Home About us Contact | |||
Communication Protocols (communication + protocol)
Selected AbstractsDesign and evaluation of inter-bandwidth broker signalingINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 8 2008Haci A. Mantar Abstract Bandwidth brokers (BBs) have been proposed for providing end-to-end quality of services (QoS) in differentiated services (Diffserv) networks. As a single entity in each domain, a BB aims at performing both intra- and inter-domain resource management on behalf of its domain. There have been plenty of BB studies for intra-domain resource management. However, how a BB can perform inter-domain resource management in a scalable and deployable manner is still an open issue. In this work, we present the design, implementation and evaluation of an inter-BB communication protocol that is used by each BB to communicate with its neighboring BBs for inter-domain QoS resource management. The proposed model uses a destination-based aggregation scheme in which reservations are aggregated as they merge through the destination region. The destination-based aggregation improves inter-domain state and signaling scalability. The protocol also performs traffic engineering to increase inter-domain resource utilization. The implementation and simulation results verify the achievements of our model. Copyright © 2008 John Wiley & Sons, Ltd. [source] Task Pool Teams: a hybrid programming environment for irregular algorithms on SMP clustersCONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 12 2006Judith Hippold Abstract Clusters of symmetric multiprocessors (SMPs) are popular platforms for parallel programming since they provide large computational power for a reasonable price. For irregular application programs with dynamically changing computation and data access behavior, a flexible programming model is needed to achieve efficiency. In this paper we propose Task Pool Teams as a hybrid parallel programming environment to realize irregular algorithms on clusters of SMPs. Task Pool Teams combine task pools on single cluster nodes by an explicit message passing layer. They offer load balance together with multi-threaded, asynchronous communication. Appropriate communication protocols and task pool implementations are provided and accessible by an easy-to-use application programmer interface. As application examples we present a branch and bound algorithm and the hierarchical radiosity algorithm. Copyright © 2006 John Wiley & Sons, Ltd. [source] Integrating remote sensing in fisheries controlFISHERIES MANAGEMENT & ECOLOGY, Issue 5 2005N. KOURTI Abstract, To complement existing fishery control measures, in particular the Vessel Monitoring System (VMS), a pilot operational system to find fishing vessels in satellite images was set up. Radar is the mainstay of the system, which furthermore includes fully automated image processing and communication protocols with the authorities. Different image types are used to match different fisheries , oceanic, shelf and coastal. Vessel detection rates were 75,100% depending on image type and vessel size. Output of the system, in the form of an overview of vessel positions in the area highlighting any discrepancies with otherwise reported positions, can be at the authorities within 30 min of the satellite image being taken , fast enough to task airborne inspection for follow up. [source] Quantum interferometry with intense optical pulsesFORTSCHRITTE DER PHYSIK/PROGRESS OF PHYSICS, Issue 4-5 2003G. Leuchs For intense optical pulses the optical Kerr interaction in matter such as an optical fiber is large enough to generate quantum states of light with significant non-classical properties. On this basis pairs of entangled light pulses have been generated. This entanglement can be used for novel schemes in high precision interferometry and for quantum communication protocols such as quantum dense coding. [source] A heterogeneous-network aided public-key management scheme for mobile ad hoc networksINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 1 2007Yuh-Min Tseng A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre-shared a secret, or pre-obtained public-key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre-obtained certificates will be unable to join the network. In this paper, a heterogeneous-network aided public-key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide-covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre-obtained certificate to instantly get a certificate using the communication channel constructed by these wide-covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd. [source] From experience: leading dispersed teamsTHE JOURNAL OF PRODUCT INNOVATION MANAGEMENT, Issue 4 2002Preston G. Smith Although management can gain great performance benefit from colocating cross-functional product development teams, colocation is becoming increasingly difficult to achieve as companies globalize and form alliances. Consequently, this article offers guidance to keep your development team functioning effectively even though it may be dispersed across town or around the world. We aim our suggestions at the team leader, but both team members and managers will find helpful ideas and become sensitive to critical issues. For example, management often underestimates the loss in team performance as the team disperses and incorrectly assumes that communication technologies alone will largely overcome the complications of distance. An effective team depends on open, effective communication, which in turn depends on trust among members. Thus, trust is the foundation, but it is also the very quality that is most difficult to build at a distance. For this reason and for several others that occur in the very front of the project, we suggest that if you can get your team together face-to-face at any time during the project, do it at the beginning. You can establish trust while you are planning the project together, writing the product specification, formulating working approaches, and creating communication protocols (for example, how long before an e-mail must be answered?). Likewise, the most important maintenance activity during the middle of the project is retaining an effective level of trust, which is far easier than having to rebuild trust. In part, you accomplish this by "humanizing" the project: sharing team member biographical information, telling an occasional good-natured joke, and knowing when a colleague's family member is in the hospital. We also cover communication technologies,which ones to select and why you need a variety of media. Although such technologies are necessary for running a dispersed team, they are not nearly as sufficient as many technology suppliers suggest. Another complication is that differences in culture tend to grow as the team spreads over greater distances, encountering different time zones, languages, ethnic groups, and thus corresponding values. Although such differences place challenges before the team, diversity also offers advantages to those who are sensitive to the facets of culture. Consequently, we break culture down into its components and suggest ways of working with each one. Although we tend to underestimate the complications of working at a distance today, in time, teams will learn the skills needed. In the meantime, the perceptive manager and team leader will pay special attention to building these skills. [source] After BitTorrent: Darknets to Native DataARCHITECTURAL DESIGN, Issue 5 2006Anthony Burke Abstract What are the implications of the inherent reflexivity of the Internet for the design professions? Anthony Burke argues that radically innovative and distributed forms of information exchange such as BitTorrent suggest a general shift away from the traditional conception of the architect as master builder to one more in line with the collaborative remixing and patching tactics of the hacker. BitTorrent is a communications protocol that allows massive information exchange across infinite users with minimum resources. Through its sheer force of collectively pooled imagination, it provides a potent example of the sorts of platforms of information exchange that foster the new forms of communal organisation that Michael Hardt and Antonio Negri term the ,Multitude', and which productively challenge conventional models of cultural invention and production. In this context, Burke raises questions about the implications of this broader shift for the design professions' business organisation, as well as their more general methodologies. Copyright © 2006 John Wiley & Sons, Ltd. [source] |