15 research outputs found

    RFID Tag Reader Designs for Retail Store Applications

    Get PDF
    Current RFID tag readers do not do much more than reading the tags and transmitting that information to a central server for processing. This places a heavy burden on the central server to keep track of all the incoming data from the reader when it can be spending its time more gainfully on other tasks. We propose building some intelligence into RFID tag readers so that they can process some of the data themselves and reduce the load on the central server. We discuss the technical details of building this intelligence in the four key functions of tag readers: (A) Automatic initialization of the tag readers, (B) Automatic identification of misplaced items, (C) Automatic generation of shelf replenishment alerts, and (D) Automatic generation of reorder alerts. In addition, we discuss possible network designs for interconnecting the tag readers and the central transaction server at the retail store. We provide a database model for storing transactions generated by RFID tag reads. We discuss how the current enterprise architectures can be modified to accommodate RFID transactions

    Designing ad hoc networks with limited infrastructure support.

    Get PDF
    Abstract-Ad hoc networks based on IEEE 802.11 (Wi-Fi) wireless links are viable for small regions with a few tens of mobile nodes, but such networks suffer from frequently broken routes and low network utilization. We investigate the benefits of adding a few infrastructure nodes to an otherwise ad hoc network to improve its performance. These infrastructure nodes are interconnected among themselves with point-to-point (p2p) links in addition to Wi-Fi capability. To evaluate the benefit of ad hoc networks with mixed broadcast wireless and point to point links, we modify an existing ad hoc routing protocol to automatically discover routes emphasizing p2p links and simulated several ad hoc and mixed networks using the Glomosim simulator. Our results show that adding a small number of point-to-point links makes a significant difference in performance with 2-3 times higher throughput and up to 2-3 times lower packet delays

    Fault-tolerant routing with non-adaptive wormhole algorithms in mesh networks

    Full text link

    Mitigating Malicious Control Packet Floods In Ad Hoc Networks,”

    No full text
    Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overall network performance. These malicious nodes mimic normal nodes in all aspects except that they do route discoveries much more frequently than the other nodes. We show, using simulations, that the basic route discovery mechanism used in many ad hoc network protocols can be exploited by as few as one malicious or compromised node to bring down the throughput dramatically. We propose an adaptive statistical packet dropping mechanism to mitigate such situations and reduce the loss of throughput. The proposed mechanism works even when the identity of the malicious nodes is unknown and does not use any additional network bandwidth. It is simple to implement and maintains or improves network throughput when there are no malicious nodes but the network is congested with excess traffic

    Detection of Malicious Network Flows with Low Preprocessing Overhead

    No full text
    Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use to offline analysis of previously captured network traffic to identify attacks that have already occurred. This paper applies machine learning analysis for network security with low preprocessing overhead. Raw network data are converted directly into bitmap files and processed through a Two-Dimensional Convolutional Neural Network (2D-CNN) model to identify malicious traffic. The model has high accuracy in detecting various malicious traffic flows, even zero-day attacks, based on testing with three open-source network traffic datasets. The overhead of preprocessing the network data before applying the 2D-CNN model is very low, making it suitable for on-the-fly network traffic analysis for malicious traffic flows

    Adaptive Multimodule Routers

    No full text
    . Recent multiprocessors such as Cray T3D support interprocessor communication using partitioned dimension-order routers (PDRs). In a PDR implementation, the routing logic and switching hardware is partitioned into multiple modules, with each module suitable for implementation as a chip. This paper proposes a method to incorporate adaptivity into such routers with simple changes to the router structure and logic. We show that with as few as two virtual channels per physical channel, adaptivity can be provided to handle nonuniform traffic in multidimensional meshes. Keywords: adaptive routing, mesh networks, multicomputers, multimodule routers, wormhole routing. 1 Introduction Many recent experimental and commercial multicomputers and multiprocessors [6, 14, 18] use grid topology based networks such as meshes and tori. Majority of these multicomputers use the dimension-order or e-cube routing with wormhole (WH) switching [8]. Wormhole is a form of cutthrough routing in which blocked ..
    corecore