Subscribe:

Pages

Saturday, August 1, 2009

Datagram Congestion Control Protocol (DCCP)

Fast-growing Internet applications like streaming media and telephony prefer timeliness to reliability, making TCP a poor fit. Unfortunately, UDP, the natural alternative, lacks con- gestion control. High-bandwidth UDP applications must im- plement congestion control themselves a difficult task or risk rendering congested networks unusable. We set out to ease the safe deployment of these applications by designing a congestion-controlledunreliable transport protocol. The out- come, the Datagram Congestion Control Protocol or DCCP, addstoaUDP-like foundation the minimum mechanisms necessary to support congestion control.We thought those mechanisms would resembleTCPs,but without reliability and,especially,cumulative acknowledgements,we had to reconsider almost every aspect of TCPs design. The resulting protocol sheds light on how congestion control interacts with unreliable transport, how modern network constraints impact protocol design, and how TCPs reliable byte stream semantics intert wine with it so thermechanisms,including congestion control.

NEW SENSOR TECHNOLOGY

Scientists have developed and demonstrated a fluorescence-based chemical sensor that is more compacting, versatile and less expensive than existing technology of its kind. The new sensor holds promise for myriad potential applications, such as monitoring oxygen, inorganic gases, volatile organic compounds, biochemical compounds. Selecting the right sensors is critical to implementing any military control-based subsystem in which the key factors are accuracy, precision, the ability to meet the environmental range of the intended application and cost.Mainly used two techniques are sensor web and video sensor technology. The Sensor Web is a type of sensor network or geographic information system (GIS) that is especially well suited for environmental monitoring and control.An amorphous network of spatially distributed sensor platforms (pods) that wirelessly communicate with each other. This amorphous architecture is unique since it is both synchronous and router-free, making it distinct from the more typical TCP/IP-like network schemes. The architecture allows every pod to know what is going on with every other pod throughout the Sensor Web at each measurement cycle. The word video sensor (also video-sensor or videosensors) describes a technique of digital image analysis. A video sensor is an application software, which supports the interpretation of digital images and frame rates. Video sensors emerge by programming digital algorithms. The carrier platform of a video sensor is a computer, which in turn is usually equipped with a Linux or Microsoft operating system. Video sensors are being installed on top of one of the mentioned operating systems. And in combination with the carrier platform, it represents a video sensor system. Video sensors are being used to evaluate scenes und sequences within an image section of a (CCD)camera.

JAVA MANAGEMENT EXTENSION (JMX)

Java Management Extensions (JMX) technology provides the tools for building distributed, Web-based, modular and dynamic solutions for managing and monitoring devices, applications, and service-driven networks. This standard is suitable for adapting legacy systems, implementing new management and monitoring solutions, and plugging into those of the future. JMX components are defined by the Java Management Extensions Instrumentation and Agent Specification. JMX is a standard for managing and monitoring all aspects of software and hardware components from Java. JMX defined three levels of entities including, 1) Instrumentation, which are the resources to be managed, 2) Agents, which are the controllers of the instrumentation level objects, and 3) Distributed Services, the mechanism by which administration applications interact with agents and their managed objects.

WIRELESS MESH NETWORKS

As various wireless networks evolve into the next generation to provide better services, a key technology, Wireless Mesh Networks (WMNs), has emerged recently. In WMNs, nodes are comprised of mesh routers and mesh clients. Each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within direct wireless transmission range of their destinations. A node can send and receive messages, and in a mesh network, a node also functions as a router and can relay messages for its neighbors. Through the relaying process, a packet of wireless data will find its way to its destination, passing through intermediate nodes with reliable communication links. A mesh network offers multiple redundant communications paths throughout the network. If one link fails for any reason, the network automatically routes messages through alternate paths. A WMN is dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among themselves (creating, in effect, an ad hoc network). This feature brings many advantages to WMNs such as low up-front cost, easy network maintenance, robustness, reliable service coverage and also provides a flexible architecture

DNA AND DNA COMPUTING IN SECURITY

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication. Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in todays security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today

BEHAVIORAL CLONING

Controlling a complex dynamic system such as a plane or a crane usually requires a skilled operator. Such a control skill is typically hard to reconstruct through introspection. Therefore an attractive approach to the reconstruction of control skill involves machine learning from operators control traces also known as behavioral cloning. Behavioral cloning is a method by which a machine learns control skills through observing what a human controller would do in a certain set of circumstances. It seeks to build a robust and explainable model by learning from the traces of a skilled operators behavior.



More details :
See full size image


Ferroelectric Random Access Memory

Ferroelectric Random Access Memory Before the 1950s, ferromagnetic cores were the only type of random-access, nonvolatile memories available. A core memory is a regular array of tiny magnetic cores that can be magnetized in one of two opposite directions, making it possible to store binary data in the form of a magnetic field. The success of the core memory was due to a simple architecture that resulted in a relatively dense array of cells. This approach was emulated in the semiconductor memories of today (DRAMs, EPROMs, and FRAMs). Ferromagnetic cores, however, were too bulky and expensive compared to the smaller, low-power semiconductor memories. In place of ferromagnetic cores ferroelectric memories are a good substitute. The term ferroelectric indicates the similarity, despite the lack of iron in the materials themselves. Ferroelectric memory is a new type of semiconductor memory, which exhibit short programming time, low power consumption and nonvolatile memory, making highly suitable for application like contact less smart card, digital cameras which demands many memory write operations. A ferroelectric memory technology consists of a complementary metal-oxide-semiconductor (CMOS) technology with added layers on top for ferroelectric capacitors. A ferroelectric memory cell has at least one ferroelectric capacitor to store the binary data, and one transistor that provide access to the capacitor or amplify its content for a read operation. Once a cell is accessed for a read operation, its data are presented in the form of an analog signal to a sense amplifier, where they are compared against a reference voltage to determine their logic level. Ferroelectric memories have borrowed many circuit techniques (such as folded-bit line architecture) from DRAMs due to similarities of their cells and DRAMs maturity. Some architectures are reviewed here