Search results for "Application protocol"

showing 10 items of 17 documents

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

2013

Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…

10009 Department of InformaticsComputer scienceDistributed computingInternet of ThingsReal-time computingMonitoring and Accounting Infrastructure020206 networking & telecommunications02 engineering and technology000 Computer science knowledge & systemsSimple Network Management ProtocolConstrained Application ProtocolSecurity Assertion Markup Language[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Resource (project management)CoAPAccounting information system0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]esineiden internet020201 artificial intelligence & image processing1700 General Computer Science2614 Theoretical Computer ScienceWireless sensor networkProtocol (object-oriented programming)
researchProduct

Emergency Treatment of Anaphylactic Reactions in Air Rescue Missions: An Eight-Year Analysis of a German Rescue Helicopter Base.

2021

AbstractIntroduction:Anaphylactic reactions can lead to a life-threatening situation. In the event of anaphylaxis, rapid and targeted emergency treatment is indicated.Study Objective:The study sought to determine the emergency therapy administered for anaphylaxis in children and adults. Focus was placed on therapy with adrenaline. In addition, the study aimed to investigate demographic data, triggers, and hospitalization rates of the different severities of anaphylaxis.Methods:A retrospective analysis of anaphylactic reactions was conducted using data from prehospital emergency missions performed by the Air Rescue Dresden/Germany from 2008 through 2015 using the standardized application pro…

AdultMalemedicine.medical_specialtyAircraftEpinephrineAdverse outcomesmedicine.medical_treatmentEmergency NursingEmergency treatmentApplication protocolmedicineHumansInsect venomCardiopulmonary resuscitationChildAnaphylaxisEmergency TreatmentRetrospective Studiesbusiness.industryAnaphylactic reactionsmedicine.diseaseEpinephrineEmergency medicineEmergency MedicineFemalebusinessAnaphylaxismedicine.drugPrehospital and disaster medicine
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

A Techno-Economic Perspective of Constrained Application Protocol

2017

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencePerspective (graphical)Techno economicEnvironmental economicsConstrained Application Protocol
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Mobile Wireless Interfaces: In Search for the Limits

2002

With the proliferation of 2G and 3G Telecom and other wireless networks hundred of millions of users will be able to access wireless services with their terminals in only a few years. In this paper we discuss the possibilities and limitations of existing and emerging mobile technologies and methodologies for porting information and functionality from traditional PCs to mobile devices and vice versa. We argue that in order to be able to properly port things between devices an equivalence concept for user interfaces is required.

EngineeringWi-Fi arrayMobile identification numbercomputer.internet_protocolbusiness.industryMobile broadbandMobile computingMobile WebWireless Application ProtocolMobile searchMobile technologybusinesscomputerComputer network
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Performance Evaluation of the IEEE 802.16 ARQ Mechanism

2007

The IEEE 802.16 technology defines the ARQ mechanism that enables a connection to resend data at the MAC level if an error is detected. In this paper, we analyze the key features and parameters of the ARQ mechanism. In particular, we consider a choice for the ARQ feedback type, a scheduling of the ARQ feedbacks and retransmissions, the ARQ block rearrangement, ARQ transmission window and ARQ block size. We run a number of simulation scenarios to study these parameters and how they impact a performance of application protocols. The simulation results reveal that the ARQ mechanism plays an important role in transmitting data over wireless channels in the IEEE 802.16 networks.

IEEE 802Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSHybrid automatic repeat requestData_CODINGANDINFORMATIONTHEORYScheduling (computing)Selective Repeat ARQSliding window protocolApplication protocolWirelessbusinessBlock sizeComputer network
researchProduct

A Group-Based Protocol for Large Wireless AD-HOC and Sensor Networks

2008

Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based on groups. It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads. We propose an approach where the network is split into several groups of sensors where connections between groups are established as a function of the proximity and the neighbor's available capacity (based on the sensor's energy). In this paper the network architecture is described with its mathematical description and the messages that are needed to proper operation. It is also simulated how much time is n…

Routing protocolNetwork architectureComputer sciencebusiness.industryWireless ad hoc networkcomputer.internet_protocolDistributed computingNetwork topologyWireless Application ProtocolRouting (electronic design automation)businessProtocol (object-oriented programming)Wireless sensor networkcomputerComputer networkNOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops
researchProduct

M-commerce - mobile commerce: a new frontier for E-business

2005

Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…

Service (business)Electronic businessComputer sciencebusiness.industrycomputer.internet_protocolMobile commerceMobile computingServices computingMobile business developmentE-commerceBusiness modellaw.inventionWorld Wide WebBluetoothGSMlawMiddlewareInformation systemWireless Application ProtocolbusinesscomputerProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct