scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 2000"


Proceedings ArticleDOI
04 Jan 2000
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Abstract: Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our findings that the conventional protocols of direct transmission, minimum-transmission-energy, multi-hop routing, and static clustering may not be optimal for sensor networks, we propose LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. Simulations show the LEACH can achieve as much as a factor of 8 reduction in energy dissipation compared with conventional outing protocols. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated.

12,497 citations


01 Jan 2000
TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Abstract: Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have signicant impact on the overall energy dissipation of these networks. Based on our ndings that the conventional protocols of direct transmission, minimum-transmission-energy, multihop routing, and static clustering may not be optimal for sensor networks, we propose LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. Simulations show that LEACH can achieve as much as a factor of 8 reduction in energy dissipation compared with conventional routing protocols. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated.

11,412 citations


Patent
02 Nov 2000
TL;DR: In this paper, a system and method for voice transmission over high level network protocols is presented, where variable compression based on silence detection takes advantage of the natural silences and pauses in human speech, thus reducing the delays in transmission caused by using HTTP/TCP.
Abstract: A system and method for voice transmission over high level network protocols. On the Internet and the World Wide Web, such high level protocols are HTTP/TCP. The restrictions imposed by firewalls and proxy servers are avoided by using HTTP level connections to transmit voice data. In addition, packet delivery guarantees are obtained by using TCP instead of UDP. Variable compression based on silence detection takes advantage of the natural silences and pauses in human speech, thus reducing the delays in transmission caused by using HTTP/TCP. The silence detection includes the ability to bookend the voice data sent with small portions of silence to insure that the voice sounds natural. Finally, the voice data is transmitted to each client computer independently from a common circular list of voice data, thus insuring that all clients will stay current with the most recent voice data. The combination of these features enables simple, seamless, and interactive Internet conferencing.

1,129 citations


Journal ArticleDOI
TL;DR: The Virtual Inter Network Testbed (VINT) project as discussed by the authors has enhanced its network simulator and related software to provide several practical innovations that broaden the conditions under which researchers can evaluate network protocols.
Abstract: Network researchers must test Internet protocols under varied conditions to determine whether they are robust and reliable. The paper discusses the Virtual Inter Network Testbed (VINT) project which has enhanced its network simulator and related software to provide several practical innovations that broaden the conditions under which researchers can evaluate network protocols.

784 citations


Patent
14 Jun 2000
TL;DR: In this article, the authors present a system for managing a distributed network (10) environment including a plurality of computers (22,24) interconnected by a network link (24), where at least some of the computers include a layered communication protocol stack for providing a data interface between an application program (98, 122) and the network link, the communications stack having a transport protocol layer for providing an end-to-end communications connection.
Abstract: Software, system and methods for managing a distributed network (10) environment including a plurality of computers (22,24) interconnected by a network link (24), where at least some of the computers include a layered communication protocol stack (92) for providing a data interface between an application program (98, 122) and the network link, the communications stack having a transport protocol layer (124) for providing an end-to-end communications connection The invention includes a control module (132) and a plurality of agents (70), each agent being associated with one of the computers and adapted to dynamically monitor the associated computer at a data transmission point between an application program running on the computer and the transport protocol layer and repeatedly communicate with the control module (132) in order to effect management of the distributed network system The invented software, system and methods may also include a messaging feature for providing users, IT personnel, or various management systems with informative messages concerning network conditions and network resources

444 citations


Proceedings ArticleDOI
11 Aug 2000
TL;DR: SensorSim is introduced, a simulation framework that introduces new models and techniques for the design and analysis of sensor networks and builds up new features that include ability to model power usage in sensor nodes, hybrid simulation that allows the interaction of real and simulated nodes, new communication protocols and real time user interaction with graphical data display.
Abstract: The advent of wireless micro sensors promises many yet unrealized benefits. A network of such sensors or “sensor network” introduces a new set of challenges. Besides being able to communicate effectively, sensor networks have demanding sensing tasks. First, they must be aware of their environment and oftentimes are required to adapt to their surroundings. Second, they must coordinate among them to perform a greater group-sensing task. In this context, the study of sensor networks has numerous other aspects besides communication. To create a better understanding of sensor networks and to facilitate the development of new protocols and applications, detailed simulation and performance evaluation techniques need to be developed. In this paper, we introduce our ongoing efforts in the development of SensorSim, a simulation framework that introduces new models and techniques for the design and analysis of sensor networks. SensorSim inherits the core features of traditional event driven network simulators, and builds up new features that include ability to model power usage in sensor nodes, hybrid simulation that allows the interaction of real and simulated nodes, new communication protocols and real time user interaction with graphical data display. After discussing the details of SensorSim, we provide our current results, that demonstrate various capabilities of SensorSim.

365 citations


Patent
24 Mar 2000
TL;DR: In this article, a communication link is established between a smart card and a computer using a valid smart card communication protocol, and a digital signal processor having at least two demodulators demodulates an incoming data stream produced by the receiver in a dynamically reconfigurable manner.
Abstract: A communication link is established between the smart card and a computer using a valid smart card communication protocol. A smart card communication device determines the valid smart card communication protocol used by a smart card by polling a communication channel using a plurality of smart card communication protocols until a valid acknowledgment message is received. A radio frequency circuit is configured to communicate with the smart card using the valid smart card communication protocol. A digital signal processor having at least two demodulators demodulates an incoming data stream produced by the receiver in accordance with the valid smart card communication protocol in a dynamically reconfigurable manner.

323 citations


Patent
24 Mar 2000
TL;DR: In this paper, a distributed network of specialized nodes of two types is dispersed around the Internet, and a web client's requests are directed to a node of the first type chosen to be close to the client, and the client communicates with this node using a standard protocol such as HTTP.
Abstract: The present invention provides a method and apparatus for increasing the performance of world-wide-web traffic over the Internet. A distributed network of specialized nodes of two types is dispersed around the Internet. A web client's requests are directed to a node of the first type chosen to be close to the client, and the client communicates with this node using a standard protocol such as HTTP. This first node receives the request, and communicates the request to a node of the second type chosen to be close to the request's ultimate destination (e.g., a web server capable of generating a response to the request.) The first node communicates the request to the second node using a different, specialized, protocol that has been designed for improved performance and specifically to reduce traffic volume and to reduce latency. The second node receives communication from the first node using this specialized protocol, converts it back to a standard protocol such as HTTP, and forwards the request to the destination computer or server. Responses from the destination to the client take the corresponding reverse route, and also are carried over a specialized protocol between the two nodes. In addition, these nodes can employ other techniques such as web caches that avoid or improve some communication steps. Thus, specialized, proprietary, or complex protocols and techniques can be quickly deployed to enhance web performance without requiring significant changes to the clients or servers.

244 citations


Patent
06 Nov 2000
TL;DR: In this paper, the authors proposed to transmit the Radio Open Shortest Path First (ROSPF) LSA type packet within an intranet protocol beacon type or node status packet that is periodically broadcasted within the network.
Abstract: A wireless network includes a plurality of nodes arranged into clusters with each cluster having cluster member nodes and a designated cluster head node. The nodes communicate with each other via an intranet protocol, while the network may communicate with other external networks in accordance with an internetworking protocol (e.g., a Radio Open Shortest Path First (ROSPF) protocol). A database within each network node contains link information for that node, while ROSPF Link-State Advertisement (LSA) type packets or database update messages contain information to update the node databases. The ROSPF LSA type packets are transmitted to neighbors of each node to enable each database to maintain current information. In order to reduce overhead of transmitting numerous LSA type packets, the present invention transmits the ROSPF LSA type packet within an intranet protocol beacon type or node status packet that is periodically broadcasted within the network.

200 citations


Patent
21 Dec 2000
TL;DR: The PNUT protocol as mentioned in this paper is a hardware-based network communication protocol that does not require the full TCP/IP stack and may be utilized for exchanging commands and information with such PLD-based and other devices.
Abstract: Methods and systems for a PLD-based network update transport (PNUT) protocol that utilizes UDP and other protocols for transmitting update or other commands or information over a packet-based or IP network. PNUT is a hardware-based network communication protocol that does not require the full TCP/IP stack and may be utilized for exchanging commands and information with such PLD-based and other devices. Protocols may include a set of core commands and a set of custom commands. Logic components within the PLD-based devices may consist of a command dispatcher, a transmitter/controller, a MAC receiver, a MAC transmitter, a packet parser, a packet generator, and core receiving and transmitting commands. The present invention may be implemented without requiring CPU cores, special controllers, stringent timings, or operating systems as compared with conventional network protocols. Various methods for exchanging and updating PNUT commands are disclosed. The methods and systems of the present invention may be utilized to provide other functions, such as filtering, logging, polling, testing, debugging, and monitoring, and may be implemented between a server and a PLD-based device or solely between PLD-based devices.

177 citations


Patent
15 Feb 2000
TL;DR: In this paper, a generic protocol translator including a receiver circuit manager (92) wich receives source information using a socket-type interface (104), the source information then passes through a receiver, a message queue (108), a message router (112), and a message converter (110), which converts the information to the destination format using a multi-stage pipelined poly-dimensioned finite state automata based conversion process.
Abstract: A generic protocol translator including a receiver circuit manager (92) wich receives source information using a socket-type interface (104). The source information then passes through a receiver (106), a message queue (108), a message router (112), and a message converter (110), which converts the information to the destination format using a multi-stage pipelined poly-dimensioned finite state automata based conversion process. The converted message is then sent to the destination device via the message router (112) after being reformatted into the destination protocol identified during the conversion process. The generic protocol translator frees device developers from concerning themselves with the details of existing and future protocols, data formats or application semantics that they must support for inter-device compatibility.

Journal ArticleDOI
TL;DR: The goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such thatThis delay is guaranteed.
Abstract: In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have further investigated the impact of particular communication infrastructures and protocols on the overall performance and, specially, how the requirements of such an infrastructure have to be considered for process and communication scheduling. Not only do particularities of the underlying architecture have to be considered during scheduling but also the parameters of the communication protocol should be adapted to fit the particular embedded application. The optimization algorithm, which implies both process scheduling and optimization of the parameters related to the communication protocol, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications.

Patent
22 Aug 2000
TL;DR: In this article, a method for providing integrated voice, video, and data content in an integrated service offering to one or more customer premises includes receiving television programming from a programming source, receiving data from a data network, and receiving telephone communications from a telephone network.
Abstract: A method for providing integrated voice, video, and data content in an integrated service offering to one or more customer premises includes receiving television programming from a programming source, receiving data from a data network, and receiving telephone communications from a telephone network. The method further includes placing the television programming, data, and telephone communications in a common format for integrated communication over a single network infrastructure using a common communication protocol. In addition, the method includes communicating the integrated television programming, data, and telephone communications in the common format over the single network infrastructure using the common communication protocol to one or more customer premises to provide the integrated service offering.

Patent
17 Oct 2000
TL;DR: In this paper, a communication multiplexer device that allows communications between a gaming machine and one or more game service servers all within a single network interface is described, where a single wired or wireless network interface may be a wireless or wired network interface.
Abstract: A gaming machine with a communication multiplexer device that allows communications between the gaming machine and one or more game service servers all within a single network interface is described. The single network interface may be a wireless or wired network interface. The communication multiplexer device converts messages in native communication protocols used by the gaming machine to a network communication protocol such as TCP/IP for transmission over the single wired or wireless network interface. The communication multiplexer is designed such that the gaming machine may receive messages that have been transmitted using the native communication protocols without modifying regulated gaming software on the gaming machine.

Book ChapterDOI
06 Nov 2000
TL;DR: This compilation defines non-ambiguous operational semantics for protocols and intruder behavior: they are rewrite systems executed by applying a variant of ac-narrowing, which permitted us to derive security flaws in many classical cryptographic protocols.
Abstract: We propose a direct and fully automated translation from standard security protocol descriptions to rewrite rules. This compilation defines non-ambiguous operational semantics for protocols and intruder behavior: they are rewrite systems executed by applying a variant of ac-narrowing. The rewrite rules are processed by the theorem-prover daTac. Multiple instances of a protocol can be run simultaneously as well as a model of the intruder (among several possible). The existence of flaws in the protocol is revealed by the derivation of an inconsistency. Our implementation of the compiler CASRUL, together with the prover daTac, permitted us to derive security flaws in many classical cryptographic protocols.


Journal ArticleDOI
TL;DR: This paper describes the design and analysis of a low‐power medium access control protocol for wireless/mobile ATM networks and a comparison of energy consumption to a number of other protocols indicates the EC‐MAC has, in general, better energy consumption characteristics.
Abstract: This paper describes the design and analysis of a lowdpower medium access control lMACr protocol for wireless/mobile ATM networks. The protocol – denoted ECdMAC lenergy conserving medium access controlr – is designed to support different traffic types with qualitydofdservice lQoSr provisions. The network is based on the infrastructure model where a base station lBSr serves all the mobiles currently in its cell. A reservationdbased approach is proposed, with appropriate scheduling of the requests from the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is used to schedule the transmission requests of the mobiles. Discretedevent simulation has been used to study the performance of the protocol. A comparison of energy consumption of the ECdMAC to a number of other protocols is provided. This comparison indicates the ECdMAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol with respect to different qualitydofdservice parameters using video, audio and data traffic models is provided.

Patent
21 Aug 2000
TL;DR: In this article, the authors present a TCP/IP protocol suite for sending and receiving data with reliable communication protocol, which includes a computer at a node having a backplane, a CPU board, software instructions for the CPU, and a special network board plugged into the backplane.
Abstract: A system and method for sending and receiving data with a reliable communication protocol. The system includes a computer at a node having a backplane, a CPU board plugged into the backplane, software instructions for the CPU, and a special network board plugged into the backplane. The CPU board, software, and network card act to implement the TCP/IP protocol suite. The network card or board includes an interface to receive data packets from the physical layer, and circuitry to verify the TCP checksum before de-encapsulation and routing of the TCP segment by the network layer software. It also includes circuitry to automatically prepare the acknowledgement signal to be sent by the receiving computer to the sending computer. It additionally includes circuitry to calculate the error detecting code on outgoing signals from the sending computer to the receiving computer.

Patent
Heikki Salovuori1
29 Nov 2000
TL;DR: In this article, the authors propose a method of routing calls in a telecommunication system comprising a mobile communication system comprising at least one mobile services switching center and at least three base stations connected thereto, and mobile stations where from a tele-communication connection is established to the mobile service switching centre through the base station by using a first predetermined signalling protocol on a radio connection.
Abstract: A method of routing calls in a telecommunication system comprising a mobile communication system comprising at least one mobile services switching centre and at least one base station connected thereto, and mobile stations wherefrom a telecommunication connection is established to the mobile services switching centre through the base station by using a first predetermined signalling protocol on a radio connection. The telecommunication system further comprises a packet data network wherein data to be transmitted is transmitted in data packets, according to a protocol specified for the packet data network, a server communicating with the mobile services switching centre and the packet data network, wherefrom a telecommunication connection is established through the packet data network and the server to the mobile switching centre. In the server, messages according to the first signalling protocol supplied from the mobile services switching centre are as such arranged into data packets according to the packet data network protocol to be forwarded through the packet data network to the terminal. Furthermore in the server, messages according to the first signalling protocol arranged as such in the data packets according to the packet data network protocol and supplied from the packet data network are decompressed to be forwarded to the mobile switching centre. The terminal transmits and receives the messages according to the first signalling protocol arranged as such into the data packets according to the packet data network protocol and emulates a mobile station using the first signalling protocol.

Proceedings ArticleDOI
05 Nov 2000
TL;DR: A methodology and efficient algorithms for the design of high-performance system-on-chip communication architectures that automatically and optimally maps the various communications between system components onto a target communication architecture template that can consist of an arbitrary interconnection of shared or dedicated channels.
Abstract: In this paper, we present a methodology and efficient algorithms for the design of high-performance system-on-chip communication architectures. Our methodology automatically and optimally maps the various communications between system components onto a target communication architecture template that can consist of an arbitrary interconnection of shared or dedicated channels. In addition, our techniques simultaneously configure the communication protocols of each channel in the architecture in order to optimize system performance. We motivate the need for systematic exploration of the communication architecture design space, and highlight the issues involved through illustrative examples. We present a methodology and algorithms that address these issues, including the size and complexity of the design space. We present experimental results on example systems, including a cell forwarding unit of an ATM switch, that demonstrate the benefits of using the proposed techniques. Experimental results indicate that our techniques are successful in achieving significant improvements in system performance over conventional communication architectures (observed speedups over typical architectures such as single shared buses averaged 53%). Moreover, we demonstrate that our design space exploration methodology and optimization algorithms are efficient (low CPU times), underlining their usefulness as part of any system design flow.

Patent
29 Jun 2000
TL;DR: In this article, the authors present a method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application.
Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.

Proceedings ArticleDOI
26 Mar 2000
TL;DR: A new signaling protocol for mobile hosts to reserve resources in the integrated services Internet using the RSVP model based on IP multicast to support mobile hosts and the extended reservation model is proposed.
Abstract: The resource reservation mechanism is essential for QoS provisioning in integrated services networks. The resource reservation protocol (RSVP) is a receiver oriented resource reservation protocol, and an Internet standard approved by the Internet Engineering Task Force (IETF). However, the RSVP designed for the fixed network has been facing a great challenge owing to the participation of wireless networks. In this paper, we describe a new signaling protocol for mobile hosts to reserve resources in the integrated services Internet. Under our approach, we extend the RSVP model based on IP multicast to support mobile hosts. The mobility of a host is modeled as a transition in multicast group membership. Provision of QoS in wireless networks is more complex than in wired networks due to user mobility. To overcome the mobility impact on service guarantees, mobile hosts need to make resource reservation in advance at the locations it may visit during the lifetime of the connections. These locations become the leaves of the multicast tree in our design. To obtain more efficient use of scarce wireless bandwidth, we propose the extended reservation model. A mobile proxy in a cell is required to manage resource reservations and other mobility related tasks on behalf of mobile hosts. The mobility impacts on packet delay, bandwidth utilization and packet loss rate are investigated via simulations.

Patent
20 Dec 2000
TL;DR: In this article, the authors present a messaging system, method, and computer program product, including a client device having stored therein a client application, which is adapted to be executed by the client device, a server having stored inside a server application which is adaptively run by the server, and a message router including means for authenticating an origin of the message, wherein the authenticating means authenticates the origin before the message is routed by the message router.
Abstract: A messaging system, method, and computer program product is disclosed, including a client device having stored therein a client application, which is adapted to be executed by the client device, a server having stored therein a server application, which is adapted to be executed by the server, a plurality of wireless networks, each of which is adapted to communicate messages between the client device and the server, and support one or more wireless network protocols, a protocol gateway encapsulating a fundamental network protocol, which underlies each of the one or more wireless network protocols, means for communicating a message between the client application and the server application, over a selected wireless network protocol through the protocol gateway, independent of the selected wireless network protocol, and a message router for routing the message between the protocol gateway and the server, the message router including means for authenticating an origin of the message, wherein the authenticating means authenticates the origin before the message is routed by the message router, and a database, which is accessible by the message router and adapted to store information relating to routing and authentication of the message. Moreover, the present invention features methods of communicating such messages over wireless networks efficiently, without requiring significant bandwidth, a valuable resource in wireless networks.

Journal ArticleDOI
28 Aug 2000
TL;DR: In writing networking code, one is often faced with the task of interpreting a raw buffer according to a standardized packet format, for example, when monitoring network traffic for specific kinds of packets, or when unmarshaling an incoming packet for protocol processing.
Abstract: In writing networking code, one is often faced with the task of interpreting a raw buffer according to a standardized packet format. This is needed, for example, when monitoring network traffic for specific kinds of packets, or when unmarshaling an incoming packet for protocol processing. In such cases, a programmer typically writes C code that understands the grammar of a packet and that also performs any necessary byte-order and alignment adjustments. Because of the complexity of certain protocol formats, and because of the low-level of programming involved, writing such code is usually a cumbersome and error-prone process. Furthermore, code written in this style loses the domain-specific information, viz. the packet format, in its details, making it difficult to maintain.

Proceedings ArticleDOI
23 Sep 2000
TL;DR: Preliminary quantitative results from data collected during runs of the multi-hop wireless ad hoc network testbed show that the network successfully carried a composite workload including voice, bulk data, and real-time data.
Abstract: This paper presents preliminary quantitative results from data collected during runs of our multi-hop wireless ad hoc network testbed. The network successfully carried a composite workload including voice, bulk data, and real-time data. Careful analysis of recorded runs highlights radio propagation issues that network protocols will need to address in the future.

Journal ArticleDOI
TL;DR: A communications and control infrastructure for distributed mobile robotics, which makes use of wireless local area network (WLAN) technology and Internet Protocols (IPs), results in a powerful platform for conducting experiments into collective or co-operative robotics.

Journal ArticleDOI
TL;DR: Nam, the network animator that was developed in the work at the VINT project, provides packet-level animation, protocol graphs, traditional time-event plots of protocol actions, and scenario editing capabilities.
Abstract: Network protocol designers face many difficult tasks, including simultaneously monitoring state in a potentially large number of nodes, understanding and analyzing complex message exchanges, and characterizing dynamic interactions with competing traffic. Traditionally they have used packet traces to accomplish these tasks, but traces have two major drawbacks: they present an incredible amount of detail, which challenges the designer's ability to comprehend the data; and they are static, which hides an important dimension of protocol behavior. As a result, detailed analysis frequently becomes tedious and error-prone. Although network simulators such as the VINT project's ns can easily generate numerous detailed traces, they provide limited help for analyzing and understanding the data. Nam, the network animator that we developed in our work at the VINT project, provides packet-level animation, protocol graphs, traditional time-event plots of protocol actions, and scenario editing capabilities. Nam benefits from a close relationship with ns, which can collect detailed protocol information from a simulation. With some preprocessing. Nam can visualize data taken directly from real network traces.

Patent
22 Nov 2000
TL;DR: An inter-application data transmitting system has an application intermediary unit which mediates data to be transmitted between a network and one of multiple business applications for exchanging the data among the multiple applications interconnected over the network without changing the business application even if the access procedures, data formats, and communication protocols of the different applications are different from each other as discussed by the authors.
Abstract: An inter-application data transmitting system having an application intermediary unit which mediates data to be transmitted between a network and one of multiple business applications for exchanging the data among the multiple applications interconnected over the network without changing the business application even if the access procedures, data formats, and communication protocols of the multiple applications are different from each other. The application intermediary unit is provided with an access procedure control unit for controlling an access procedure, a data format conversion unit for converting a data format, and a communication control unit for controlling communication between the multiple business applications having different communication protocols. The application intermediary unit further includes an application control unit for controlling those elements.

Proceedings ArticleDOI
01 Nov 2000
TL;DR: This paper describes experiments showing that SOAP by itself is not efficient enough for large scale scientific applications, but when it is embedded in multi-protocol RMI framework, SOAP can be effectively used as a universal control protocol, that can be swapped out by faster, more special purpose protocols when large data transfer speeds are needed.
Abstract: Distributed software component architectures provide promising approach to the problem of building large scale, scientific Grid applications [18]. Communication in these component architectures is based on Remote Method Invocation (RMI) protocols that allow one software component to invoke the functionality of another. Examples include Java remote method invocation (Java RMI)[25] and the new Simple Object Access Protocol (SOAP) [15]. SOAP has the advantage that many programming languages and component frameworks can support it. This paper describes experiments showing that SOAP by itself is not efficient enough for large scale scientific applications. However, when it is embedded in multi-protocol RMI framework, SOAP can be effectively used as a universal control protocol, that can be swapped out by faster, more special purpose protocols when large data transfer speeds are needed.

Patent
22 Dec 2000
TL;DR: In this article, the integration of information content from a network, such as the Internet, with the network-enabling hardware and software of the present invention provides a flexible inexpensive way to enhance the overall utility and range of capabilities of a system of networked devices in a device-independent network application.
Abstract: A network and system of electrical devices comprising a device-independent controller, a device-dependent controller, a console through which a user interfaces with the system, and a communication protocol for network-enabling the devices, and a method for such network-enablement are described. The integration of information content from a network, such as the Internet, with the network-enabling hardware and software of the present invention provides a flexible inexpensive way to enhance the overall utility and range of capabilities of a system of networked devices in a device-independent network application.