, Graham J; Hall, Wendy A; Godbout, Roger; Stremler, Robyn; Weiss, Shelly K; Gruber, Reut; Witmans, Manisha; Chambers, Christine T; Begum, Esmot Ara; Andreou, Pantelis; Rigney, Gabrielle
2018-03-26
Up to 25% of 1- to 10-year-old children experience insomnia (ie, resisting bedtime, trouble falling asleep, night awakenings, and waking too early in the morning). Insomnia can be associated with excessive daytime sleepiness and negative effects on daytime functioning across multiple domains (eg, behavior, mood, attention, and learning). Despite robust evidence supporting the effectiveness of behavioral treatments for insomnia in children, very few children with insomnia receive these treatments, primarily due to a shortage of available treatment resources. The Better Nights, Better Days (BNBD) internet-based program provides a readily accessible electronic health (eHealth) intervention to support parents in providing evidence-based care for insomnia in typically developing children. The purpose of the randomized controlled trial (RCT) is to evaluate the effectiveness of BNBD in treating insomnia in children aged between 1 and 10 years. BNBD is a fully automated program, developed based on evidence-based interventions previously tested by the investigators, as well as on the extant literature on this topic. We describe the 2-arm RCT in which participants (500 primary caregivers of children with insomnia residing in Canada) are assigned to intervention or usual care. The effects of this behavioral sleep eHealth intervention will be assessed at 4 and 8 months postrandomization. Assessment includes both sleep (actigraphy, sleep diary) and daytime functioning of the children and daytime functioning of their parents. Results will be reported using the standards set out in the Consolidated Standards of Reporting Trials statement. If the intervention is supported by the results of the RCT, we plan to commercialize this program so that it is sustainable and available at a low cost to all families with internet access. ClinicalTrials.gov NCT02243501; https://clinicaltrials.gov/show/NCT02243501 (Archived by WebCite at http://www.webcitation.org/6x8Z5pBui). ©Penny V Corkum, Graham J Reid, Wendy A Hall, Roger Godbout, Robyn Stremler, Shelly K Weiss, Reut Gruber, Manisha Witmans, Christine T Chambers, Esmot Ara Begum, Pantelis Andreou, Gabrielle Rigney. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.03.2018.
IPv6 Test Bed for Testing Aeronautical Applications
NASA Technical Reports Server (NTRS)
Wilkins, Ryan; Zernic, Michael; Dhas, Chris
2004-01-01
Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.
Connecting the Force from Space: The IRIS Joint Capability Technology Demonstration
2010-01-01
the Joint in Joint Capability Technology Demonstration, we have two sponsors, both U.S. Strategic Command and the Defense Information Systems...Capability Technology Demonstration will provide an excellent source of data on space-based Internet Protocol net- working. Operational... Internet Routing in Space Joint Capability Technology Demonstration Operational Manager, Space and Missile Defense Battle Lab, Colorado Springs
Voice Over Internet Protocol (VoIP) in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pirani, Joseph; Calvelage, Steven
2010-01-01
The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.
NASA Technical Reports Server (NTRS)
2001-01-01
REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.
Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco
2016-01-01
This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant’s critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events. PMID:26805832
Virtual private networks can provide reliable IT connections.
Kabachinski, Jeff
2006-01-01
A VPN is a private network that uses a public network, such as the Internet, to connect remote sites and users together. Instead of using a dedicated hard-wired connection as in a trusted connection or leased lines, a VPN uses a virtual connection routed through the Internet from the organization's private network to the remote site or employee. Typical VPN services allow for security in terms of data encryption as well as means to authenticate, authorize, and account for all the traffic. VPN services allow the organization to use whatever network operating system they wish as it also encapsulate your data into the protocols needed to transport data across public lines. The intention of this IT World article was to give the reader an introduction to VPNs. Keep in mind that there are no standard models for a VPN. You're likely to come across many vendors presenting the virtues of their VPN applications and devices when you Google "VPN." However the general uses, concepts, and principles outlined here should give you a fighting chance to read through the marketing language in the online ads and "white papers."
Management of ATM-based networks supporting multimedia medical information systems
NASA Astrophysics Data System (ADS)
Whitman, Robert A.; Blaine, G. James; Fritz, Kevin; Goodgold, Ken; Heisinger, Patrick
1997-05-01
Medical information systems are acquiring the ability to collect and deliver many different types of medical information. In support of the increased network demands necessitated by these expanded capabilities, asynchronous transfer mode (ATM) based networks are being deployed in medical care systems. While ATM supplies a much greater line rate than currently deployed networks, the management and standards surrounding ATM are yet to mature. This paper explores the management and control issues surrounding an ATM network supporting medical information systems, and examines how management impacts network performance and robustness. A multivendor ATM network at the BJC Health System/Washington University and the applications using the network are discussed. Performance information for specific applications is presented and analyzed. Network management's influence on application reliability is outlined. The information collected is used to show how ATM network standards and management tools influence network reliability and performance. Performance of current applications using the ATM network is discussed. Special attention is given to issues encountered in implementation of hypertext transfer protocol over ATM internet protocol (IP) communications. A classical IP ATM implementation yields greater than twenty percent higher network performance over LANE. Maximum performance for a host's suite of applications can be obtained by establishing multiple individually engineered IP links through its ATM network connection.
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
NASA Technical Reports Server (NTRS)
Carek, David Andrew
2003-01-01
This presentation covers the design of a command and control architecture developed by the author for the Combustion Module-2 microgravity experiment, which flew aboard the STS-107 Shuttle mission, The design was implemented to satisfy a hybrid network that utilized TCP/IP for both the onboard segment and ground segment, with an intermediary unreliable transport for the space to ground segment. With the infusion of Internet networking technologies into Space Shuttle, Space Station, and spacecraft avionics systems, comes the need for robust methodologies for ground command and control. Considerations of high bit error links, and unreliable transport over intermittent links must be considered in such systems. Internet protocols applied to these systems, coupled with the appropriate application layer protections, can provide adequate communication architectures for command and control. However, there are inherent limitations and additional complexities added by the use of Internet protocols that must be considered during the design. This presentation will discuss the rationale for the: framework and protocol algorithms developed by the author. A summary of design considerations, implantation issues, and learned lessons will be will be presented. A summary of mission results using this communications architecture will be presented. Additionally, areas of further needed investigation will be identified.
Network Monitor and Control of Disruption-Tolerant Networks
NASA Technical Reports Server (NTRS)
Torgerson, J. Leigh
2014-01-01
For nearly a decade, NASA and many researchers in the international community have been developing Internet-like protocols that allow for automated network operations in networks where the individual links between nodes are only sporadically connected. A family of Disruption-Tolerant Networking (DTN) protocols has been developed, and many are reaching CCSDS Blue Book status. A NASA version of DTN known as the Interplanetary Overlay Network (ION) has been flight-tested on the EPOXI spacecraft and ION is currently being tested on the International Space Station. Experience has shown that in order for a DTN service-provider to set up a large scale multi-node network, a number of network monitor and control technologies need to be fielded as well as the basic DTN protocols. The NASA DTN program is developing a standardized means of querying a DTN node to ascertain its operational status, known as the DTN Management Protocol (DTNMP), and the program has developed some prototypes of DTNMP software. While DTNMP is a necessary component, it is not sufficient to accomplish Network Monitor and Control of a DTN network. JPL is developing a suite of tools that provide for network visualization, performance monitoring and ION node control software. This suite of network monitor and control tools complements the GSFC and APL-developed DTN MP software, and the combined package can form the basis for flight operations using DTN.
Simple Automatic File Exchange (SAFE) to Support Low-Cost Spacecraft Operation via the Internet
NASA Technical Reports Server (NTRS)
Baker, Paul; Repaci, Max; Sames, David
1998-01-01
Various issues associated with Simple Automatic File Exchange (SAFE) are presented in viewgraph form. Specific topics include: 1) Packet telemetry, Internet IP networks and cost reduction; 2) Basic functions and technical features of SAFE; 3) Project goals, including low-cost satellite transmission to data centers to be distributed via an Internet; 4) Operations with a replicated file protocol; 5) File exchange operation; 6) Ground stations as gateways; 7) Lessons learned from demonstrations and tests with SAFE; and 8) Feedback and future initiatives.
Internet Usage by Low-Literacy Adults Seeking Health Information: An Observational Analysis
Birru, Mehret S; Monaco, Valerie M; Charles, Lonelyss; Drew, Hadiya; Njie, Valerie; Bierria, Timothy; Detlefsen, Ellen
2004-01-01
Background Adults with low literacy may encounter informational obstacles on the Internet when searching for health information, in part because most health Web sites require at least a high-school reading proficiency for optimal access. Objective The purpose of this study was to 1) determine how low-literacy adults independently access and evaluate health information on the Internet, 2) identify challenges and areas of proficiency in the Internet-searching skills of low-literacy adults. Methods Subjects (n=8) were enrolled in a reading assistance program at Bidwell Training Center in Pittsburgh, PA, and read at a 3rd to 8th grade level. Subjects conducted self-directed Internet searches for designated health topics while utilizing a think-aloud protocol. Subjects' keystrokes and comments were recorded using Camtasia Studio screen-capture software. The search terms used to find health information, the amount of time spent on each Web site, the number of Web sites accessed, the reading level of Web sites accessed, and the responses of subjects to questionnaires were assessed. Results Subjects collectively answered 8 out of 24 questions correctly. Seven out of 8 subjects selected "sponsored sites"-paid Web advertisements-over search engine-generated links when answering health questions. On average, subjects accessed health Web sites written at or above a 10th grade reading level. Standard methodologies used for measuring health literacy and for promoting subjects to verbalize responses to Web-site form and content had limited utility in this population. Conclusion This study demonstrates that Web health information requires a reading level that prohibits optimal access by some low-literacy adults. These results highlight the low-literacy adult population as a potential audience for Web health information, and indicate some areas of difficulty that these individuals face when using the Internet and health Web sites to find information on specific health topics. PMID:15471751
18 CFR 284.12 - Standards for pipeline business operations and communications.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Standards for pipeline business operations and communications. 284.12 Section 284.12 Conservation of Power and Water Resources..., private network connections using internet tools, internet directory services, and internet communication...
Citizen Explorer. 1; An Earth Observer With New Small Satellite Technology
NASA Technical Reports Server (NTRS)
Allen, Zachary; Dunn, Catherine E.
2003-01-01
Citizen Explorer-I (CX-I), designed and built by students at Colorado Space Grant Consortium in Boulder to provide global ozone monitoring, employs a unique mission architecture and several innovative technologies during its mission. The mission design allows K-12 schools around the world to be involved as ground stations available to receive science data and telemetry from CX-I. Another important technology allows the spacecraft to be less reliant on ground operators. Spacecraft Command Language (SCL) allows mission designers to set constraints on the satellite operations. The satellite then automatically adheres to the constraints when the satellite is out of contact with Mission Operations. In addition to SCL, a low level of artificial intelligence will be supplied to the spacecraft through the use of the Automated Scheduling and Planning ENvironment (ASPEN). ASPEN is used to maintain a spacecraft schedule in order to achieve the objectives a mission operator would normally have to complete. Within the communications system of CX-I, internet of CX-I, internet protocols are the main method for communicating with the satellite. As internet protocols have not been widely used in satellite communication, CX-I provides an opportunity to study the effectiveness of using internet protocols over radio links. The Attitude Determination and Control System (ADCS) on CX-I uses a gravity gradient boom as a means of orienting the satellite's science instruments toward nadir. The boom design is unique because it is constructed of tape measure material. These new technologies' effectiveness will be tested for use on future small satellite projects within the space satellite industry.
Martínez, Pablo; Rojas, Graciela; Martínez, Vania; Lara, María Asunción; Pérez, J Carola
2018-07-01
Internet-based interventions for depression may be a valuable resource to reduce the treatment gap for those living in developing countries. However, evidence comes mainly from developed countries. This systematic review summarized the evidence on preventive or therapeutic Internet-based interventions for depression for people who reside in developing countries. CINAHL, EMBASE, PubMed, SciELO Citation Indexes, the Journal of Medical Internet Research, and the Telemedicine and e-Health journal, were searched up to June 2017, to identify feasibility or effectiveness studies of preventive or therapeutic Internet-based interventions for depression, with or without human support. Studies included subjects residing in developing countries, and were published in English or Spanish. Study protocols were included. Risk of bias and/or quality of the reporting of the studies included was assessed. Five feasibility studies, aimed at the prevention of depression, and a study protocol were included in this systematic review. Reports came mostly from the Americas (n = 4). Internet-based interventions aimed at the prevention of depression presented low levels of human support, were useful and acceptable to their users, and require further design refinements to improve their use and retention. No gray literature was searched or included in this systematic review. Searches were limited to English and Spanish languages. Internet-based interventions aimed at the prevention of depression in people who reside in developing countries are in an early phase of development, limiting the generalizability of the results. Future studies must employ persuasive designs to improve user retention, incorporating larger samples and a control group to conclusively determine feasibility. Copyright © 2018 Elsevier B.V. All rights reserved.
A new Information publishing system Based on Internet of things
NASA Astrophysics Data System (ADS)
Zhu, Li; Ma, Guoguang
2018-03-01
A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.
NASA Astrophysics Data System (ADS)
Grothkopf, U.
Librarianship is currently undergoing major changes. New information sources, accessible via the "network of networks", the Internet, offer opportunities which were previously unknown, but which require continuous ongoing learning. The Internet seems to be organized badly or not at all. The poor appearance might lead to an underestimation of its value. In the following, an introduction to the main functions will be given in order to facilitate understanding and use of the Internet. E-Mail, FTP (File Transfer Protocol) and Telnet will be covered, as well as Mailing lists, Newsgroups and the tools Archie, Gopher, Veronica, WAIS (Wide Area Information Server) and the World Wide Web (WWW). Examples will be given to show possible applications for library services.
Ship-Shore Packet Switched Communications System.
1986-06-01
PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If applicable ) Naval Postgraduate School 54 Naval Postgraduate School 6c...OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable ) 8c ADDRESS (City, State, and ZIPCode) 10 SOURCE OF FUNDING...level acknowledgement system. 37 Network Protocol Application P re sen tation Session ____ ____ ____ ___Internet TranportProtocol Network
The ROI of VoIP: Everybody Says VoIP Saves Big Bucks. But Does It?
ERIC Educational Resources Information Center
Villano, Matt
2006-01-01
Advocates of Voice over Internet Protocol (VoIP) say it saves money on long distance calls by sending them over the Internet, improves communication by eliminating the Private Branch Exchange (PBX), and offers a host of neat features such as call forwarding, e-mail accessible voicemail, and more. When it comes to measuring the dollars-and-cents…
ERIC Educational Resources Information Center
Nah, Ki Chune
2011-01-01
Using the Internet through a mobile phone for learning English as a foreign language (EFL) listening skills has significant potential, and language learners in South Korea hold clearly positive attitudes towards using this. However, the barriers discouraging language learners from using the Internet for EFL listening have not yet been thoroughly…
Technology: Cookies, Web Profilers, Social Network Cartography, and Proxy Servers
ERIC Educational Resources Information Center
Van Horn, Royal
2004-01-01
The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…
Tera-node Network Technology (Task 3) Scalable Personal Telecommunications
2000-03-14
Simulation results of this work may be found in http://north.east.isi.edu/spt/ audio.html. 6. Internet Research Task Force Reliable Multicast...Adaptation, 4. Multimedia Proxy Caching, 5. Experiments with the Rate Adaptation Protocol (RAP) 6. Providing leadership and innovation to the Internet ... Research Task Force (IRTF) Reliable Multicast Research Group (RMRG) 1. End-to-end Architecture for Quality-adaptive Streaming Applications over the
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids
NASA Astrophysics Data System (ADS)
Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji
This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.
Improving management performance of P2PSIP for mobile sensing in wireless overlays.
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-11-08
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-01-01
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358
Zhu, Yanmei; Witt, Rachel E.; MacCallum, Julia K.; Jiang, Jack J.
2010-01-01
Objective In this study, a Voice over Internet Protocol (VoIP) communication based on G.729 protocol was simulated to determine the effects of this system on acoustic perturbation parameters of normal and pathological voice signals. Patients and Methods: Fifty recordings of normal voice and 48 recordings of pathological voice affected by laryngeal paralysis were transmitted through a VoIP communication system. The acoustic analysis programs of CSpeech and MDVP were used to determine the percent jitter and percent shimmer from the voice samples before and after VoIP transmission. The effects of three frequently used audio compression protocols (MP3, WMA, and FLAC) on the perturbation measures were also studied. Results It was found that VoIP transmission disrupts the waveform and increases the percent jitter and percent shimmer of voice samples. However, after VoIP transmission, significant discrimination between normal and pathological voices affected by laryngeal paralysis was still possible. It was found that the lossless compression method FLAC does not exert any influence on the perturbation measures. The lossy compression methods MP3 and WMA increase percent jitter and percent shimmer values. Conclusion This study validates the feasibility of these transmission and compression protocols in developing remote voice signal data collection and assessment systems. PMID:20588051
Security architecture for HL/7 message interchange.
Chen, T S; Liao, B S; Lin, M G; Gough, T G
2001-01-01
The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.
Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter
2013-01-01
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145
Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter
2013-05-17
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.
The Jade File System. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Rao, Herman Chung-Hwa
1991-01-01
File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.
Using the Internet for Surveys and Health Research
Eysenbach, Gunther; Wyatt, Jeremy
2002-01-01
This paper concerns the use of the Internet in the research process, from identifying research issues through qualitative research, through using the Web for surveys and clinical trials, to pre-publishing and publishing research results. Material published on the Internet may be a valuable resource for researchers desiring to understand people and the social and cultural contexts within which they live outside of experimental settings, with due emphasis on the interpretations, experiences, and views of `real world' people. Reviews of information posted by consumers on the Internet may help to identify health beliefs, common topics, motives, information, and emotional needs of patients, and point to areas where research is needed. The Internet can further be used for survey research. Internet-based surveys may be conducted by means of interactive interviews or by questionnaires designed for self-completion. Electronic one-to-one interviews can be conducted via e-mail or using chat rooms. Questionnaires can be administered by e-mail (e.g. using mailing lists), by posting to newsgroups, and on the Web using fill-in forms. In "open" web-based surveys, selection bias occurs due to the non-representative nature of the Internet population, and (more importantly) through self-selection of participants, i.e. the non-representative nature of respondents, also called the `volunteer effect'. A synopsis of important techniques and tips for implementing Web-based surveys is given. Ethical issues involved in any type of online research are discussed. Internet addresses for finding methods and protocols are provided. The Web is also being used to assist in the identification and conduction of clinical trials. For example, the web can be used by researchers doing a systematic review who are looking for unpublished trials. Finally, the web is used for two distinct types of electronic publication. Type 1 publication is unrefereed publication of protocols or work in progress (a `post-publication' peer review process may take place), whereas Type 2 publication is peer-reviewed and will ordinarily take place in online journals. PMID:12554560
NASA Astrophysics Data System (ADS)
Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.
2005-04-01
Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.
Research on Service Platform of Internet of Things for Smart City
NASA Astrophysics Data System (ADS)
Wang, W.; He, Z.; Huang, D.; Zhang, X.
2014-04-01
The application of Internet of Things in surveying and mapping industry basically is at the exploration stage, has not formed a unified standard. Chongqing Institute of Surveying and Mapping (CQISM) launched the research p roject "Research on the Technology of Internet of Things for Smart City". The project focuses on the key technologies of information transmission and exchange on the Internet of Things platform. The data standards of Internet of Things are designed. The real-time acquisition, mass storage and distributed data service of mass sensors are realized. On this basis, CQISM deploys the prototype platform of Internet of Things. The simulation application in Connected Car proves that the platform design is scientific and practical.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Communication techniques and challenges for wireless food quality monitoring
Jedermann, Reiner; Pötsch, Thomas; Lloyd, Chanaka
2014-01-01
Remote measurement of product core temperature is an important prerequisite to improve the cool chain of food products and reduce losses. This paper examines and shows possible solutions to technical challenges that still hinder practical applications of wireless sensor networks in the field of food transport supervision. The high signal attenuation by water-containing products limits the communication range to less than 0.5 m for the commonly used 2.4 GHz radio chips. By theoretical analysis of the dependency of signal attenuation on the operating frequency, we show that the signal attenuation can be largely reduced by the use of 433 MHz or 866 MHz devices, but forwarding of messages over multiple hops inside a sensor network is mostly unavoidable to guarantee full coverage of a packed container. Communication protocols have to provide compatibility with widely accepted standards for integration into the global Internet, which has been achieved by programming an implementation of the constrained application protocol for wireless sensor nodes and integrating into IPv6-based networks. The sensor's battery lifetime can be extended by optimizing communication protocols and by in-network pre-processing of the sensor data. The feasibility of remote freight supervision was demonstrated by our full-scale ‘Intelligent Container’ prototype. PMID:24797133
Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade
NASA Astrophysics Data System (ADS)
Graça, S.; Santos, J.; Manso, M. E.
2004-10-01
The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.
Communication techniques and challenges for wireless food quality monitoring.
Jedermann, Reiner; Pötsch, Thomas; Lloyd, Chanaka
2014-06-13
Remote measurement of product core temperature is an important prerequisite to improve the cool chain of food products and reduce losses. This paper examines and shows possible solutions to technical challenges that still hinder practical applications of wireless sensor networks in the field of food transport supervision. The high signal attenuation by water-containing products limits the communication range to less than 0.5 m for the commonly used 2.4 GHz radio chips. By theoretical analysis of the dependency of signal attenuation on the operating frequency, we show that the signal attenuation can be largely reduced by the use of 433 MHz or 866 MHz devices, but forwarding of messages over multiple hops inside a sensor network is mostly unavoidable to guarantee full coverage of a packed container. Communication protocols have to provide compatibility with widely accepted standards for integration into the global Internet, which has been achieved by programming an implementation of the constrained application protocol for wireless sensor nodes and integrating into IPv6-based networks. The sensor's battery lifetime can be extended by optimizing communication protocols and by in-network pre-processing of the sensor data. The feasibility of remote freight supervision was demonstrated by our full-scale 'Intelligent Container' prototype.
Pallen, M
1995-11-25
The benefits to medical practitioners of using the Internet are growing rapidly as the Internet becomes easier to use and ever more biomedical resources become available on line. The Internet is the largest computer network in the world; it is also a virtual community, larger than many nation states, with its own rules of behaviour or "netiquette." There are several types of Internet connection and various ways of acquiring a connection. Once connected, you can obtain, free of charge, programs that allow easy use of the Internet's resources and help on how to use these resources; you can access many of these resources through the hypertext references in the on line version of this series (go to http:@www.bmj.com/bmj/ to reach the electronic version). You can then explore the various methods for accessing, manipulating, or disseminating data on the Internet, such as electronic mail, telnet, file transfer protocol, and the world wide web. Results from a search of the world wide web for information on the rare condition of Recklinghausen's neurofibromatosis illustrate the breadth of medical information available on the Internet.
CTC Sentinel. Volume 2, Issue 4, April 2009. Defining the Punjabi Taliban Network
2009-04-01
Province (which has better educational facilities) and urban linkages where internet access and communications equipment are more readily available...calls by using Voice over Internet Protocol (VoIP) technology. sending an e-mail from Afghanistan explaining why he was fighting jihad.49 One of...ascendancy to power and collaborative approach represents to al-Qa`ida’s legitimacy. President Bush’s controversial policies and public persona
Young, Kimberly S; Brand, Matthias
2017-01-01
Although, it is not yet officially recognized as a clinical entity which is diagnosable, Internet Gaming Disorder (IGD) has been included in section III for further study in the DSM-5 by the American Psychiatric Association (APA, 2013). This is important because there is increasing evidence that people of all ages, in particular teens and young adults, are facing very real and sometimes very severe consequences in daily life resulting from an addictive use of online games. This article summarizes general aspects of IGD including diagnostic criteria and arguments for the classification as an addictive disorder including evidence from neurobiological studies. Based on previous theoretical considerations and empirical findings, this paper examines the use of one recently proposed model, the Interaction of Person-Affect-Cognition-Execution (I-PACE) model, for inspiring future research and for developing new treatment protocols for IGD. The I-PACE model is a theoretical framework that explains symptoms of Internet addiction by looking at interactions between predisposing factors, moderators, and mediators in combination with reduced executive functioning and diminished decision making. Finally, the paper discusses how current treatment protocols focusing on Cognitive-Behavioral Therapy for Internet addiction (CBT-IA) fit with the processes hypothesized in the I-PACE model.
Young, Kimberly S.; Brand, Matthias
2017-01-01
Although, it is not yet officially recognized as a clinical entity which is diagnosable, Internet Gaming Disorder (IGD) has been included in section III for further study in the DSM-5 by the American Psychiatric Association (APA, 2013). This is important because there is increasing evidence that people of all ages, in particular teens and young adults, are facing very real and sometimes very severe consequences in daily life resulting from an addictive use of online games. This article summarizes general aspects of IGD including diagnostic criteria and arguments for the classification as an addictive disorder including evidence from neurobiological studies. Based on previous theoretical considerations and empirical findings, this paper examines the use of one recently proposed model, the Interaction of Person-Affect-Cognition-Execution (I-PACE) model, for inspiring future research and for developing new treatment protocols for IGD. The I-PACE model is a theoretical framework that explains symptoms of Internet addiction by looking at interactions between predisposing factors, moderators, and mediators in combination with reduced executive functioning and diminished decision making. Finally, the paper discusses how current treatment protocols focusing on Cognitive-Behavioral Therapy for Internet addiction (CBT-IA) fit with the processes hypothesized in the I-PACE model. PMID:29104555
NSI customer service representatives and user support office: NASA Science Internet
NASA Technical Reports Server (NTRS)
1991-01-01
The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Implementing Internet of Things in a military command and control environment
NASA Astrophysics Data System (ADS)
Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter
2017-05-01
While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.
Application of Mobile Router to Military Communications
NASA Technical Reports Server (NTRS)
Stewart, David H.; Ivancic, William D.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent
2002-01-01
Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile-router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile-router is software code that resides in a network router. A Mobile-Router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both the government and commercial sectors. This technology will be applied to the wireless battlefield. NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is the enabling technology for communication via the Internet or Intranets to aircraft. Information such as weather, air traffic control, voice and video can be easily and inexpensively transmitted to the aircraft using Internet protocols. The mobile router can be incorporated into emergency vehicles particularly ambulances and life-flight aircraft to provide real-time connectivity back to the hospital and healthcare experts. Commercial applications include entertainment services, IP telephone, and Internet connectivity for cruise ships, commercial shipping, tour busses, aircraft, and eventually cars. This paper will briefly describe the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications will be described. The paper will also highlight military and government networks that will benefit from the deployment of mobile router and the associated applications.
Frierson, Georita M; Morrow, James R; Vidales, Andrew
2012-01-01
Researchers studying physical activity often face challenges dealing with recruitment and resources, particularly when conducting longitudinal Internet-based research. Commonly raised methodological problems such as minority recruitment, participant commitment, and participant-staff involvement are addressed through a theoretically driven recruitment and adherence protocol in The Women's Exercise Injuries: Incidence and Risk Factors (WIN) Internet-based study. The objectives of this paper were to review and suggest solutions to problems of: (1) low recruitment of diverse samples, (2) low adherence, and (3) staffing needs. We recruited 1303 community-dwelling women and followed them through a multiple-phase, longitudinal, Internet-based study. Recruitment and adherence data were analyzed through descriptive methods and logistic regressions to examine participant adherence and sociodemographic factors and predictors of who entered the long-term phase of the study. We successfully retained 71.6% of the sample through 4 recruitment phases. Twenty-seven percent of the initially recruited sample was racial/ethnically diverse, 24% began the long-term phase, and 23% completed. Several strategies to enhance participant commitment were successfully used during the practice phase, providing a successful, low staff to participant ratio. Logistic regression indicated being married, being older, and having greater Internet skills were predictive of successfully entering the long-term phase of the study. Recruitment and compliance protocols were successful in meeting overall and racial/ethnic enrollment and recruitment goals. The theoretically based practice phase techniques were successful in re-engaging noncompliant participants. Strategies for minority enrollment and compliance are evaluated.
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
Tsoukalas, Lefteri
2018-01-24
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.
Protocol for Communication Networking for Formation Flying
NASA Technical Reports Server (NTRS)
Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren
2009-01-01
An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.
Hardware platform for multiple mobile robots
NASA Astrophysics Data System (ADS)
Parzhuber, Otto; Dolinsky, D.
2004-12-01
This work is concerned with software and communications architectures that might facilitate the operation of several mobile robots. The vehicles should be remotely piloted or tele-operated via a wireless link between the operator and the vehicles. The wireless link will carry control commands from the operator to the vehicle, telemetry data from the vehicle back to the operator and frequently also a real-time video stream from an on board camera. For autonomous driving the link will carry commands and data between the vehicles. For this purpose we have developed a hardware platform which consists of a powerful microprocessor, different sensors, stereo- camera and Wireless Local Area Network (WLAN) for communication. The adoption of IEEE802.11 standard for the physical and access layer protocols allow a straightforward integration with the internet protocols TCP/IP. For the inspection of the environment the robots are equipped with a wide variety of sensors like ultrasonic, infrared proximity sensors and a small inertial measurement unit. Stereo cameras give the feasibility of the detection of obstacles, measurement of distance and creation of a map of the room.
Code of Federal Regulations, 2011 CFR
2011-10-01
... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...
Code of Federal Regulations, 2010 CFR
2010-10-01
... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...
NASA Astrophysics Data System (ADS)
da Silva Junior, Evert Pereira; Esteves, Guilherme Pompeu; Dames, Karla Kristine; Melo, Pedro Lopes de
2011-01-01
Changes in thoracoabdominal motion are highly prevalent in patients with chronic respiratory diseases. Home care services that use telemedicine techniques and Internet-based monitoring have the potential to improve the management of these patients. However, there is no detailed description in the literature of a system for Internet-based monitoring of patients with disturbed thoracoabdominal motion. The purpose of this work was to describe the development of a new telemedicine instrument for Internet-based home monitoring of thoracoabdominal movement. The instrument directly measures changes in the thorax and abdomen circumferences and transfers data through a transmission control protocol/Internet protocol connection. After the design details are described, the accuracy of the electronic and software processing units of the instrument is evaluated by using electronic signals simulating normal subjects and individuals with thoracoabdominal motion disorders. The results obtained during in vivo studies on normal subjects simulating thoracoabdominal motion disorders showed that this new system is able to detect a reduction in abdominal movement that is associated with abnormal thoracic breathing (p < 0.0001) and the reduction in thoracic movement during abnormal abdominal breathing (p < 0.005). Simulated asynchrony in thoracoabdominal motion was also adequately detected by the system (p < 0.0001). The experimental results obtained for patients with respiratory diseases were in close agreement with the expected values, providing evidence that this instrument can be a useful tool for the evaluation of thoracoabdominal motion. The Internet transmission tests showed that the acquisition and analysis of the thoracoabdominal motion signals can be performed remotely. The user can also receive medical recommendations. The proposed system can be used in a spectrum of telemedicine scenarios, which can reduce the costs of assistance offered to patients with respiratory diseases.
Cyberspace modernization. An interest protocol planning advisory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.; McLane, Victor N.
A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less
Quantum internet: the certifiable road ahead
NASA Astrophysics Data System (ADS)
Elkouss, David; Lipinska, Victoria; Goodenough, Kenneth; Rozpedek, Filip; Kalb, Norbert; van Dam, Suzanne; Le Phuc, Thinh; Murta, Glaucia; Humphreys, Peter; Taminiau, Tim; Hanson, Ronald; Wehner, Stephanie
A future quantum internet enables quantum communication between any two points on earth in order to solve problems which are provably impossible using classical communication. The most well-known application of quantum communication is quantum key distribution, which allows two users to establish an encryption key. However, many other applications are known ranging from protocols for clock synchronization, extending the baselines of telescopes to exponential savings in communication. Due to recent technological progress, we are now on the verge of seeing the first small-scale quantum communication networks being realized. Here, we present a roadmap towards the ultimate form of a quantum internet. Specifically, we identify stages of development that are distinguished by an ever increasing amount of functionality. Each stage supports a certain class of quantum protocols and is interesting in its own right. What's more, we propose a series of simple tests to certify that an experimental implementation has achieved a certain stage. Jointly, the stages and the certification tests will allow us to track and benchmark experimental progress in the years to come. This work is supported by STW, NWO VIDI and ERC Starting Grant.
Extent, accuracy, and credibility of breastfeeding information on the Internet.
Shaikh, Ulfat; Scott, Barbara J
2005-05-01
Our objective was to test and describe a model for evaluating Websites related to breastfeeding. Forty Websites most likely to be accessed by the public were evaluated for extent, accuracy, credibility, presentation, ease of use, and adherence to ethical and medical Internet publishing standards. Extent and accuracy of Website content were determined by a checklist of critical information. The majority of Websites reviewed provided accurate information and complied with the International Code of Marketing of Breast-milk Substitutes. Approximately half the Websites complied with standards of medical Internet publishing. While much information on breastfeeding on the Internet is accurate, there is wide variability in the extent of information, usability of Websites, and compliance with standards of medical Internet publishing. Results of this study may be helpful to health care professionals as a model for evaluating breastfeeding-related Websites and to highlight considerations when recommending or designing Websites.
Intelligent device management in the selfcare marketplace.
Biniaris, Christos G; Marsh, Andrew J
2008-01-01
Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.
Privacy Analysis of the Internet Protocol
2002-12-01
mixing approach first proposed for e-mail by David Chaum [Cha81]. The Onion Routing system maintains a set of mixing centers called onion routers...IEEE Computer, vol. 33, no. 5, pp. 59-67, May, 2000. 5. [Cha81] Chaum , D., Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms...the Internet,” Proceedings of IEEE COMPCON, 1997. 11. [Gol99] Goldschlag, David M., Reed, Michael G., and Syverson, Paul F., “Onion Routing for
A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks
2010-08-01
since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and
Laplante-Lévesque, Ariane; Abrams, Harvey; Bülow, Maja; Lunner, Thomas; Nelson, John; Riis, Søren Kamaric; Vanpoucke, Filiep
2016-10-01
This article describes the perspectives of hearing device manufacturers regarding the exciting developments that the Internet makes possible. Specifically, it proposes to join forces toward interoperability and standardization of Internet and audiology. A summary of why such a collaborative effort is required is provided from historical and scientific perspectives. A roadmap toward interoperability and standardization is proposed. Information and communication technologies improve the flow of health care data and pave the way to better health care. However, hearing-related products, features, and services are notoriously heterogeneous and incompatible with other health care systems (no interoperability). Standardization is the process of developing and implementing technical standards (e.g., Noah hearing database). All parties involved in interoperability and standardization realize mutual gains by making mutually consistent decisions. De jure (officially endorsed) standards can be developed in collaboration with large national health care systems as well as spokespeople for hearing care professionals and hearing device users. The roadmap covers mutual collaboration; data privacy, security, and ownership; compliance with current regulations; scalability and modularity; and the scope of interoperability and standards. We propose to join forces to pave the way to the interoperable Internet and audiology products, features, and services that the world needs.
Active Computer Network Defense: An Assessment
2001-04-01
sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center
Rethinking Traffic Management: Design of Optimizable Networks
2008-06-01
Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated
Design and research on the platform of network manufacture product electronic trading
NASA Astrophysics Data System (ADS)
Zhou, Zude; Liu, Quan; Jiang, Xuemei
2003-09-01
With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.
GMPLS-based control plane for optical networks: early implementation experience
NASA Astrophysics Data System (ADS)
Liu, Hang; Pendarakis, Dimitrios; Komaee, Nooshin; Saha, Debanjan
2002-07-01
Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS signaling and Internet routing protocols to provide a scalable, interoperable, distributed control plane, which is applicable to multiple network technologies such as optical cross connects (OXCs), photonic switches, IP routers, ATM switches, SONET and DWDM systems. It is intended to facilitate automatic service provisioning and dynamic neighbor and topology discovery across multi-vendor intelligent transport networks, as well as their clients. Efforts to standardize such a distributed common control plane have reached various stages in several bodies such as the IETF, ITU and OIF. This paper describes the design considerations and architecture of a GMPLS-based control plane that we have prototyped for core optical networks. Functional components of GMPLS signaling and routing are integrated in this architecture with an application layer controller module. Various requirements including bandwidth, network protection and survivability, traffic engineering, optimal utilization of network resources, and etc. are taken into consideration during path computation and provisioning. Initial experiments with our prototype demonstrate the feasibility and main benefits of GMPLS as a distributed control plane for core optical networks. In addition to such feasibility results, actual adoption and deployment of GMPLS as a common control plane for intelligent transport networks will depend on the successful completion of relevant standardization activities, extensive interoperability testing as well as the strengthening of appropriate business drivers.
Visualizing Internet routing changes.
Lad, Mohit; Massey, Dan; Zhang, Lixia
2006-01-01
Today's Internet provides a global data delivery service to millions of end users and routing protocols play a critical role in this service. It is important to be able to identify and diagnose any problems occurring in Internet routing. However, the Internet's sheer size makes this task difficult. One cannot easily extract out the most important or relevant routing information from the large amounts of data collected from multiple routers. To tackle this problem, we have developed Link-Rank, a tool to visualize Internet routing changes at the global scale. Link-Rank weighs links in a topological graph by the number of routes carried over each link and visually captures changes in link weights in the form of a topological graph with adjustable size. Using Link-Rank, network operators can easily observe important routing changes from massive amounts of routing data, discover otherwise unnoticed routing problems, understand the impact of topological events, and infer root causes of observed routing changes.
Fallon, L Fleming; Schmalzried, Hans D; Hasan, Nausheen
2011-01-01
Of the 2790 local health departments (LHDs) in the United States, Internet homepages were located for 1986. We reviewed each homepage to document the presence of 9 elements deemed to be critical for effective communications during emergency or disaster situations. LHD Web site homepages had a mean of 4.1 (±1.4) elements. Among the findings, this review revealed that 4 of 5 (80.5%) of the LHDs included the agency phone number, half (49.4%) provided links to emergency information, and about 1 in 5 (19.6%) listed an agency e-mail address. Fewer than 1 in 20 (4.3%) of the LHD homepages reviewed allowed visitors to sign up for automatic alerts or notifications. We suggest that these results be used as a starting point in developing a standardized template containing the 9 homepage elements. Such a template complements National Incident Management System protocols and can provide a recognizable source of consistent and reliable information for people during a public health emergency or disaster.
[Automated anesthesia record systems].
Heinrichs, W; Mönk, S; Eberle, B
1997-07-01
The introduction of electronic anaesthesia documentation systems was attempted as early as in 1979, although their efficient application has become reality only in the past few years. The advantages of the electronic protocol are apparent: Continuous high quality documentation, comparability of data due to the availability of a data bank, reduction in the workload of the anaesthetist and availability of additional data. Disadvantages of the electronic protocol have also been discussed in the literature. By going through the process of entering data on the course of the anaesthetic procedure on the protocol sheet, the information is mentally absorbed and evaluated by the anaesthetist. This information may, however, be lost when the data are recorded fully automatically-without active involvement on the part of the anaesthetist. Recent publications state that by using intelligent alarms and/or integrated displays manual record keeping is no longer necessary for anaesthesia vigilance. The technical design of automated anaesthesia records depends on an integration of network technology into the hospital. It will be appropriate to connect the systems to the internet, but safety requirements have to be followed strictly. Concerning the database, client server architecture as well as language standards like SQL should be used. Object oriented databases will be available in the near future. Another future goal of automated anaesthesia record systems will be using knowledge based technologies within these systems. Drug interactions, disease related anaesthetic techniques and other information sources can be integrated. At this time, almost none of the commercially available systems has matured to a point where their purchase can be recommended without reservation. There is still a lack of standards for the subsequent exchange of data and a solution to a number of ergonomic problems still remains to be found. Nevertheless, electronic anaesthesia protocols will be required in the near future. The advantages of accurate documentation and quality control in the presence of careful planning outweight cost considerations by far.
Kommoss, S; Kommoss, F; Diebold, J; Lax, S; Schmidt, D; Staebler, A; du Bois, A; Pfisterer, J
2017-01-01
The current literature indicates that a considerable number of patients in ovarian carcinoma clinical trials have histopathological diagnoses in conflict with inclusion criteria. It has been suggested that specialised pathology review prior to randomisation should become the standard procedure in study protocols. We hypothesised that our new, internet-based high-throughput infrastructure would be capable of providing specialised pathology review within 10 working days (w.d.). Patients scheduled for the AGO OVAR17 ovarian carcinoma chemotherapy trial were registered for expert pathologic case review using a new internet-based central pathology review platform prior to randomisation. All original slides were requested from local pathologists. Slides were scanned and uploaded to a secured internet server. A network of experienced gynaecological pathologists was connected to the server through a custom-designed software platform. If deemed necessary by the expert pathologists, immunohistochemistry was available through a collaborating pathology lab. A total of 880 patients with an original diagnosis of ovarian epithelial carcinoma were registered for expert pathology review from October 2011 to July 2013. For case review, five gynaecopathologists from Austria, Switzerland and Germany were available online. Median number of w.d. required to complete the whole process from patient registration to transmission of final review diagnoses was 4 (range 2-31) (w.d.), and in 848 out of 880 (97.5%) cases, it amounted to ⩽10 w.d. In 2.5% (n=22) of cases, a major diagnostic discrepancy of potential clinical relevance was found leading to exclusion from the chemotherapy trial. Our results show that the use of a new internet-based infrastructure makes timely specialised case review, prior to patient randomisation feasible within ⩽10 w.d. Our new approach helped to protect against overtreatment with chemotherapy of patients with ovarian borderline tumours and inadequate treatment of patients with ovarian metastases, as a result of their inappropriate entry into a clinical trial designed for patients with primary ovarian carcinoma.
47 CFR 52.35 - Porting Intervals.
Code of Federal Regulations, 2014 CFR
2014-10-01
... “telecommunications carrier” includes an interconnected Voice over Internet Protocol (VoIP) provider as that term in... ports” includes (i) Wireline-to-wireless ports; (ii) Wireless-to-wireline ports; and (iii) Ports...
Network Upgrade for the SLC: Control System Modifications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crane, M.; Mackenzie, R.; Sass, R.
2011-09-09
Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.
The covert channel over HTTP protocol
NASA Astrophysics Data System (ADS)
Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof
2016-09-01
The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.
Earth sensing: from ice to the Internet of Things
NASA Astrophysics Data System (ADS)
Martinez, K.
2017-12-01
The evolution of technology has led to improvements in our ability to use sensors for earth science research. Radio communications have improved in terms of range and power use. Miniaturisation means we now use 32 bit processors with embedded memory, storage and interfaces. Sensor technology makes it simpler to integrate devices such as accelerometers, compasses, gas and biosensors. Programming languages have developed so that it has become easier to create software for these systems. This combined with the power of the processors has made research into advanced algorithms and communications feasible. The term environmental sensor networks describes these advanced systems which are designed specifically to take sensor measurements in the natural environment. Through a decade of research into sensor networks, deployed mainly in glaciers, many areas of this still emerging technology have been explored. From deploying the first subglacial sensor probes with custom electronics and protocols we learnt tuning to harsh environments and energy management. More recently installing sensor systems in the mountains of Scotland has shown that standards have allowed complete internet and web integration. This talk will discuss the technologies used in a range of recent deployments in Scotland and Iceland focussed on creating new data streams for cryospheric and climate change research.
Securing internet by eliminating DDOS attacks
NASA Astrophysics Data System (ADS)
Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.
2017-11-01
The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsoukalas, Lefteri
2009-04-29
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less
NASA Astrophysics Data System (ADS)
Simonis, Ingo
2015-04-01
Transport infrastructure monitoring and analysis is one of the focus areas in the context of smart cities. With the growing number of people moving into densely populated urban metro areas, precise tracking of moving people and goods is the basis for profound decision-making and future planning. With the goal of defining optimal extensions and modifications to existing transport infrastructures, multi-modal transport has to be monitored and analysed. This process is performed on the basis of sensor networks that combine a variety of sensor models, types, and deployments within the area of interest. Multi-generation networks, consisting of a number of sensor types and versions, are causing further challenges for the integration and processing of sensor observations. These challenges are not getting any smaller with the development of the Internet of Things, which brings promising opportunities, but is currently stuck in a type of protocol war between big industry players from both the hardware and network infrastructure domain. In this paper, we will highlight how the OGC suite of standards, with the Sensor Web standards developed by the Sensor Web Enablement Initiative together with the latest developments by the Sensor Web for Internet of Things community can be applied to the monitoring and improvement of transport infrastructures. Sensor Web standards have been applied in the past to pure technical domains, but need to be broadened now in order to meet new challenges. Only cross domain approaches will allow to develop satisfying transport infrastructure approaches that take into account requirements coming form a variety of sectors such as tourism, administration, transport industry, emergency services, or private people. The goal is the development of interoperable components that can be easily integrated within data infrastructures and follow well defined information models to allow robust processing.
Intelligent Mobile Technologies
NASA Technical Reports Server (NTRS)
Alena, Rick; Gilbaugh, Bruce; Glass, Brian; Swanson, Keith (Technical Monitor)
2000-01-01
Testing involves commercial radio equipment approved for export and use in Canada. Testing was conducted in the Canadian High Arctic, where hilly terrain provided the worst-case testing. SFU and Canadian governmental agencies made significant technical contributions. The only technical data related to radio testing was exchanged with SFU. Test protocols are standard radio tests performed by communication technicians worldwide. The Joint Fields Operations objectives included the following: (1) to provide Internet communications services for field science work and mobile exploration systems; (2) to evaluate the range and throughput of three different medium-range radio link technologies for providing coverage of the crater area; and (3) to demonstrate collaborative software such as NetMeeting with multi-point video for exchange of scientific information between remote node and base-base camp and science centers as part of communications testing.
Fast Entanglement Establishment via Local Dynamics for Quantum Repeater Networks
NASA Astrophysics Data System (ADS)
Gyongyosi, Laszlo; Imre, Sandor
Quantum entanglement is a necessity for future quantum communication networks, quantum internet, and long-distance quantum key distribution. The current approaches of entanglement distribution require high-delay entanglement transmission, entanglement swapping to extend the range of entanglement, high-cost entanglement purification, and long-lived quantum memories. We introduce a fundamental protocol for establishing entanglement in quantum communication networks. The proposed scheme does not require entanglement transmission between the nodes, high-cost entanglement swapping, entanglement purification, or long-lived quantum memories. The protocol reliably establishes a maximally entangled system between the remote nodes via dynamics generated by local Hamiltonians. The method eliminates the main drawbacks of current schemes allowing fast entanglement establishment with a minimized delay. Our solution provides a fundamental method for future long-distance quantum key distribution, quantum repeater networks, quantum internet, and quantum-networking protocols. This work was partially supported by the GOP-1.1.1-11-2012-0092 project sponsored by the EU and European Structural Fund, by the Hungarian Scientific Research Fund - OTKA K-112125, and by the COST Action MP1006.
The SHIP: A SIP to HTTP Interaction Protocol
NASA Astrophysics Data System (ADS)
Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco
IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.
Bylund, Carma L; Sperka, Miryam; D'Agostino, Thomas A
2015-04-01
Cancer patients and their caregivers often turn to the internet for information and support following a cancer diagnosis. Research shows a need for improvement in doctors' communication with patients about internet information. The purpose of this formative assessment was to evaluate oncology trainees' skills in talking about internet information with cancer patients. Thirty-nine oncology trainees were evaluated in a baseline standardized patient assessment as part of their participation in the Comskil Training Program. As part of the assessment, standardized patients were instructed to raise the topic of internet information they had read. Transcriptions of the video-recorded assessments were coded for patient statements and trainee responses. Fifty-six percent of trainees used a probe to get more information before addressing the content of the internet search, while 18% addressed it immediately. Eighteen percent of trainees warned the patient about using the internet, and 8% warned about and also encouraged internet use. Thirteen percent of trainees praised the patient for seeking out information on the internet. This formative assessment indicated that the majority of trainees addressed the content of the internet search, while a minority addressed the internet as a tool and praised patients' efforts. Research in this area should examine the effectiveness of educational interventions for trainees to improve discussions about internet information.
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
2008-01-29
Crime and the Internet, December 2006, [http://www.sigma.com.pl/pliki/ albums /userpics/10007/Virtual_Criminology_Report_ 2006.pdf]. 22 Gnutella emerged...as the first fully decentralized peer-to-peer protocol in 2000, and was used on the Internet to share and swap music files in MP3 compression format...The music industry was often frustrated in their efforts to counter this peer-to-peer technology because it could not identify a main controlling
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
2007-11-15
Organized Crime and the Internet, December 2006, [http://www.sigma.com.pl/pliki/ albums /userpics/10007/Virtual_Criminology_Report_ 2006.pdf]. 22 Gnutella...emerged as the first fully decentralized peer-to-peer protocol in 2000, and was used on the Internet to share and swap music files in MP3 compression...format. The music industry was often frustrated in their efforts to counter this peer-to-peer technology because it could not identify a main
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Browsing the World Wide Web from behind a firewall
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simons, R.W.
1995-02-01
The World Wide Web provides a unified method of access to various information services on the Internet via a variety of protocols. Mosaic and other browsers give users a graphical interface to the Web that is easier to use and more visually pleasing than any other common Internet information service today. The availability of information via the Web and the number of users accessing it have both grown rapidly in the last year. The interest and investment of commercial firms in this technology suggest that in the near future, access to the Web may become as necessary to doing businessmore » as a telephone. This is problematical for organizations that use firewalls to protect their internal networks from the Internet. Allowing all the protocols and types of information found in the Web to pass their firewall will certainly increase the risk of attack by hackers on the Internet. But not allowing access to the Web could be even more dangerous, as frustrated users of the internal network are either unable to do their jobs, or find creative new ways to get around the firewall. The solution to this dilemma adopted at Sandia National Laboratories is described. Discussion also covers risks of accessing the Web, design alternatives considered, and trade-offs used to find the proper balance between access and protection.« less
Deployment of 802.15.4 Sensor Networks for C4ISR Operations
2006-06-01
43 Figure 20.MSP410CA Dense Grid Monitoring (Crossbow User’s Manual, 2005). ....................................44 Figure 21.(a)MICA2 without...Deployment of Sensor Grid (COASTS OPORD, 2006). ...56 Figure 27.Topology View of Two Nodes and Base Station .......57 Figure 28.Nodes Employing Multi...Random Access Memory TCP/IP Transmission Control Protocol/Internet Protocol TinyOS Tiny Micro Threading Operating System UARTs Universal
Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service
2007-12-07
MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status
Internet-Based Cervical Cytology Screening Program
2005-04-01
and Second Trials of Each Pathologist. * Reference diagnostic category: NEG, ASCUS , LSIL > HSIL Pathologist 1 Interpretation. Negative or LSIL 24 (22...Principal Investigator: David C. Wdlbbur, M.D. Description of Subject Population: Women above the age of l18 years having Pap tests performe PURPOSE We...Subject Population: Women above the age of 18 years having Pay tests performed IRB Protocol Number: 2003P-001658 Sponsor Protocol Number: n/a Consent Form
Performance analysis for wireless networks: an analytical approach by multifarious Sym Teredo.
Punithavathani, D Shalini; Radley, Sheryl
2014-01-01
IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol.
Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo
Punithavathani, D. Shalini; Radley, Sheryl
2014-01-01
IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol. PMID:25506611
The NIST Internet time service
NASA Astrophysics Data System (ADS)
Levine, Judah
1994-05-01
We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.
The NIST Internet time service
NASA Technical Reports Server (NTRS)
Levine, Judah
1994-01-01
We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.
Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng
2013-01-01
To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.
#FoundThem-21st Century pre-search and post-detection seti protocols for social and digital media
NASA Astrophysics Data System (ADS)
Forgan, Duncan; Scholz, Alexander
2016-09-01
The transmission of news stories in global culture has changed fundamentally in the last three decades. The general public are alerted to breaking stories on increasingly rapid timescales, and the discussion/distortion of facts by writers, bloggers, commenters and Internet users can also be extremely fast. The narrative of a news item no longer belongs to a small cadre of conventional media outlets, but is instead synthesised to some level by the public as they select where and how they consume news. The IAA Search for Extraterrestrial Intelligence (SETI) post-detection protocols, initially drafted in 1989 and updated in 2010, were written to guide SETI scientists in the event of detecting evidence of extraterrestrial intelligence, but do not give guidance as to how scientists should prepare to navigate this media maelstrom. The protocols assume communication channels between scientists and the public still resemble those of 1989, which were specifically one-way with a narrative controlled by a select few media outlets. Modern SETI researchers must consider this modern paradigm for consumption of news by the public, using social media and other non-traditional outlets, when planning and executing searches for extraterrestrial intelligence. We propose additions to the post detection protocols as they pertain to the use of the Internet and social media, as well as pre-search protocols. It is our belief that such protocols are necessary if there is to be a well-informed, sane global conversation amongst the world's citizens following the discovery of intelligent life beyond the Earth.
Della Mea, V; Beltrami, C A
2000-01-01
The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.
Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S
2004-01-01
Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471
Lindenberg, Katajun; Halasy, Katharina; Schoenmaekers, Sophie
2017-06-01
The reduction of prevalence rates of Internet Use Disorder (IUD) and its effective treatment are at high priority in both public health and educational policies. School-based preventive interventions facilitate a low-threshold approach for individuals with IUD, who are typically characterized by high therapy avoidance. Moreover, indicated approaches which target adolescents at high-risk show larger effects than universal prevention programs. Simultaneously, they reduce unnecessary burden for the majority of high-school students that is not at-risk. The PROTECT group intervention for indicated prevention of IUD in school settings was developed based on these preventive strategies. Three-hundred and forty adolescents, aged 12-18 years, from 40 secondary schools in Germany, screened for high-risk of IUD onset, are randomly assigned to a) PROTECT preventive intervention group or b) assessment only control group. The tested intervention consists of a cognitive-behavioral 4-session brief-protocol. Follow-up assessments are at 1, 4 and 12 months after admission. Primary outcome is the 12-months incidence rate of IUD. Secondary outcomes are the reduction of IUD and comorbid symptoms as well as the promotion of problem solving, cognitive restructuring and emotion regulation skills. The indicated preventive intervention PROTECT follows the APA-guidelines for psychological prevention, i.e., it is theory- and evidence-based and addresses both risk-reduction and strength-promotion, it considers current research and epidemiology and ethical standards such as professional secrecy and is designed as a systemic intervention at the school-level. It is expected that the intervention decreases risk of IUD onset (incidence rate). ClinicalTrials.gov: NCT02907658.
Reid, Graham J; Hall, Wendy A; Godbout, Roger; Stremler, Robyn; Weiss, Shelly K; Gruber, Reut; Witmans, Manisha; Chambers, Christine T; Begum, Esmot Ara; Andreou, Pantelis; Rigney, Gabrielle
2018-01-01
Background Up to 25% of 1- to 10-year-old children experience insomnia (ie, resisting bedtime, trouble falling asleep, night awakenings, and waking too early in the morning). Insomnia can be associated with excessive daytime sleepiness and negative effects on daytime functioning across multiple domains (eg, behavior, mood, attention, and learning). Despite robust evidence supporting the effectiveness of behavioral treatments for insomnia in children, very few children with insomnia receive these treatments, primarily due to a shortage of available treatment resources. Objective The Better Nights, Better Days (BNBD) internet-based program provides a readily accessible electronic health (eHealth) intervention to support parents in providing evidence-based care for insomnia in typically developing children. The purpose of the randomized controlled trial (RCT) is to evaluate the effectiveness of BNBD in treating insomnia in children aged between 1 and 10 years. Methods BNBD is a fully automated program, developed based on evidence-based interventions previously tested by the investigators, as well as on the extant literature on this topic. We describe the 2-arm RCT in which participants (500 primary caregivers of children with insomnia residing in Canada) are assigned to intervention or usual care. Results The effects of this behavioral sleep eHealth intervention will be assessed at 4 and 8 months postrandomization. Assessment includes both sleep (actigraphy, sleep diary) and daytime functioning of the children and daytime functioning of their parents. Results will be reported using the standards set out in the Consolidated Standards of Reporting Trials statement. Conclusions If the intervention is supported by the results of the RCT, we plan to commercialize this program so that it is sustainable and available at a low cost to all families with internet access. Trial Registration ClinicalTrials.gov NCT02243501; https://clinicaltrials.gov/show/NCT02243501 (Archived by WebCite at http://www.webcitation.org/6x8Z5pBui) PMID:29581089
Norlund, Fredrika; Olsson, Erik M G; Burell, Gunilla; Wallin, Emma; Held, Claes
2015-04-11
Major depression and depressive symptoms are common in patients with a recent myocardial infarction (MI), and depression is associated with adverse cardiovascular outcomes. Anxiety post-MI is less studied, but occurs commonly in patients with heart disease, and is also considered a risk factor for recurrence of cardiac events. Cognitive behavior therapy (CBT) is an established therapy for depression and anxiety disorders. To the best of our knowledge, there have not been any studies to determine if internet-based CBT (iCBT) can reduce the symptoms of depression and anxiety in patients with a recent MI. The main aim of the U-CARE Heart trial is to evaluate an iCBT intervention for patients with a recent MI. This is a randomized, controlled, prospective study with a multicenter design. A total of 500 participants will be randomized at a 1:1 ratio, around two months after an acute MI, to either iCBT or to a control group. Both groups will receive an optimal standard of care according to guidelines. The intervention consists of a self-help program delivered via the internet with individual online support from a psychologist. Treatment duration is 14 weeks. The primary outcome is change in patients' self-rated anxiety and depression symptoms from baseline to end of treatment. An internal pilot study was conducted indicating sufficient levels of study acceptability and engagement in treatment. The present study is designed to evaluate an iCBT intervention targeting symptoms of depression and anxiety in a post-MI population. If effective, iCBT has several advantages, and will potentially be implemented as an easily accessible treatment option added to modern standard of care. This trial was registered with Clinicaltrials.gov (identifier: NCT01504191 ) on 19 December 2011.
76 FR 65965 - Contributions to the Telecommunications Relay Services Fund
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... of 2010 (CVAA), which requires each provider of interconnected voice over Internet protocol (VoIP) service or non-interconnected VoIP service to begin participating in and contributing to the interstate... [[Page 65966
DOT National Transportation Integrated Search
1997-09-04
In 1993, the North American Free Trade Agreement (NAFTA) committed the United States, Canada and Mexico to facilitate movements of people and goods among the three member countries. In a subsequent agreement in February, 1995, Canada and the United S...