The continued expansion of computer networks and the miniaturization of computers increase the desire to use one's computer in a consistent computational environment, regardless of location and time. In this situation, host migration transparency is very important. This paper introduces a new network architecture which provides host migration transparency in large interconnected networks and proposes a protocol based on the propagating cache method. We introduce the concept virtual network and divide the conventional network layer into two sublayers to realize host migration transparency. Virtual Internet Protocol,or VIP for short, is derived from DARPA-IP as an example of the architecture.We estimate the overhead of VIP. Host migration transparency can be realized without significant processing and traffic overhead. This architecture also preserves host migration transparency across virtual circuits in radio networks.
Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can access to the data even without access to back-end databases. One of the major issues to make use of the user memory bank is detection of memory tampering. Although technology vendors start introducing new functionalities such as fine grained locking along with high capacity user memory, these tags with new functionalities require new non-standardized air protocol to operate -require modified version of reader/writers. Also, these tags are usually more expensive. In this paper, we introduce a novel approach to this problem: tag side write journaling mechanism and "Tag Memory Cloaking," which protect the journal by using. Tag Private Memory region, which is only readable and not writable from external devices such as a reader/writer, but writable by tag itself. Also, any write to the user memory automatically add journal entry -offset and length of the write -into the Tag Private Memory region. Later, a user can check existence of overlapped writes to user memory by checking the journal records. Since we have not modified any of air protocol, standard compliant read/writer can fully capable of all of our proposed operations: write to the tag, read, then detect unusual modification to user memory area. We have implemented the functionality to Programmable Battery Assisted Passive tag (BAP), then validated the method with several standard compliant reader/writers.
We developed a new technology that does the acquisition, stable tracking, and fast handover for free space optical links to highspeed trains. Our prototype provided a stable communication link between a train and the ground at a data rate near 1 Gb∕s with a handover time on the order of 100 ms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.