351,173 research outputs found

    DDH-MAC: a novel dynamic de-centralized hybrid MAC protocol for cognitive radio networks

    Get PDF
    The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols

    Backing Into Network Operations

    Get PDF
    When asked to participate in this clinic, I gave the tentative title "Backing Into Network Operations" for my paper because I thought it might be useful to discuss some principles of planning for and consensus making within networks which I had derived the hard way from my experience directing two computer-based networks-networks which were entered into by chance rather than design. (In addition, the Washington University School of Medicine Library is a member of three other networks: the Regional Medical Library, the Regional Medical Program, and the Higher Education Coordi- nating Council, so that we have experience on both sides of networks.) It seemed that it might be helpful to examine the mistakes which we made and the generalized conclusions which we might draw from them as hypotheses to be tested in other networking operations, as well as a comparison with some other, more carefully planned, networks now in existence. I therefore devote the beginning of my paper to describing the two networks we have been involved in, merely as background to understanding, and not as another "How I do it good in my library" paper.published or submitted for publicatio

    On the Identification of Agents in the Design of Production Control Systems

    No full text
    This paper describes a methodology that is being developed for designing and building agent-based systems for the domain of production control. In particular, this paper deals with the steps that are involved in identifying the agents and in specifying their responsibilities. The methodology aims to be usable by engineers who have a background in production control but who have no prior experience in agent technology. For this reason, the methodology needs to be very prescriptive with respect to the agent-related aspects of design

    Adversarial behaviours knowledge area

    Full text link
    The technological advancements witnessed by our society in recent decades have brought improvements in our quality of life, but they have also created a number of opportunities for attackers to cause harm. Before the Internet revolution, most crime and malicious activity generally required a victim and a perpetrator to come into physical contact, and this limited the reach that malicious parties had. Technology has removed the need for physical contact to perform many types of crime, and now attackers can reach victims anywhere in the world, as long as they are connected to the Internet. This has revolutionised the characteristics of crime and warfare, allowing operations that would not have been possible before. In this document, we provide an overview of the malicious operations that are happening on the Internet today. We first provide a taxonomy of malicious activities based on the attacker’s motivations and capabilities, and then move on to the technological and human elements that adversaries require to run a successful operation. We then discuss a number of frameworks that have been proposed to model malicious operations. Since adversarial behaviours are not a purely technical topic, we draw from research in a number of fields (computer science, criminology, war studies). While doing this, we discuss how these frameworks can be used by researchers and practitioners to develop effective mitigations against malicious online operations.Published versio

    Digital Use and Internet Access in Fayetteville, Arkansas

    Get PDF
    A report on data gathered from a spring 2019 survey by the UA Center for Communication Research. The data will provide the City of Fayetteville with a baseline picture regarding residents’ current levels of internet access, their daily activities online, the importance of the internet to them, and the barriers they see to enhanced online access. Future study will consider the homework gap in homes with K-12 students as well as general internet access issues for residential multi-tenant environments. Data from this survey will inform the City of Fayetteville\u27s Digital Equity Plan
    • …
    corecore