418,482 research outputs found

    Some Design Considerations for Picture Archiving and Communication Systems

    Get PDF
    Design considerations for picture archiving and communication systems are reviewed with special emphasis on those issues that differ from conventional network architectures. Design equations for three layers of a picture network are developed and discussed in the context of preliminary estimates of the flow of digital images between a multiplicity of picture sources, picture archives and picture viewing stations. Discussions of differences from conventional networks focuses on the local nature of the net, the availability of a wide-band transmission media with low error rates, the relative costliness of network equipment capable of taking advantage of the wide-band transmission media and the preponderance of large blocks of image data in the network traffic. The locality of network traffic flows associated with the generation, storage and display of images is a characteristic of the radiology application that can probably be used to advantage

    Effects of Data Replication on Data Exfiltration in Mobile Ad hoc Networks Utilizing Reactive Protocols

    Get PDF
    A swarm of autonomous UAVs can provide a significant amount of ISR data where current UAV assets may not be feasible or practical. As such, the availability of the data the resides in the swarm is a topic that will benefit from further investigation. This thesis examines the impact of le replication and swarm characteristics such as node mobility, swarm size, and churn rate on data availability utilizing reactive protocols. This document examines the most prominent factors affecting the networking of nodes in a MANET. Factors include network routing protocols and peer-to-peer le protocols. It compares and contrasts several open source network simulator environments. Experiment implementation is documented, covering design considerations, assumptions, and software implementation, as well as detailing constant, response and variable factors. Collected data is presented and the results show that in swarms of sizes of 30, 45, and 60 nodes, le replication improves data availability until network saturation is reached, with the most significant benefit gained after only one copy is made. Mobility, churn rate, and swarm density all influence the replication impact

    End-to-End Resilience Mechanisms for Network Transport Protocols

    Get PDF
    The universal reliance on and hence the need for resilience in network communications has been well established. Current transport protocols are designed to provide fixed mechanisms for error remediation (if any), using techniques such as ARQ, and offer little or no adaptability to underlying network conditions, or to different sets of application requirements. The ubiquitous TCP transport protocol makes too many assumptions about underlying layers to provide resilient end-to-end service in all network scenarios, especially those which include significant heterogeneity. Additionally the properties of reliability, performability, availability, dependability, and survivability are not explicitly addressed in the design, so there is no support for resilience. This dissertation presents considerations which must be taken in designing new resilience mechanisms for future transport protocols to meet service requirements in the face of various attacks and challenges. The primary mechanisms addressed include diverse end-to-end paths, and multi-mode operation for changing network conditions

    Cross-Layer Design of an Energy-Efficient Cluster Formation Algorithm with Carrier-Sensing Multiple Access for Wireless Sensor Networks

    Get PDF
    A new energy-efficient scheme for data transmission in a wireless sensor network (WSN) is proposed, having in mind a typical application including a sink, which periodically triggers the WSN, and nodes uniformly distributed over a specified area. Routing, multiple access control (MAC), physical, energy, and propagation aspects are jointly taken into account through simulation; however, the protocol design is based on some analytical considerations reported in the appendix. Information routing is based on a clustered self-organized structure; a carrier-sensing multiple access (CSMA) protocol is chosen at MAC layer. Two different scenarios are examined, characterized by different channel fading rates. Four versions of our protocol are presented, suitably oriented to the two different scenarios; two of them implement a cross-layer (CL) approach, where MAC parameters influence both the network and physical layers. Performance is measured in terms of network lifetime (related to energy efficiency) and packet loss rate (related to network availability). The paper discusses the rationale behind the selection of MAC protocols for WSNs and provides a complete model characterization spanning from the network layer to the propagation channel. The advantages of the CL approach, with respect to an algorithm which belongs to the well-known class of low-energy adaptive clustering hierarchy (LEACH) protocols, are shown

    How network operators can enhance ambient assisted living applications through next generation networks

    Get PDF
    Within the technological framework of Information and Communication Technologies (ICT), consumers are currently requesting multimedia services with simplicity of use, reliability, security and service availability through mobile and fixed access. Network operators are proposing the Next Generation Networks (NGN) to address the challenges of providing both services and network convergence. Apart from these considerations, there is a need to provide social and healthcare assistance services in order to support the progressive aging in the elderly population. In order to achieve this objective, the Ambient Assisted Living (AAL) initiative proposes ICT systems and services to promote autonomy and an independent life among the elderly. This paper describes the design and implementation of a group of services, called “service enablers”, which helps AAL applications to be supported in NGN. The presented enablers are identified to support the teleconsulting applications requirements in an NGN environment, involving the implementation of a virtual waiting room, a virtual whiteboard, a multimedia multiconference and a vital-signs monitoring presence status. A use case is defined and implemented to evaluate the developed enablers' performance

    A performance comparison of tree and ring topologies in distributed system

    Get PDF
    A distributed system is a collection of computers that are connected via a communication network. Distributed systems have become commonplace due to the wide availability of low-cost, high performance computers and network devices. However, the management infrastructure often does not scale well when distributed systems get very large. Some of the considerations in building a distributed system are the choice of the network topology and the method used to construct the distributed system so as to optimize the scalability and reliability of the system, lower the cost of linking nodes together and minimize the message delay in transmission, and simplify system resource management. We have developed a new distributed management system that is able to handle the dynamic increase of system size, detect and recover the unexpected failure of system services, and manage system resources. The topologies used in the system are the tree-structured network and the ring-structured network. This thesis presents the research background, system components, design, implementation, experiment results and the conclusions of our work. The thesis is organized as follows: the research background is presented in chapter 1. Chapter 2 describes the system components, including the different node types and different connection types used in the system. In chapter 3, we describe the message types and message formats in the system. We discuss the system design and implementation in chapter 4. In chapter 5, we present the test environment and results. Finally, we conclude with a summary and describe our future work in chapter 6

    Social issues of power harvesting as key enables of WSN in pervasive computing

    No full text
    Pervasive systems have gained popularity and open the door to new applications that will improve the quality of life of the users. Additionally, the implementation of such systems over an infrastructure of Wireless Sensor Networks has been proven to be very powerful. To deal with the WSN problems related to the battery of the elements or nodes that constitute the WSN, Power Harvesting techniques arise as good candidates. With PH each node can extract the energy from the surrounding environment. However, this energy source could not be constant, affecting the continuity and quality of the services provided. This behavior can have a negative impact on the user's perception about the system, which could be perceived as unreliable or faulty. In the current paper, some related works regarding pervasive systems within the home environment are referenced to extrapolate the conclusions and problems to the paradigm of Power Harvesting Pervasive Systems from the user perspective. Besides, the paper speculates about the approach and methods to overcome these potential problems and presents the design trends that could be followed.<br/
    corecore