978 resultados para network protocols


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless Body Area Networks (WBANs) consist of a number of miniaturized wearable or implanted sensor nodes that are employed to monitor vital parameters of a patient over long duration of time. These sensors capture physiological data and wirelessly transfer the collected data to a local base station in order to be further processed. Almost all of these body sensors are expected to have low data-rate and to run on a battery. Since recharging or replacing the battery is not a simple task specifically in the case of implanted devices such as pacemakers, extending the lifetime of sensor nodes in WBANs is one of the greatest challenges. To achieve this goal, WBAN systems employ low-power communication transceivers and low duty cycle Medium Access Control (MAC) protocols. Although, currently used MAC protocols are able to reduce the energy consumption of devices for transmission and reception, yet they are still unable to offer an ultimate energy self-sustaining solution for low-power MAC protocols. This paper proposes to utilize energy harvesting technologies in low-power MAC protocols. This novel approach can further reduce energy consumption of devices in WBAN systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Epidemic protocols are a bio-inspired communication and computation paradigm for large and extreme-scale networked systems. This work investigates the expansion property of the network overlay topologies induced by epidemic protocols. An expansion quality index for overlay topologies is proposed and adopted for the design of epidemic membership protocols. A novel protocol is proposed, which explicitly aims at improving the expansion quality of the overlay topologies. The proposed protocol is tested with a global aggregation task and compared to other membership protocols. The analysis by means of simulations indicates that the expansion quality directly relates to the speed of dissemination and convergence of epidemic protocols and can be effectively used to design better protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Epidemic protocols are a bio-inspired communication and computation paradigm for extreme-scale network system based on randomized communication. The protocols rely on a membership service to build decentralized and random overlay topologies. In a weakly connected overlay topology, a naive mechanism of membership protocols can break the connectivity, thus impairing the accuracy of the application. This work investigates the factors in membership protocols that cause the loss of global connectivity and introduces the first topology connectivity recovery mechanism. The mechanism is integrated into the Expander Membership Protocol, which is then evaluated against other membership protocols. The analysis shows that the proposed connectivity recovery mechanism is effective in preserving topology connectivity and also helps to improve the application performance in terms of convergence speed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The assessment of routing protocols for mobile wireless networks is a difficult task, because of the networks` dynamic behavior and the absence of benchmarks. However, some of these networks, such as intermittent wireless sensors networks, periodic or cyclic networks, and some delay tolerant networks (DTNs), have more predictable dynamics, as the temporal variations in the network topology can be considered as deterministic, which may make them easier to study. Recently, a graph theoretic model-the evolving graphs-was proposed to help capture the dynamic behavior of such networks, in view of the construction of least cost routing and other algorithms. The algorithms and insights obtained through this model are theoretically very efficient and intriguing. However, there is no study about the use of such theoretical results into practical situations. Therefore, the objective of our work is to analyze the applicability of the evolving graph theory in the construction of efficient routing protocols in realistic scenarios. In this paper, we use the NS2 network simulator to first implement an evolving graph based routing protocol, and then to use it as a benchmark when comparing the four major ad hoc routing protocols (AODV, DSR, OLSR and DSDV). Interestingly, our experiments show that evolving graphs have the potential to be an effective and powerful tool in the development and analysis of algorithms for dynamic networks, with predictable dynamics at least. In order to make this model widely applicable, however, some practical issues still have to be addressed and incorporated into the model, like adaptive algorithms. We also discuss such issues in this paper, as a result of our experience.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ayahuasca is psychotropic beverage that has been used for ages by indigenous populations in South America, notably in the Amazon region, for religious and medicinal purposes. The tea is obtained by the decoction of leaves from the Psychotria viridis with the bark and stalk of a shrub, the Banisteriopsis caapi. The first is rich in N-N-dimethyltryptamine (DMT), which has an important and well-known hallucinogenic effect due to its agonistic action in serotonin receptors, specifically 5-HT2A. On the other hand, β-carbolines present in B. caapi, particularly harmine and harmaline, are potent monoamine oxidase inhibitors (MAOi). In addition, the tetrahydroharmine (THH), also present in B. caapi, acts as mild selective serotonin reuptake inhibitor and a weak MAOi. This unique composition induces a number of affective, sensitive, perceptual and cognitive changes in individuals under the effect of Ayahuasca. On the other hand, there is growing interest in the Default Mode Network (DMN), which has been consistently observed in functional neuroimaging studies. The key components of this network include structures in the brain midline, as the anterior medial frontal cortex, ventral medial frontal cortex, posterior cingulate cortex, precuneus, and some regions within the inferior parietal lobe and middle temporal gyrus. It has been argued that DMN participate in tasks involving self-judgments, autobiographical memory retrieval, mental simulations, thinking in perspective, meditative states, and others. In general, these tasks require an internal focus of attention, hence the conclusion that the DMN is associated with introspective mental activity. Therefore, this study aimed to evaluate by functional magnetic resonance imaging (fMRI) changes in DMN caused via the ingestion of Ayahuasca by 10 healthy subjects while submitted to two fMRI protocols: a verbal fluency task and a resting state acquisition. In general, it was observed that Ayahuasca causes a reduction in the fMRI signal in central nodes of DMN, such as the anterior cingulate cortex, the medial prefrontal cortex, the posterior cingulate cortex, precuneus and inferior parietal lobe. Furthermore, changes in connectivity patterns of the DMN were observed, especially a decrease in the functional connectivity of the precuneus. Together, these findings indicate an association between the altered state of consciousness experienced by individuals under the effect of Ayahuasca, and changes in the stream of spontaneous thoughts leading to an increased introspective mental activity

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives. This study characterized the feldspathic ceramic surfaces after various silanization protocols.Methods. Ceramic bars (2 mm x 4 mm x 10 mm) (N = 18) of feldpathic ceramic (VM7, VITA Zahnfabrik) were manufactured and finished. Before silane application, the specimens were ultrasonically cleaned in distilled water for 10 min. The ceramic specimens were randomly divided into nine groups (N = 2 per group) and were treated with different silane protocols. MPS silane (ESPE-Sil, 3M ESPE) was applied to all specimens and left to react at 20 degrees C for 2 min (G20). After drying, the specimens were subjected to heat treatment in an oven at 38 degrees C (G38), 79 degrees C (G79) or 100 degrees C (G100) for 1 min. Half of the specimens of each group were rinsed with water at 80 degrees C for 15 s (G20B, G38B, G79B, G100B). The control group (GC) received no silane. Attenuated total reflection infrared Fourier transform analysis (ATR FT-IR) was performed using a spectrometer. Thickness of silane layer was measured using a spectroscopic ellip-someter working in the lambda = 632.8 nm (He-Ne laser) at 70 degrees incidence angle. Surface roughness was evaluated using an optical profilometer. Specimens were further analyzed under the Scanning Electron Microscopy (SEM) to observe the topographic patterns.Results. ATR FT-IR analysis showed changes in Si-O peaks with enlarged bands around 940 cm(-1). Ellipsometry measurements showed that all post-heat treatment actions reduced the silane film thickness (30.8-33.5 nm) compared to G20 (40 nm). The groups submitted to rinsing in hot water (B groups) showed thinner silane films (9.8-14.4 nm) than those of their corresponding groups (without washing) (30.8-40 nm). Profilometer analysis showed that heat treatments (Ra approximate to 0.10-0.19 mu m; Rq approximate to 0.15-0.26 mu m) provided a smoother surface than the control group (Ra approximate to 0.48 mu m; Rq approximate to 0.65 mu m). Similar patterns were also observed in SEM images.Significance. Heat treatment after MPS silane application improved the silane layer network. Rinsing with boiling water eliminated the outmost unreacted regions of the silane yielding to thinner film thicknesses. (C) 2011 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application. © 2010 Springer-Verlag Berlin Heidelberg.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a NCAP embedded on DE2 kit with Nios II processor and uClinux to development of a network gateway with two interfaces, wireless (ZigBee) and wired (RS232) based on IEEE 1451. Both the communications, wireless and wired, were developed to be point-to-point and working with the same protocols, based on IEEE 1451.0-2007. The tests were made using a microcomputer, which through of browser was possible access the web page stored in the DE2 kit and send commands of control and monitoring to both TIMs (WTIM and STIM). The system describes a different form of development of the NCAP node to be applied in different environments with wired or wireless in the same node. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several countries have invested in technologies for Smart Grids. Among such protocols designed cover this area, highlights the DNP3 (Distributed Network Protocol version 3). Although the DNP3 be developed for operation over the serial interface, there is a trend in the literature to the use of other interfaces. The Zigbee wireless interface has become more popular in the industrial applications. In order to study the challenges of integrating of these two protocols, this article is presented the analysis of DNP3 protocol stack through state machines The encapsulation of DNP3 messages in P2P (point-to-point) ZigBee Network, may assist in the discovery and solution of failures of availability and security of this integration. The ultimate goal is to merge the features of DNP3 and Zigbee stacks, and display a solution that provides the benefits of wireless environment, without impairment of security required for Smart Grid applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is an urgent need for expanding the number of brain banks serving psychiatric research. We describe here the Psychiatric Disorders arm of the Brain Bank of the Brazilian Aging Brain Study Group (Psy-BBBABSG), which is focused in bipolar disorder (BD) and obsessive compulsive disorder (OCD). Our protocol was designed to minimize limitations faced by previous initiatives, and to enable design-based neurostereological analyses. The Psy-BBBABSG first milestone is the collection of 10 brains each of BD and OCD patients, and matched controls. The brains are sourced from a population-based autopsy service. The clinical and psychiatric assessments were done by an expert team including psychiatrists, through an informant. One hemisphere was perfused-fixed to render an optimal fixation for conducting neurostereological studies. The other hemisphere was comprehensively dissected and frozen for molecular studies. In 20 months, we collected 36 brains. A final report was completed for 14 cases: 3 BDs, 4 major depressive disorders, 1 substance use disorder, 1 mood disorder NOS, 3 obsessive compulsive spectrum symptoms, 1 OCD and 1 schizophrenia. The majority were male (64%), and the average age at death was 67.2 +/- 9.0 years. The average postmortem interval was 16 h. Three matched controls were collected. The pilot stage confirmed that the protocols are well fitted to reach our goals. Our unique autopsy source makes possible to collect a fairly number of high quality cases in a short time. Such a collection offers an additional to the international research community to advance the understanding on neuropsychiatric diseases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using proprietary and closed communication protocols. There is the common belief that only if we can solve the interoperability problem we can have a real Internet of Things. After a deep analysis of the IoT protocols, we identified a set of primitives for IoT applications. We argue that each IoT protocol can be expressed in term of those primitives, thus solving the interoperability problem at the application protocol level. Moreover, the primitives are network and transport independent and make no assumption in that regard. This dissertation presents our implementation of an IoT platform: the Ponte project. Privacy issues follows the rise of the Internet of Things: it is clear that the IoT must ensure resilience to attacks, data authentication, access control and client privacy. We argue that it is not possible to solve the privacy issue without solving the interoperability problem: enforcing privacy rules implies the need to limit and filter the data delivery process. However, filtering data require knowledge of how the format and the semantics of the data: after an analysis of the possible data formats and representations for the IoT, we identify JSON-LD and the Semantic Web as the best solution for IoT applications. Then, this dissertation present our approach to increase the throughput of filtering semantic data by a factor of ten.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) consist of a large number of sensor nodes, characterized by low power constraint, limited transmission range and limited computational capabilities [1][2].The cost of these devices is constantly decreasing, making it possible to use a large number of sensor devices in a wide array of commercial, environmental, military, and healthcare fields. Some of these applications involve placing the sensors evenly spaced on a straight line for example in roads, bridges, tunnels, water catchments and water pipelines, city drainages, oil and gas pipelines etc., making a special class of these networks which we define as a Linear Wireless Network (LWN). In LWNs, data transmission happens hop by hop from the source to the destination, through a route composed of multiple relays. The peculiarity of the topology of LWNs, motivates the design of specialized protocols, taking advantage of the linearity of such networks, in order to increase reliability, communication efficiency, energy savings, network lifetime and to minimize the end-to-end delay [3]. In this thesis a novel contention based Medium Access Control (MAC) protocol called L-CSMA, specifically devised for LWNs is presented. The basic idea of L-CSMA is to assign different priorities to nodes based on their position along the line. The priority is assigned in terms of sensing duration, whereby nodes closer to the destination are assigned shorter sensing time compared to the rest of the nodes and hence higher priority. This mechanism speeds up the transmission of packets which are already in the path, making transmission flow more efficient. Using NS-3 simulator, the performance of L-CSMA in terms of packets success rate, that is, the percentage of packets that reach destination, and throughput are compared with that of IEEE 802.15.4 MAC protocol, de-facto standard for wireless sensor networks. In general, L-CSMA outperforms the IEEE 802.15.4 MAC protocol.