WorldWideScience

Sample records for debugging internet multicast

  1. High Performance Computing Multicast

    Science.gov (United States)

    2012-02-01

    A History of the Virtual Synchrony Replication Model,” in Replication: Theory and Practice, Charron-Bost, B., Pedone, F., and Schiper, A. (Eds...Performance Computing IP / IPv4 Internet Protocol (version 4.0) IPMC Internet Protocol MultiCast LAN Local Area Network MCMD Dr. Multicast MPI

  2. Scalable Multicasting over Next-Generation Internet Design, Analysis and Applications

    CERN Document Server

    Tian, Xiaohua

    2013-01-01

    Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity to good use in designing a scalable multicast  protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet’s next incarnation is a research hot-spot in the computer communications field.   The methodical presentation deals with the key questions in turn: from the mechanics of multicast protocols to current state-of-the-art designs, and from methods of theoretical analysis of these protocols to applying them in the ns2 network simulator, known for being hard to extend. The authors’ years of research in the field inform this thorough treatment, which covers details such as applying AOM (application-oriented multicast) protocol to IPTV provision and resolving...

  3. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  4. End-to-End Mechanisms for Rate-Adaptive Multicast Streaming over the Internet

    OpenAIRE

    Rimac, Ivica

    2005-01-01

    Continuous media applications over packet-switched networks are becoming more and more popular. Radio stations, for example, already use streaming technology to disseminate their content to users on the Internet, and video streaming services are expected to experience similar popularity. In contrast to traditional television and radio broadcast systems, however, prevalent Internet streaming solutions are based on unicast communication and raise scalability and efficiency issues. Multicast com...

  5. Application Layer Multicast

    Science.gov (United States)

    Allani, Mouna; Garbinato, Benoît; Pedone, Fernando

    An increasing number of Peer-to-Peer (P2P) Internet applications rely today on data dissemination as their cornerstone, e.g., audio or video streaming, multi-party games. These applications typically depend on some support for multicast communication, where peers interested in a given data stream can join a corresponding multicast group. As a consequence, the efficiency, scalability, and reliability guarantees of these applications are tightly coupled with that of the underlying multicast mechanism.

  6. Design of an IPTV Multicast System for Internet Backbone Networks

    Directory of Open Access Journals (Sweden)

    T. H. Szymanski

    2010-01-01

    Full Text Available The design of an IPTV multicast system for the Internet backbone network is presented and explored through extensive simulations. In the proposed system, a resource reservation algorithm such as RSVP, IntServ, or DiffServ is used to reserve resources (i.e., bandwidth and buffer space in each router in an IP multicast tree. Each router uses an Input-Queued, Output-Queued, or Crosspoint-Queued switch architecture with unity speedup. A recently proposed Recursive Fair Stochastic Matrix Decomposition algorithm used to compute near-perfect transmission schedules for each IP router. The IPTV traffic is shaped at the sources using Application-Specific Token Bucker Traffic Shapers, to limit the burstiness of incoming network traffic. The IPTV traffic is shaped at the destinations using Application-Specific Playback Queues, to remove residual network jitter and reconstruct the original bursty IPTV video streams at each destination. All IPTV traffic flows are regenerated at the destinations with essentially zero delay jitter and essentially-perfect QoS. The destination nodes deliver the IPTV streams to the ultimate end users using the same IPTV multicast system over a regional Metropolitan Area Network. It is shown that all IPTV traffic is delivered with essentially-perfect end-to-end QoS, with deterministic bounds on the maximum delay and jitter on each video frame. Detailed simulations of an IPTV distribution system, multicasting several hundred high-definition IPTV video streams over several essentially saturated IP backbone networks are presented.

  7. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  8. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  9. Multisites Coordination in Shared Multicast Trees

    National Research Council Canada - National Science Library

    Dommel, H-P; Garcia-Luna-Aceves, J. J

    1999-01-01

    .... The protocol supports Internet-wide coordination for large and highly interactive groupwork, relying on transmission of coordination directives between group members across a shared end-to-end multicast tree...

  10. A Scalable and Fault-Tolerant Architecture for Internet Multicasting Using Meshes

    National Research Council Canada - National Science Library

    Garcia-Luna-Aceves, J. J; Balasubramaniyan, Saravanan; Balakrishnan, Ramesh

    2002-01-01

    ... communication within a group. A new protocol is presented for the creation and management of multicast meshes that substitute for the traditional multicast trees as the underlying routing structure for multipoint communication within groups...

  11. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    Science.gov (United States)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  12. Optimización multiobjetivo para enrutamiento multicast en overlay networks utilizando algoritmos evolutivos Multiobjective Optimization for Multicast Routing in Overlay Networks using Evolutionary Algorithms

    Directory of Open Access Journals (Sweden)

    Juan Carlos Montoya M.

    2008-06-01

    Full Text Available Multicast juega un papel muy importante para soportar una nueva generación de aplicaciones. En la actualidad y por diferentes razones, técnicas y no técnicas, multicast IP no ha sido totalmente adoptado en Internet. Durante los últimos a˜nos, un área de investigación activa es la de implementar este tipo de tráfico desde la perspectiva del nivel de aplicación, donde la funcionalidad de multicast no es responsabilidad de los enrutadores sino de los hosts, a lo que se le conoce como Multicast Overlay Network (MON. En este artículo se plantea el enrutamiento en MON como un problema de Optimización Multiobjetivo (MOP donde se optimizan dos funciones: 1 el retardo total extremo a extremo del árbol multicast, y 2 la máxima utilización de los enlaces. La optimización simultánea de estas dos funciones es un problema NP completo y para resolverlo se propone utilizar Algoritmos Evolutivos Multiobjetivos (MOEA, específicamente NSGAIMulticast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non–technical, multicast IP hasn’t yet been totally adopted for Internet. During recent years, an active area of research is that of implementing this kind of traffic in the application layer where the multicast functionality isn´t a responsibility of the routers but that of the hosts, which we know as Multicast Overlay Networks (MON. In this article, routing in an MON is put forward as a multiobjective optimization problem (MOP where two functions are optimized: 1 the total end to end delay of the multicast tree and 2 the maximum link utilization. The simultaneous optimization of these two functions is an NP–Complete problem and to solve this we suggest using Multiobjective Evolutionary Algorithms (MOEA, specifically NSGA–II.

  13. TinyDebug

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    2011-01-01

    Debugging embedded wireless systems can be cumbersome due to low visibility. To ease the task of debugging this paper present TinyDebug which is a multi-purpose passive debugging framework for developing embedded wireless sys- tems. TinyDebug is designed to be used throughout the entire system...... logging to extraction and show how the frame- work improves upon existing message based and event log- ging debugging techniques while enabling distributed event processing. We also present a number of optional event anal- ysis tools demonstrating the generality of the TinyDebug debug messages....

  14. Lightweight and Statistical Techniques for Petascale PetaScale Debugging

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Barton

    2014-06-30

    to a small set of nodes or by identifying equivalence classes of nodes and sampling our debug targets from them. We implemented these techniques as lightweight tools that efficiently work on the full scale of the target machine. We explored four lightweight debugging refinements: generic classification parameters, such as stack traces, application-specific classification parameters, such as global variables, statistical data acquisition techniques and machine learning based approaches to perform root cause analysis. Work done under this project can be divided into two categories, new algorithms and techniques for scalable debugging, and foundation infrastructure work on our MRNet multicast-reduction framework for scalability, and Dyninst binary analysis and instrumentation toolkits.

  15. Dynamic multicast routing scheme in WDM optical network

    Science.gov (United States)

    Zhu, Yonghua; Dong, Zhiling; Yao, Hong; Yang, Jianyong; Liu, Yibin

    2007-11-01

    During the information era, the Internet and the service of World Wide Web develop rapidly. Therefore, the wider and wider bandwidth is required with the lower and lower cost. The demand of operation turns out to be diversified. Data, images, videos and other special transmission demands share the challenge and opportunity with the service providers. Simultaneously, the electrical equipment has approached their limit. So the optical communication based on the wavelength division multiplexing (WDM) and the optical cross-connects (OXCs) shows great potentials and brilliant future to build an optical network based on the unique technical advantage and multi-wavelength characteristic. In this paper, we propose a multi-layered graph model with inter-path between layers to solve the problem of multicast routing wavelength assignment (RWA) contemporarily by employing an efficient graph theoretic formulation. And at the same time, an efficient dynamic multicast algorithm named Distributed Message Copying Multicast (DMCM) mechanism is also proposed. The multicast tree with minimum hops can be constructed dynamically according to this proposed scheme.

  16. An Efficient SDN Multicast Architecture for Dynamic Industrial IoT Environments

    Directory of Open Access Journals (Sweden)

    Hyeong-Su Kim

    2018-01-01

    Full Text Available Large-scale industrial IoT services appear in smart factory domains such as factory clouds which integrate distributed small factories into a large virtual factory with dynamic combination based on orders of consumers. A smart factory has so many industrial elements including various sensors/actuators, gateways, controllers, application servers, and IoT clouds. Since there are complex connections and relations, it is hard to handle them in point-to-point manner. In addition, many duplicated traffics are exchanged between them through the Internet. Multicast is believed as an effective many-to-many communication mechanism by establishing multicast trees between sources and receivers. There are, however, some issues for adopting multicast to large-scale industrial IoT services in terms of QoS. In this paper, we propose a novel software-defined network multicast based on group shared tree which includes near-receiver rendezvous point selection algorithm and group shared tree switching mechanism. As a result, the proposed multicast mechanism can reduce the packet loss by 90% compared to the legacy methods under severe congestion condition. GST switching method obtains to decreased packet delay effect, respectively, 2%, 20% better than the previously studied multicast and the legacy SDN multicast.

  17. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  18. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  19. Supercomputer debugging workshop 1991 proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Brown, J.

    1991-01-01

    This report discusses the following topics on supercomputer debugging: Distributed debugging; use interface to debugging tools and standards; debugging optimized codes; debugging parallel codes; and debugger performance and interface as analysis tools. (LSP)

  20. Supercomputer debugging workshop 1991 proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Brown, J.

    1991-12-31

    This report discusses the following topics on supercomputer debugging: Distributed debugging; use interface to debugging tools and standards; debugging optimized codes; debugging parallel codes; and debugger performance and interface as analysis tools. (LSP)

  1. Exploiting the In-Network Capabilities of Multicast to Discover Proximate IPTV Channels

    Directory of Open Access Journals (Sweden)

    William Donnelly

    2010-09-01

    Full Text Available IPTV has become the next generation of television due, in part, to its ability to support features that have been lacking in conventional broadcasting—for example, end-user interactivity, personalisation and localisation. Providers are also searching for the most efficient delivery methods to provide the greatest amount of contents at the lowest cost. At present IPTV uses IP multicast to deliver live TV channels in an over-provisioned walled-garden network due to issues of deploying multicast and QoS challenges in the public Internet. However, IPTV is likely to shift into some parts of the public Internet in the future as a managed service. Multicast routing is performed on a per-session destination-address basis so each router maintains a table of all of the multicast addresses to which the content is being forwarded. We exploit this information to discover and join the in-progress channels of geographically proximate users and to create a new incentivised premium service in future IPTV networks called ProxyTV. This approach is expected to minimise network bandwidth requirements as it enables ISPs to optimise bandwidth on their edge networks. This becomes increasingly significant as TV content consumes more and more bandwidth, especially with the onset of HD and 3D capabilities. In this paper, we have presented in detail the concept with the results of a survey and an analysis of network traffic to justify the proposed approach.

  2. Supercomputer debugging workshop `92

    Energy Technology Data Exchange (ETDEWEB)

    Brown, J.S.

    1993-02-01

    This report contains papers or viewgraphs on the following topics: The ABCs of Debugging in the 1990s; Cray Computer Corporation; Thinking Machines Corporation; Cray Research, Incorporated; Sun Microsystems, Inc; Kendall Square Research; The Effects of Register Allocation and Instruction Scheduling on Symbolic Debugging; Debugging Optimized Code: Currency Determination with Data Flow; A Debugging Tool for Parallel and Distributed Programs; Analyzing Traces of Parallel Programs Containing Semaphore Synchronization; Compile-time Support for Efficient Data Race Detection in Shared-Memory Parallel Programs; Direct Manipulation Techniques for Parallel Debuggers; Transparent Observation of XENOOPS Objects; A Parallel Software Monitor for Debugging and Performance Tools on Distributed Memory Multicomputers; Profiling Performance of Inter-Processor Communications in an iWarp Torus; The Application of Code Instrumentation Technology in the Los Alamos Debugger; and CXdb: The Road to Remote Debugging.

  3. QoS Supported IPTV Service Architecture over Hybrid-Tree-Based Explicit Routed Multicast Network

    Directory of Open Access Journals (Sweden)

    Chih-Chao Wen

    2012-01-01

    Full Text Available With the rapid advance in multimedia streaming and multicast transport technology, current IP multicast protocols, especially PIM-SM, become the major channel delivery mechanism for IPTV system over Internet. The goals for IPTV service are to provide two-way interactive services for viewers to select popular program channel with high quality for watching during fast channel surfing period. However, existing IP multicast protocol cannot meet above QoS requirements for IPTV applications between media server and subscribers. Therefore, we propose a cooperative scheme of hybrid-tree based on explicit routed multicast, called as HT-ERM to combine the advantages of shared tree and source tree for QoS-supported IPTV service. To increase network utilization, the constrained shortest path first (CSPF routing algorithm is designed for construction of hybrid tree to deliver the high-quality video stream over watching channel and standard quality over surfing channel. Furthermore, the Resource Reservation Protocol- Traffic Engineering (RSVP-TE is used as signaling mechanism to set up QoS path for multicast channel admission control. Our simulation results demonstrated that the proposed HT-ERM scheme outperforms other multicast QoS-based delivery scheme in terms of channel switching delay, resource utilization, and blocking ratio for IPTV service.

  4. Protection switching for carrier ethernet multicast

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Berger, Michael Stübert

    2010-01-01

    This paper addresses network survivability for IPTV multicast transport in Carrier Ethernet networks. The impact of link failures is investigated and suggestions for intelligent multicast resilience schemes are proposed. In particular, functions of the multicast tree are integrated with the Carri...... recovery path length, recovery time, number of branch nodes and operational complexity. The integrated approach therefore shows significant potential to increase the QoE for IPTV users in case of network failures and recovery actions.......This paper addresses network survivability for IPTV multicast transport in Carrier Ethernet networks. The impact of link failures is investigated and suggestions for intelligent multicast resilience schemes are proposed. In particular, functions of the multicast tree are integrated with the Carrier...

  5. Supercomputer debugging workshop '92

    Energy Technology Data Exchange (ETDEWEB)

    Brown, J.S.

    1993-01-01

    This report contains papers or viewgraphs on the following topics: The ABCs of Debugging in the 1990s; Cray Computer Corporation; Thinking Machines Corporation; Cray Research, Incorporated; Sun Microsystems, Inc; Kendall Square Research; The Effects of Register Allocation and Instruction Scheduling on Symbolic Debugging; Debugging Optimized Code: Currency Determination with Data Flow; A Debugging Tool for Parallel and Distributed Programs; Analyzing Traces of Parallel Programs Containing Semaphore Synchronization; Compile-time Support for Efficient Data Race Detection in Shared-Memory Parallel Programs; Direct Manipulation Techniques for Parallel Debuggers; Transparent Observation of XENOOPS Objects; A Parallel Software Monitor for Debugging and Performance Tools on Distributed Memory Multicomputers; Profiling Performance of Inter-Processor Communications in an iWarp Torus; The Application of Code Instrumentation Technology in the Los Alamos Debugger; and CXdb: The Road to Remote Debugging.

  6. Debug register rootkits : A study of malicious use of the IA-32 debug registers

    OpenAIRE

    Persson, Emil; Mattsson, Joel

    2012-01-01

    The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. This paper investigates the debug register rootkit to find out why it is considered a threat, and which malware removal tools have implemented detection algorithms against this threat. By implementing and running a debug register rootkit against the most popular Linux tools, ne...

  7. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  8. Ruteo multicast mediante algoritmos genéticos

    OpenAIRE

    Klenzi, Raúl O.; Sánchez Tores, Héctor A.; Ortega, Manuel Oscar; Naranjo, Viviana; Espósito, Gabriela

    2000-01-01

    Los sistemas o redes de comunicación construidos teniendo en cuenta el modelo de referencia OSI (Open Systems lnterconection) o la arquitectura de Internet, fueron diseñados para soportar servicios o comunicaciones punto a punto, donde la información fluye entre dos usuarios únicamente. Uno de los tópicos en el cual las redes de computadoras actuales están poniendo mucho énfasis, proviene de las aplicaciones multicast o de grupo. Estas involucran más de dos usuarios (estos usuarios definen...

  9. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    Directory of Open Access Journals (Sweden)

    Isam Ishaq

    2016-07-01

    Full Text Available The Internet of Things (IoT is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP, but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP.

  10. Multi-purpose passive debugging for embedded wireless

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Debugging embedded wireless systems can be cumbersome and hard due to low visibility. To ease the task of debugging we propose a multi-purpose passive debugging framework, called TinyDebug, for developing embedded wireless systems. TinyDebug is designed to be used throughout the entire system...

  11. Integrated Debugging of Modelica Models

    Directory of Open Access Journals (Sweden)

    Adrian Pop

    2014-04-01

    Full Text Available The high abstraction level of equation-based object-oriented (EOO languages such as Modelica has the drawback that programming and modeling errors are often hard to find. In this paper we present integrated static and dynamic debugging methods for Modelica models and a debugger prototype that addresses several of those problems. The goal is an integrated debugging framework that combines classical debugging techniques with special techniques for equation-based languages partly based on graph visualization and interaction. To our knowledge, this is the first Modelica debugger that supports both equation-based transformational and algorithmic code debugging in an integrated fashion.

  12. Optical multicast system for data center networks.

    Science.gov (United States)

    Samadi, Payman; Gupta, Varun; Xu, Junjie; Wang, Howard; Zussman, Gil; Bergman, Keren

    2015-08-24

    We present the design and experimental evaluation of an Optical Multicast System for Data Center Networks, a hardware-software system architecture that uniquely integrates passive optical splitters in a hybrid network architecture for faster and simpler delivery of multicast traffic flows. An application-driven control plane manages the integrated optical and electronic switched traffic routing in the data plane layer. The control plane includes a resource allocation algorithm to optimally assign optical splitters to the flows. The hardware architecture is built on a hybrid network with both Electronic Packet Switching (EPS) and Optical Circuit Switching (OCS) networks to aggregate Top-of-Rack switches. The OCS is also the connectivity substrate of splitters to the optical network. The optical multicast system implementation requires only commodity optical components. We built a prototype and developed a simulation environment to evaluate the performance of the system for bulk multicasting. Experimental and numerical results show simultaneous delivery of multicast flows to all receivers with steady throughput. Compared to IP multicast that is the electronic counterpart, optical multicast performs with less protocol complexity and reduced energy consumption. Compared to peer-to-peer multicast methods, it achieves at minimum an order of magnitude higher throughput for flows under 250 MB with significantly less connection overheads. Furthermore, for delivering 20 TB of data containing only 15% multicast flows, it reduces the total delivery energy consumption by 50% and improves latency by 55% compared to a data center with a sole non-blocking EPS network.

  13. Internet technologies and requirements for telemedicine

    Science.gov (United States)

    Lamaster, H.; Meylor, J.; Meylor, F.

    1997-01-01

    Internet technologies are briefly introduced and those applicable for telemedicine are reviewed. Multicast internet technologies are described. The National Aeronautics and Space Administration (NASA) 'Telemedicine Space-bridge to Russia' project is described and used to derive requirements for internet telemedicine. Telemedicine privacy and Quality of Service (QoS) requirements are described.

  14. Multicast middleware for performance and topology analysis of multimedia grids

    Directory of Open Access Journals (Sweden)

    Jerry Z. Xie

    2017-04-01

    Full Text Available Since multicast reduces bandwidth consumption in multimedia grid computing, the middleware for monitoring the performance and topology of multicast communications is important to the design and management of multimedia grid applications. However, the current middleware technologies for multicast performance monitoring are still far from attaining the level of maturity and there lacks consistent approaches to obtain the evaluation data for multicast. In this study, to serve a clear guide for the design and implementation of the multicast middleware, two algorithms are developed for organising all constituents in multicast communications and analysing the multicast performance in two topologies – ‘multicast distribution tree’ and ‘clusters distribution’, and a definitive set of corresponding metrics that are comprehensive yet viable for evaluating multicast communications are also presented. Instead of using the inference data from unicast measurements, in the proposed middleware, the measuring data of multicast traffic are obtained directly from multicast protocols in real time. Moreover, this study makes a middleware implementation which is integrated into a real access grid multicast communication infrastructure. The results of the implementation demonstrate the substantial improvements in the accuracy and real time in evaluating the performance and topology of multicast network.

  15. Debugging data transfers in CMS

    International Nuclear Information System (INIS)

    Bagliesi, G; Belforte, S; Bloom, K; Bockelman, B; Bonacorsi, D; Fisk, I; Flix, J; Hernandez, J; D'Hondt, J; Maes, J; Kadastik, M; Klem, J; Kodolova, O; Kuo, C-M; Letts, J; Magini, N; Metson, S; Piedra, J; Pukhaeva, N; Tuura, L

    2010-01-01

    The CMS experiment at CERN is preparing for LHC data taking in several computing preparation activities. In early 2007 a traffic load generator infrastructure for distributed data transfer tests was designed and deployed to equip the WLCG tiers which support the CMS virtual organization with a means for debugging, load-testing and commissioning data transfer routes among CMS computing centres. The LoadTest is based upon PhEDEx as a reliable, scalable data set replication system. The Debugging Data Transfers (DDT) task force was created to coordinate the debugging of the data transfer links. The task force aimed to commission most crucial transfer routes among CMS tiers by designing and enforcing a clear procedure to debug problematic links. Such procedure aimed to move a link from a debugging phase in a separate and independent environment to a production environment when a set of agreed conditions are achieved for that link. The goal was to deliver one by one working transfer routes to the CMS data operations team. The preparation, activities and experience of the DDT task force within the CMS experiment are discussed. Common technical problems and challenges encountered during the lifetime of the taskforce in debugging data transfer links in CMS are explained and summarized.

  16. Debugging Data Transfers in CMS

    CERN Document Server

    Bagliesi, G; Bloom, K; Bockelman, B; Bonacorsi, D; Fisk, I; Flix, J; Hernandez, J; D'Hondt, J; Kadastik, M; Klem, J; Kodolova, O; Kuo, C M; Letts, J; Maes, J; Magini, N; Metson, S; Piedra, J; Pukhaeva, N; Tuura, L; Sonajalg, S; Wu, Y; Van Mulders, P; Villella, I; Wurthwein, F

    2010-01-01

    The CMS experiment at CERN is preparing for LHC data taking in several computing preparation activities. In early 2007 a traffic load generator infrastructure for distributed data transfer tests called the LoadTest was designed and deployed to equip the WLCG sites that support CMS with a means for debugging, load-testing and commissioning data transfer routes among CMS computing centres. The LoadTest is based upon PhEDEx as a reliable, scalable data set replication system. The Debugging Data Transfers (DDT) task force was created to coordinate the debugging of the data transfer links. The task force aimed to commission most crucial transfer routes among CMS sites by designing and enforcing a clear procedure to debug problematic links. Such procedure aimed to move a link from a debugging phase in a separate and independent environment to a production environment when a set of agreed conditions are achieved for that link. The goal was to deliver one by one working transfer routes to the CMS data operations team...

  17. DySectAPI: Scalable Prescriptive Debugging

    DEFF Research Database (Denmark)

    Jensen, Nicklas Bo; Karlsson, Sven; Quarfot Nielsen, Niklas

    We present the DySectAPI, a tool that allow users to construct probe trees for automatic, event-driven debugging at scale. The traditional, interactive debugging model, whereby users manually step through and inspect their application, does not scale well even for current supercomputers. While...... lightweight debugging models scale well, they can currently only debug a subset of bug classes. DySectAPI fills the gap between these two approaches with a novel user-guided approach. Using both experimental results and analytical modeling we show how DySectAPI scales and can run with a low overhead...

  18. Debugging systems-on-chip communication-centric and abstraction-based techniques

    CERN Document Server

    Vermeulen, Bart

    2014-01-01

    This book describes an approach and supporting infrastructure to facilitate debugging the silicon implementation of a System-on-Chip (SOC), allowing its associated product to be introduced into the market more quickly.  Readers learn step-by-step the key requirements for debugging a modern, silicon SOC implementation, nine factors that complicate this debugging task, and a new debug approach that addresses these requirements and complicating factors.  The authors’ novel communication-centric, scan-based, abstraction-based, run/stop-based (CSAR) debug approach is discussed in detail, showing how it helps to meet debug requirements and address the nine, previously identified factors that complicate debugging silicon implementations of SOCs. The authors also derive the debug infrastructure requirements to support debugging of a silicon implementation of an SOC with their CSAR debug approach. This debug infrastructure consists of a generic on-chip debug architecture, a configurable automated design-for-debug ...

  19. Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast

    Directory of Open Access Journals (Sweden)

    Amr Mohamed

    2009-01-01

    Full Text Available Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session require service at different rates commensurate with their capabilities. In this paper, we address the problem of resource allocation for a set of heterogeneous multicast sessions over multihop wireless networks. We propose an iterative algorithm that achieves the optimal rates for a set of heterogeneous multicast sessions such that the aggregate utility for all sessions is maximized. We present the formulation of the multicast resource allocation problem as a nonlinear optimization model and highlight the cross-layer framework that can solve this problem in a distributed ad hoc network environment with asynchronous computations. Our simulations show that the algorithm achieves optimal resource utilization, guarantees fairness among multicast sessions, provides flexibility in allocating rates over different parts of the multicast sessions, and adapts to changing conditions such as dynamic channel capacity and node mobility. Our results show that the proposed algorithm not only provides flexibility in allocating resources across multicast sessions, but also increases the aggregate system utility and improves the overall system throughput by almost 30% compared to homogeneous multicast.

  20. Design of controllable multicast for IPTV over EPON

    Science.gov (United States)

    Zhang, Chuanhao; Liu, Deming; Zhang, Li; Wu, Guangsheng

    2007-11-01

    The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. In this paper we focus on security mechanisms that should be available to groups that specifically request it, and therefore are willing to pay the extra cost of implementing those mechanisms. We concentrate on two issues: how unauthorized multicast traffic can be prevented by means of multicast transit traffic control; how a group's susceptibility is likely to be reduced by means of multicast group access control. We have proposed a novel scheme that should be available to multicast groups that desire precautionary measures be taken to avert the threats of Invalid source and unauthorized access.

  1. BigDebug: Debugging Primitives for Interactive Big Data Processing in Spark.

    Science.gov (United States)

    Gulzar, Muhammad Ali; Interlandi, Matteo; Yoo, Seunghyun; Tetali, Sai Deep; Condie, Tyson; Millstein, Todd; Kim, Miryung

    2016-05-01

    Developers use cloud computing platforms to process a large quantity of data in parallel when developing big data analytics. Debugging the massive parallel computations that run in today's data-centers is time consuming and error-prone. To address this challenge, we design a set of interactive, real-time debugging primitives for big data processing in Apache Spark, the next generation data-intensive scalable cloud computing platform. This requires re-thinking the notion of step-through debugging in a traditional debugger such as gdb, because pausing the entire computation across distributed worker nodes causes significant delay and naively inspecting millions of records using a watchpoint is too time consuming for an end user. First, BIGDEBUG's simulated breakpoints and on-demand watchpoints allow users to selectively examine distributed, intermediate data on the cloud with little overhead. Second, a user can also pinpoint a crash-inducing record and selectively resume relevant sub-computations after a quick fix. Third, a user can determine the root causes of errors (or delays) at the level of individual records through a fine-grained data provenance capability. Our evaluation shows that BIGDEBUG scales to terabytes and its record-level tracing incurs less than 25% overhead on average. It determines crash culprits orders of magnitude more accurately and provides up to 100% time saving compared to the baseline replay debugger. The results show that BIGDEBUG supports debugging at interactive speeds with minimal performance impact.

  2. Multicast traffic grooming in flexible optical WDM networks

    Science.gov (United States)

    Patel, Ankitkumar N.; Ji, Philip N.; Jue, Jason P.; Wang, Ting

    2012-12-01

    In Metropolitan Area Networks (MANs), point-to-multipoint applications, such as IPTV, video-on-demand, distance learning, and content distribution, can be efficiently supported through light-tree-based multicastcommunications instead of lightpath-based unicast-communications. The application of multicasting for such traffic is justified by its inherent benefits of reduced control and management overhead and elimination of redundant resource provisioning. Supporting such multicast traffic in Flexible optical WDM (FWDM) networks that can provision light-trees using optimum amount of spectrum within flexible channel spacing leads to higher wavelength and spectral efficiencies compared to the conventional ITU-T fixed grid networks. However, in spite of such flexibility, the residual channel capacity of stranded channels may not be utilized if the network does not offer channels with arbitrary line rates. Additionally, the spectrum allocated to guard bands used to isolate finer granularity channels remains unutilized. These limitations can be addressed by using traffic grooming in which low-rate multicast connections are aggregated and switched over high capacity light-trees. In this paper, we address the multicast traffic grooming problem in FWDM networks, and propose a novel auxiliary graph-based algorithm for the first time. The performance of multicast traffic grooming is evaluated in terms of spectral, cost, and energy efficiencies compared to lightpath-based transparent FWDM networks, lightpathbased traffic grooming-capable FWDM networks, multicast-enabled transparent FWDM networks, and multicast traffic grooming-capable fixed grid networks. Simulation results demonstrate that multicast traffic grooming in FWDM networks not only improves spectral efficiency, but also cost, and energy efficiencies compared to other multicast traffic provisioning approaches of FWDM and fixed grid networks.

  3. Multi-area layered multicast scheme for MPLS networks

    Science.gov (United States)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  4. Implementing Resource-aware Multicast Forwarding in Software Defined Networks

    DEFF Research Database (Denmark)

    Poderys, Justas; Sunny, Anjusha; Soler, José

    2018-01-01

    Using multicast data transmissions, data can be eciently distributed to a high number of network users. However, in order to ef-ciently stream multimedia using multicast communication, multicast routing protocols must have knowledge of all network links and their available bandwidth. In Software...

  5. Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Rakesh Matam

    2016-01-01

    Full Text Available Multicast is an indispensable communication technique in wireless mesh network (WMN. Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.

  6. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  7. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  8. Multicast Performance Analysis for High-Speed Torus Networks

    National Research Council Canada - National Science Library

    Oral, S; George, A

    2002-01-01

    ... for unicast-based and path-based multicast communication on high-speed torus networks. Software-based multicast performance results of selected algorithms on a 16-node Scalable Coherent Interface (SCI) torus are given...

  9. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  10. The MIM web gateway to IP multicast e-meetings

    Science.gov (United States)

    Parviainen, Roland; Parnes, Peter

    2003-12-01

    As video conferencing and e-meeting systems are used more and more on the Internet and in businesses it becomes increasingly important to be able to participate from any computer at any location. Often this is impossible, since these systems requires often special software that are not available everywhere or impossible to install for administrative reasons. Many locations also lack the necessary network infrastructure such as IP multicast. This paper presents a WWW gateway system that enables users to participate using only a standard web browser. The design and architecture of the system are described and performance tests that show the scalability of the system are also presented.

  11. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  12. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  13. Implementing Resource-aware Multicast Forwarding in Software Defined Networks

    DEFF Research Database (Denmark)

    Poderys, Justas; Sunny, Anjusha; Soler, José

    2018-01-01

    Using multicast data transmissions, data can be eciently distributed to a high number of network users. However, in order to ef-ciently stream multimedia using multicast communication, multicast routing protocols must have knowledge of all network links and their available bandwidth. In Software......-Karp algorithm, by taking into account network topology and links load information. This paper presents the algorithm, implementation details, and an analysis of the testing results....

  14. Reliable multicast for the Grid: a case study in experimental computer science.

    Science.gov (United States)

    Nekovee, Maziar; Barcellos, Marinho P; Daw, Michael

    2005-08-15

    In its simplest form, multicast communication is the process of sending data packets from a source to multiple destinations in the same logical multicast group. IP multicast allows the efficient transport of data through wide-area networks, and its potentially great value for the Grid has been highlighted recently by a number of research groups. In this paper, we focus on the use of IP multicast in Grid applications, which require high-throughput reliable multicast. These include Grid-enabled computational steering and collaborative visualization applications, and wide-area distributed computing. We describe the results of our extensive evaluation studies of state-of-the-art reliable-multicast protocols, which were performed on the UK's high-speed academic networks. Based on these studies, we examine the ability of current reliable multicast technology to meet the Grid's requirements and discuss future directions.

  15. IMPLEMENTASI IP V 6 MULTICAST DALAM JARINGAN WIRELESS

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi Prasetyo

    2015-04-01

    Full Text Available Teleconferencing is a media technology to create a long-distance communication of audio data and video can also be data. With teleconferencing you can perform a communication with another person that much with a relatively low cost. At this time the use of computers in a network more complex. Some time ago has developed a new network protocol, the IPv6 is a solution to overcome the deficiencies found on previous generation protocol is IPv4 Multicast is a communication mechanism of one-to-many, or point-to-multipoint. In IPv6 technology, multicast is a basic feature and has become the standard specification of every router. In the implementation is done using IPv6 multicast teleconferencing application on the LAN network topology. At the teleconference has been observed with the amount of traffic parameters that occurred during the last teleconference. Used in this study SDR and RAT teleconferencing applications. SDR (Session Directory Tool and RAT (Robust Audio Tool used for teleconferencing, which is part of the MBone tools. Protocol MLD (Multicast Listener Directory is also used in this study for multicast signaling can run well.

  16. Evaluating multicast resilience in carrier ethernet

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Zhang, Jiang

    2010-01-01

    This paper gives an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, we show how multicast traffic, which is essential for IPTV can be protected. We detail the ackground for resilience mechanisms and their control and e present Carrier Ethernet...... resilience methods for linear nd ring networks. By simulation we show that the vailability of a multicast connection can be significantly increased by applying protection methods....

  17. Multicast routing for wavelength-routed WDM networks with dynamic membership

    Science.gov (United States)

    Huang, Nen-Fu; Liu, Te-Lung; Wang, Yao-Tzung; Li, Bo

    2000-09-01

    Future broadband networks must support integrated services and offer flexible bandwidth usage. In our previous work, we explore the optical link control layer on the top of optical layer that enables the possibility of bandwidth on-demand service directly over wavelength division multiplexed (WDM) networks. Today, more and more applications and services such as video-conferencing software and Virtual LAN service require multicast support over the underlying networks. Currently, it is difficult to provide wavelength multicast over the optical switches without optical/electronic conversions although the conversion takes extra cost. In this paper, based on the proposed wavelength router architecture (equipped with ATM switches to offer O/E and E/O conversions when necessary), a dynamic multicast routing algorithm is proposed to furnish multicast services over WDM networks. The goal is to joint a new group member into the multicast tree so that the cost, including the link cost and the optical/electronic conversion cost, is kept as less as possible. The effectiveness of the proposed wavelength router architecture as well as the dynamic multicast algorithm is evaluated by simulation.

  18. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  19. Study of the nonlinear imperfect software debugging model

    International Nuclear Information System (INIS)

    Wang, Jinyong; Wu, Zhibo

    2016-01-01

    In recent years there has been a dramatic proliferation of research on imperfect software debugging phenomena. Software debugging is a complex process and is affected by a variety of factors, including the environment, resources, personnel skills, and personnel psychologies. Therefore, the simple assumption that debugging is perfect is inconsistent with the actual software debugging process, wherein a new fault can be introduced when removing a fault. Furthermore, the fault introduction process is nonlinear, and the cumulative number of nonlinearly introduced faults increases over time. Thus, this paper proposes a nonlinear, NHPP imperfect software debugging model in consideration of the fact that fault introduction is a nonlinear process. The fitting and predictive power of the NHPP-based proposed model are validated through related experiments. Experimental results show that this model displays better fitting and predicting performance than the traditional NHPP-based perfect and imperfect software debugging models. S-confidence bounds are set to analyze the performance of the proposed model. This study also examines and discusses optimal software release-time policy comprehensively. In addition, this research on the nonlinear process of fault introduction is significant given the recent surge of studies on software-intensive products, such as cloud computing and big data. - Highlights: • Fault introduction is a nonlinear changing process during the debugging phase. • The assumption that the process of fault introduction is nonlinear is credible. • Our proposed model can better fit and accurately predict software failure behavior. • Research on fault introduction case is significant to software-intensive products.

  20. Visualizing Debugging Activity in Source Code Repositories

    NARCIS (Netherlands)

    Voinea, Lucian; Telea, Alexandru

    2007-01-01

    We present the use of the CVSgrab visualization tool for understanding the debugging activity in the Mozilla project. We show how to display the distribution of different bug types over the project structure, locate project components which undergo heavy debugging activity, and get insight in the

  1. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  2. Construction of Light-trees for WDM Multicasting under Splitting Capability Constraints

    DEFF Research Database (Denmark)

    Zsigri, Anikó; Guitton, A.; Molnár, M.

    2003-01-01

    Communication systems with all-optical multicasting have better performance than those using optical/electrical/optical conversion. Multicast protocols assume that all nodes in the network can forward the signal from one input to several outputs. Since fabrication of an optical switch with splitt......Communication systems with all-optical multicasting have better performance than those using optical/electrical/optical conversion. Multicast protocols assume that all nodes in the network can forward the signal from one input to several outputs. Since fabrication of an optical switch...

  3. Visualizing Debugging Activity in Source Code Repositories

    OpenAIRE

    Voinea, Lucian; Telea, Alexandru

    2007-01-01

    We present the use of the CVSgrab visualization tool for understanding the debugging activity in the Mozilla project. We show how to display the distribution of different bug types over the project structure, locate project components which undergo heavy debugging activity, and get insight in the bug evolution in time.

  4. A Multicast Sparse-Grooming Algorithm Based on Network Coding in WDM Networks

    Science.gov (United States)

    Zhang, Shengfeng; Peng, Han; Sui, Meng; Liu, Huanlin

    2015-03-01

    To improve the limited number of wavelength utilization and decrease the traffic blocking probability in sparse-grooming wavelength-division multiplexing (WDM) networks, a multicast sparse-grooming algorithm based on network coding (MCSA-NC) is put forward to solve the routing problem for dynamic multicast requests in this paper. In the proposed algorithm, a traffic partition strategy, that the coarse-granularity multicast request with grooming capability on the source node is split into several fine-granularity multicast requests, is designed so as to increase the probability for traffic grooming successfully in MCSA-NC. Besides considering that multiple destinations should receive the data from source of the multicast request at the same time, the traditional transmission mechanism is improved by constructing edge-disjoint paths for each split multicast request. Moreover, in order to reduce the number of wavelengths required and further decrease the traffic blocking probability, a light-tree reconfiguration mechanism is presented in the MCSA-NC, which can select a minimal cost light tree from the established edge-disjoint paths for a new multicast request.

  5. Deploying Next Generation Multicast-enabled Applications Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet

    CERN Document Server

    Joseph, Vinod

    2011-01-01

    The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicas

  6. Merging Network Coding with Feedback Management in Multicast Streaming

    DEFF Research Database (Denmark)

    Moreira, André; Almeida, Luis; Roetter, Daniel Enrique Lucani

    2015-01-01

    Reliable multicast over wireless poses interesting challenges arising from the unreliable nature of the wireless medium. Recovering lost packets is particularly challenging in multicast scenarios since different receivers lose different packets. For this reason, simply retransmitting packets does...

  7. Efficient round-robin multicast scheduling for input-queued switches

    DEFF Research Database (Denmark)

    Rasmussen, Anders; Yu, Hao; Ruepp, Sarah Renée

    2014-01-01

    The input-queued (IQ) switch architecture is favoured for designing multicast high-speed switches because of its scalability and low implementation complexity. However, using the first-in-first-out (FIFO) queueing discipline at each input of the switch may cause the head-of-line (HOL) blocking...... problem. Using a separate queue for each output port at an input to reduce the HOL blocking, that is, the virtual output queuing discipline, increases the implementation complexity, which limits the scalability. Given the increasing link speed and network capacity, a low-complexity yet efficient multicast...... by means of queue look-ahead. Simulation results demonstrate that this FIFO-based IQ multicast architecture is able to achieve significant improvements in terms of multicast latency requirements by searching through a small number of cells beyond the HOL cells in the input queues. Furthermore, hardware...

  8. Experimental characterization of a new multicasting node architecture based on space splitters and wavelength converters

    Science.gov (United States)

    He, Hao; Su, Yikai; Hu, Peigang; Hu, Weisheng

    2005-11-01

    IPTV-based broadband services such as interactive multimedia and video conferencing are considered as promising revenue-adding services, and multicast is proven to be a good supplier to support these applications for its reduced consumption of network bandwidth. Generally there are two approaches to implement optical layer multicast. One is space-domain multicast using space-splitter which is low cost but has wavelength continuity constraint, the other is frequency-domain multicast using wavelength converter which resolves the wavelength continuity but with high costs. A new multicasting node which adopts both space-domain multicast and frequency-domain multicast is recently discussed. In this paper we present an experimental demonstration of the new multicasting node architecture based on space splitters and wavelength converters, measurements to characterize such a node are provided.

  9. Maximization Network Throughput Based on Improved Genetic Algorithm and Network Coding for Optical Multicast Networks

    Science.gov (United States)

    Wei, Chengying; Xiong, Cuilian; Liu, Huanlin

    2017-12-01

    Maximal multicast stream algorithm based on network coding (NC) can improve the network's throughput for wavelength-division multiplexing (WDM) networks, which however is far less than the network's maximal throughput in terms of theory. And the existing multicast stream algorithms do not give the information distribution pattern and routing in the meantime. In the paper, an improved genetic algorithm is brought forward to maximize the optical multicast throughput by NC and to determine the multicast stream distribution by hybrid chromosomes construction for multicast with single source and multiple destinations. The proposed hybrid chromosomes are constructed by the binary chromosomes and integer chromosomes, while the binary chromosomes represent optical multicast routing and the integer chromosomes indicate the multicast stream distribution. A fitness function is designed to guarantee that each destination can receive the maximum number of decoding multicast streams. The simulation results showed that the proposed method is far superior over the typical maximal multicast stream algorithms based on NC in terms of network throughput in WDM networks.

  10. Many-to-Many Multicast Routing Schemes under a Fixed Topology

    Directory of Open Access Journals (Sweden)

    Wei Ding

    2013-01-01

    Full Text Available Many-to-many multicast routing can be extensively applied in computer or communication networks supporting various continuous multimedia applications. The paper focuses on the case where all users share a common communication channel while each user is both a sender and a receiver of messages in multicasting as well as an end user. In this case, the multicast tree appears as a terminal Steiner tree (TeST. The problem of finding a TeST with a quality-of-service (QoS optimization is frequently NP-hard. However, we discover that it is a good idea to find a many-to-many multicast tree with QoS optimization under a fixed topology. In this paper, we are concerned with three kinds of QoS optimization objectives of multicast tree, that is, the minimum cost, minimum diameter, and maximum reliability. All of three optimization problems are distributed into two types, the centralized and decentralized version. This paper uses the dynamic programming method to devise an exact algorithm, respectively, for the centralized and decentralized versions of each optimization problem.

  11. Stateless multicast switching in software defined networks

    OpenAIRE

    Reed, Martin J.; Al-Naday, Mays; Thomos, Nikolaos; Trossen, Dirk; Petropoulos, George; Spirou, Spiros

    2016-01-01

    Multicast data delivery can significantly reduce traffic in operators' networks, but has been limited in deployment due to concerns such as the scalability of state management. This paper shows how multicast can be implemented in contemporary software defined networking (SDN) switches, with less state than existing unicast switching strategies, by utilising a Bloom Filter (BF) based switching technique. Furthermore, the proposed mechanism uses only proactive rule insertion, and thus, is not l...

  12. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  13. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  14. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad

    2012-08-01

    Relay-based multicasting for the purpose of cooperative content distribution is studied. Optimized relay selection is performed with the objective of minimizing the energy consumption or the content distribution delay within a cluster of cooperating mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles that were not able to receive the multicast data. Both schemes show significant superiority compared to the non-cooperative scenarios, in terms of energy consumption and delay reduction. © 2012 IEEE.

  15. Simultaneous multichannel wavelength multicasting and XOR logic gate multicasting for three DPSK signals based on four-wave mixing in quantum-dot semiconductor optical amplifier.

    Science.gov (United States)

    Qin, Jun; Lu, Guo-Wei; Sakamoto, Takahide; Akahane, Kouichi; Yamamoto, Naokatsu; Wang, Danshi; Wang, Cheng; Wang, Hongxiang; Zhang, Min; Kawanishi, Tetsuya; Ji, Yuefeng

    2014-12-01

    In this paper, we experimentally demonstrate simultaneous multichannel wavelength multicasting (MWM) and exclusive-OR logic gate multicasting (XOR-LGM) for three 10Gbps non-return-to-zero differential phase-shift-keying (NRZ-DPSK) signals in quantum-dot semiconductor optical amplifier (QD-SOA) by exploiting the four-wave mixing (FWM) process. No additional pump is needed in the scheme. Through the interaction of the input three 10Gbps DPSK signal lights in QD-SOA, each channel is successfully multicasted to three wavelengths (1-to-3 for each), totally 3-to-9 MWM, and at the same time, three-output XOR-LGM is obtained at three different wavelengths. All the new generated channels are with a power penalty less than 1.2dB at a BER of 10(-9). Degenerate and non-degenerate FWM components are fully used in the experiment for data and logic multicasting.

  16. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  17. A novel WDM passive optical network architecture supporting two independent multicast data streams

    Science.gov (United States)

    Qiu, Yang; Chan, Chun-Kit

    2012-01-01

    We propose a novel scheme to perform optical multicast overlay of two independent multicast data streams on a wavelength-division-multiplexed (WDM) passive optical network. By controlling a sinusoidal clock signal and shifting the wavelength at the optical line terminal (OLT), the delivery of the two multicast data, being carried by the generated optical tones, can be independently and flexibly controlled. Simultaneous transmission of 10-Gb/s unicast downstream and upstream data as well as two independent 10-Gb/s multicast data was successfully demonstrated.

  18. An efficient mechanism for dynamic survivable multicast traffic grooming

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2015-06-01

    Recent advances in wavelength division multiplexing (WDM) networks have helped enhance the popularity of multicasting services. However, as a single network failure may disrupt the information transmission to multiple end-users, protecting multicast requests against network failures becomes an important issue in network operation. This paper investigates the sub-wavelength level protection for dynamic multicast traffic grooming. A new method named lightpath-fragmentation based segment shared protection (LF-SSP) scheme is proposed. By carefully splitting primary/backup lightpaths into segments to improve resource sharing for both traffic grooming and protection, LF-SSP aims to minimize the network resources allocated for request protection. Extensive simulations are carried out to compare the performance of LF-SSP to some existing approaches, on sub-wavelength-level as well as wavelength-level multicast protections in different cases. Results show that LF-SSP steadily outperforms these existing methods as long as the network resources are not too limited. Influences of the add/drop port resources and the average number of destinations per connection request on the LF-SSP performance are also evaluated.

  19. A multicast tree aggregation algorithm in wavelength-routed WDM networks

    Science.gov (United States)

    Cheng, Hsu-Chen; Kuo, Chin-Chun; Lin, Frank Y.

    2005-02-01

    Wavelength division multiplexing (WDM) has been considered a promising transmission technology in optical communication networks. With the continuous advance in optical technology, WDM network will play an important role in wide area backbone networks. Optical wavelength switching, compared with optical packet switching, is a more mature and more cost-effective choice for optical switching technologies. Besides, the technology of time division multiplexing in optical communication networks has been working smoothly for a long time. In the proposed research, the problem of multicast groups aggregation and multicast routing and wavelength assignment in wavelength-routed WDM network is studied. The optical cross connect switches in the problem are assumed to have limited optical multicast/splitting and TDM functionalities. Given the physical network topology and capacity, the objective is to maximize the total revenue by means of utmost merging multicast groups into larger macro-groups. The groups in the same macro-group will share a multicast tree to conduct data transmission. The problem is formulated as an optimization problem, where the objective function is to maximize the total revenue subject to capacity constraints of components in the optical network, wavelength continuity constraints, and tree topology constraints. The decision variables in the formulations include the merging results between groups, multicast tree routing assignment and wavelength assignment. The basic approach to the algorithm development for this model is Lagrangean relaxation in conjunction with a number of optimization techniques. In computational experiments, the proposed algorithms are evaluated on different network topologies and perform efficiently and effectively according to the experiment results.

  20. Integration of look-ahead multicast and unicast scheduling for input-queued cell switches

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2012-01-01

    This paper presents an integration of multicast and unicast traffic scheduling algorithms for input-queued cell switches. The multi-level round-robin multicast scheduling (ML-RRMS) algorithm with the look-ahead (LA) mechanism provides a highly scalable architecture and is able to reduce the head...... module that filters out the conflicting requests to ensure fairness. Simulation results show that comparing with the scheme using WBA for the multicast scheduling, the scheme proposed in this paper reduces the HOL blocking problem for multicast traffic and provides a significant improvement in terms...

  1. An object-oriented extension for debugging the virtual machine

    Energy Technology Data Exchange (ETDEWEB)

    Pizzi, Jr, Robert G. [Univ. of California, Davis, CA (United States)

    1994-12-01

    A computer is nothing more then a virtual machine programmed by source code to perform a task. The program`s source code expresses abstract constructs which are compiled into some lower level target language. When a virtual machine breaks, it can be very difficult to debug because typical debuggers provide only low-level target implementation information to the software engineer. We believe that the debugging task can be simplified by introducing aspects of the abstract design and data into the source code. We introduce OODIE, an object-oriented extension to programming languages that allows programmers to specify a virtual environment by describing the meaning of the design and data of a virtual machine. This specification is translated into symbolic information such that an augmented debugger can present engineers with a programmable debugging environment specifically tailored for the virtual machine that is to be debugged.

  2. Bifröst: debugging web applications as a whole

    NARCIS (Netherlands)

    K.B. van der Vlist (Kevin)

    2013-01-01

    htmlabstractEven though web application development is supported by professional tooling, debugging support is lacking. If one starts to debug a web application, hardly any tooling support exists. Only the core components like server processes and a web browser are exposed. Developers need to

  3. A Novel OBDD-Based Reliability Evaluation Algorithm for Wireless Sensor Networks on the Multicast Model

    Directory of Open Access Journals (Sweden)

    Zongshuai Yan

    2015-01-01

    Full Text Available The two-terminal reliability calculation for wireless sensor networks (WSNs is a #P-hard problem. The reliability calculation of WSNs on the multicast model provides an even worse combinatorial explosion of node states with respect to the calculation of WSNs on the unicast model; many real WSNs require the multicast model to deliver information. This research first provides a formal definition for the WSN on the multicast model. Next, a symbolic OBDD_Multicast algorithm is proposed to evaluate the reliability of WSNs on the multicast model. Furthermore, our research on OBDD_Multicast construction avoids the problem of invalid expansion, which reduces the number of subnetworks by identifying the redundant paths of two adjacent nodes and s-t unconnected paths. Experiments show that the OBDD_Multicast both reduces the complexity of the WSN reliability analysis and has a lower running time than Xing’s OBDD- (ordered binary decision diagram- based algorithm.

  4. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  5. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  6. Pseudo-Cycle-Based Multicast Routing in Wormhole-Routed Networks

    Institute of Scientific and Technical Information of China (English)

    SONG JianPing (宋建平); HOU ZiFeng (侯紫峰); XU Ming (许铭)

    2003-01-01

    This paper addresses the problem of fault-tolerant multicast routing in wormholerouted multicomputers. A new pseudo-cycle-based routing method is presented for constructing deadlock-free multicast routing algorithms. With at most two virtual channels this technique can be applied to any connected networks with arbitrary topologies. Simulation results show that this technique results in negligible performance degradation even in the presence of a large number of faulty nodes.

  7. Demonstration of flexible multicasting and aggregation functionality for TWDM-PON

    Science.gov (United States)

    Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Zhu, Jinglong; Tian, Yu; Wu, Zhongying; Peng, Huangfa; Xu, Yongchi; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan

    2017-06-01

    The time- and wavelength-division multiplexed passive optical network (TWDM-PON) has been recognized as an attractive solution to provide broadband access for the next-generation networks. In this paper, we propose flexible service multicasting and aggregation functionality for TWDM-PON utilizing multiple-pump four-wave-mixing (FWM) and cyclic arrayed waveguide grating (AWG). With the proposed scheme, multiple TWDM-PON links share a single optical line terminal (OLT), which can greatly reduce the network deployment expense and achieve efficient network resource utilization by load balancing among different optical distribution networks (ODNs). The proposed scheme is compatible with existing TDM-PON infrastructure with fixed-wavelength OLT transmitter, thus smooth service upgrade can be achieved. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment with 10-Gb/s OOK and 10-Gb/s QPSK orthogonal frequency division multiplexing (OFDM) signal multicasting and aggregating to seven PON links. Compared with back-to-back (BTB) channel, the newly generated multicasting OOK signal and OFDM signal have power penalty of 1.6 dB and 2 dB at the BER of 10-3, respectively. For the aggregation of multiple channels, no obvious power penalty is observed. What is more, to verify the flexibility of the proposed scheme, we reconfigure the wavelength selective switch (WSS) and adjust the number of pumps to realize flexible multicasting functionality. One to three, one to seven, one to thirteen and one to twenty-one multicasting are achieved without modifying OLT structure.

  8. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  9. Out-of-Sequence Preventative Cell Dispatching for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes two out-of-sequence (OOS) preventative cell dispatching algorithms for the multicast input-queued space-memory-memory (IQ-SMM) Clos-network switch architecture, i.e. the multicast flow-based DSRR (MF-DSRR) and the multicast flow-based round-robin (MFRR). Treating each cell...

  10. Using IGMP V3 for controllable multicast over EPON

    Science.gov (United States)

    Zhang, Chuanhao; Liu, Deming; Zhang, Li; Wu, Guangsheng

    2008-11-01

    The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. The document proposed a novel scheme, based on the former research for controllable multicast over EPON system, mainly considering system security and maintainability. It can both control the IPTV program source's and the receiver's validity, improving the efficiency and precision. The processing of the two configurations mode is given in detail.

  11. Increase in Multicast OFDM Data Rate in PLC Network using Adaptive LP-OFDM

    OpenAIRE

    Maiga , Ali; Baudais , Jean-Yves; Hélard , Jean-François

    2009-01-01

    ISBN: 978-1-4244-3523-4; International audience; Linear precoding (LP) technique applied to OFDM systems has already proved its ability to significantly increase the system throughput in a powerline communication (PLC) context. In this paper, we propose resource allocation algorithms based on the LP technique to increase the multicast OFDM systems bit rate. The conventional multicast capacity is limited by the user which experiences the worst channel conditions. To increase the multicast bit ...

  12. Debugging multi-core systems-on-chip

    NARCIS (Netherlands)

    Vermeulen, B.; Goossens, K.G.W.; Kornaros, G.

    2010-01-01

    In this chapter, we introduced three fundamental reasons why debugging a multi-processor SoC is intrinsically difficult; (1) limited internal observability, (2) asynchronicity, and (3) non-determinism.

  13. MPI Debugging with Handle Introspection

    DEFF Research Database (Denmark)

    Brock-Nannestad, Laust; DelSignore, John; Squyres, Jeffrey M.

    The Message Passing Interface, MPI, is the standard programming model for high performance computing clusters. However, debugging applications on large scale clusters is difficult. The widely used Message Queue Dumping interface enables inspection of message queue state but there is no general in...

  14. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  15. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  16. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  17. Visual Debugging of Object-Oriented Systems With the Unified Modeling Language

    National Research Council Canada - National Science Library

    Fox, Wendell

    2004-01-01

    .... Debugging and analysis tools are required to aid in this process. Debugging of large object-oriented systems is a difficult cognitive process that requires understanding of both the overall and detailed behavior of the application...

  18. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  19. WDM Multicast Tree Construction Algorithms and Their Comparative Evaluations

    Science.gov (United States)

    Makabe, Tsutomu; Mikoshi, Taiju; Takenaka, Toyofumi

    We propose novel tree construction algorithms for multicast communication in photonic networks. Since multicast communications consume many more link resources than unicast communications, effective algorithms for route selection and wavelength assignment are required. We propose a novel tree construction algorithm, called the Weighted Steiner Tree (WST) algorithm and a variation of the WST algorithm, called the Composite Weighted Steiner Tree (CWST) algorithm. Because these algorithms are based on the Steiner Tree algorithm, link resources among source and destination pairs tend to be commonly used and link utilization ratios are improved. Because of this, these algorithms can accept many more multicast requests than other multicast tree construction algorithms based on the Dijkstra algorithm. However, under certain delay constraints, the blocking characteristics of the proposed Weighted Steiner Tree algorithm deteriorate since some light paths between source and destinations use many hops and cannot satisfy the delay constraint. In order to adapt the approach to the delay-sensitive environments, we have devised the Composite Weighted Steiner Tree algorithm comprising the Weighted Steiner Tree algorithm and the Dijkstra algorithm for use in a delay constrained environment such as an IPTV application. In this paper, we also give the results of simulation experiments which demonstrate the superiority of the proposed Composite Weighted Steiner Tree algorithm compared with the Distributed Minimum Hop Tree (DMHT) algorithm, from the viewpoint of the light-tree request blocking.

  20. Delay Bounded Multi-Source Multicast in Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Thabo Semong

    2018-01-01

    Full Text Available Software-Defined Networking (SDN is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple destinations. The current traffic engineering in SDN focuses mainly on unicast, however, multicast can effectively reduce network resource consumption by serving multiple clients. This paper studies a novel delay-bounded multi-source multicast SDN problem, in which among the set of potential sources, we select a source to build the multicast-tree, under the constraint that the transmission delay for every destination is bounded. This problem is more difficult than the traditional Steiner minimum tree (SMT problem, since it needs to find a source from the set of all potential sources. We model the problem as a mixed-integer linear programming (MILP and prove its NP-Hardness. To solve the problem, a delay bounded multi-source (DBMS scheme is proposed, which includes a DBMS algorithm to build a minimum delay cost DBMS-Forest. Through a MATLAB experiment, we demonstrate that DBMS is significantly more efficient and outperforms other existing algorithms in the literature.

  1. Optimization of multicast optical networks with genetic algorithm

    Science.gov (United States)

    Lv, Bo; Mao, Xiangqiao; Zhang, Feng; Qin, Xi; Lu, Dan; Chen, Ming; Chen, Yong; Cao, Jihong; Jian, Shuisheng

    2007-11-01

    In this letter, aiming to obtain the best multicast performance of optical network in which the video conference information is carried by specified wavelength, we extend the solutions of matrix games with the network coding theory and devise a new method to solve the complex problems of multicast network switching. In addition, an experimental optical network has been testified with best switching strategies by employing the novel numerical solution designed with an effective way of genetic algorithm. The result shows that optimal solutions with genetic algorithm are accordance with the ones with the traditional fictitious play method.

  2. Enhanced first-in-first-out-based round-robin multicast scheduling algorithm for input-queued switches

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This study focuses on the multicast scheduling for M × N input-queued switches. An enhanced first-in-first-out -based round-robin multicast scheduling algorithm is proposed with a function of searching deeper into queues to reduce the head-of-line (HOL) blocking problem and thereby the multicast...... out on the decision matrix to reduce the number of transmission for each cell. To reduce the HOL blocking problem, a complement matrix is constructed based on the traffic matrix and the decision matrix, and a process of searching deeper into the queues is carried out to find cells that can be sent...... to the idle outputs. Simulation results show that the proposed function of searching deeper into the queues can alleviate the HOL blocking and as a result reduce the multicast latency significantly. Under both balanced and unbalanced multicast traffic, the proposed algorithm is able to maintain a stable...

  3. Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective

    Directory of Open Access Journals (Sweden)

    Fan Jiang

    2017-01-01

    Full Text Available In this paper, by utilizing the social relationships among mobile users, we present a framework of energy-efficient cluster formation and resource allocation for multicast D2D transmission. In particular, we first deal with D2D multicast cluster/group formation strategy from both physical distance and social trust level. Then we aim to maximize the overall energy-efficiency of D2D multicast groups through resource allocation and power control scheme, which considers the quality-of-service (QoS requirements of both cellular user equipment and D2D groups. A heuristic algorithm is proposed to solve above energy-efficiency problem with less complexity. After that, considering the limited battery capacity of mobile users, we propose an energy and social aware cluster head update algorithm, which incorporates both the energy constraint and social centrality measurement. Numerical results indicate that the proposed social-tie based D2D multicast group formation and update algorithm form a multicast group in an energy efficient way. Moreover, the proposed resource and power allocation scheme achieves better energy efficiency in terms of throughput per energy consumption. These results show that, by exploiting social domain information, underlay D2D multicast transmission has high practical potential in saving the source on wireless links and in the backhaul.

  4. Preventing Out-of-Sequence for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes an out-of-sequence (OOS) preventative cell dispatching algorithm, the multicast flow-based round robin (MFRR), for multicast input-queued space-memory-memory (IQ-SMM) Clos-network architecture. Independently treating each incoming cell, such as the desynchronized static round...

  5. A Multicast Protocol Utilizing On-demand Routing Strategy for MPRN

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper proposes a multicast protocol utilizing ondemand routing strategy for mobile packet radio network. It does not maintain permanent route tables with full topological views. Instead, multicast senders apply on-demand procedures to dynamically discover routes and build forwarding group in this protocol. The data packets are propagated by each forwarding group member via scoped flooding, so the protocol can reduce network bandwidth overhead and avoid the propagation of potentially large routing updates throughout the network.

  6. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Science.gov (United States)

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  7. QoS and QoE Aware N-Screen Multicast Service

    Directory of Open Access Journals (Sweden)

    Ghulam Sarwar

    2016-01-01

    Full Text Available The paper focuses on ensuring the quality-of-service (QoS and quality-of-experience (QoE requirements of users having heterogeneous devices in a multicast session. QoS parameters such as bit rate, delays, and packet losses are good indicators for optimizing network services but fall short in characterizing user perception (QoE. In N-Screen service, the users have different devices with heterogeneous attributes like screen size, resolution, and access network interface, and the users have different QoE on N-Screen devices with the same QoS parameters. We formulate the objective function of the N-Screen multicast grouping to ensure the minimum user’s QoE with smaller bandwidth requirement. We propose a dynamic user reassignment scheme to maintain and satisfy the QoE by adapting the user’s membership to the varying network conditions. The proposed schemes combine the available bandwidth and multimedia visual quality to ensure the QoS and QoE. In the network architecture, we introduce the functions of the QoS and QoE aware multicast group management and the estimation schemes for the QoS and QoE parameters. The simulation results show that the proposed multicast service ensures the network QoS and guarantees the QoE of users in the varying network conditions.

  8. Polarization Insensitive One-to-Six WDM Multicasting in a Silicon Nanowire

    DEFF Research Database (Denmark)

    Pu, Minhao; Hu, Hao; Peucheret, Christophe

    2012-01-01

    We present polarization insensitive one-to-six WDM multicasting based on nondegenerate four-wave mixing in a silicon nanowire with angled-pump scheme. Bit-error rate measurements are performed and error-free operation is achieved.......We present polarization insensitive one-to-six WDM multicasting based on nondegenerate four-wave mixing in a silicon nanowire with angled-pump scheme. Bit-error rate measurements are performed and error-free operation is achieved....

  9. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2017-01-01

    , this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore......, a first objective of this work is to assess the operating regions where employing cooperation results in higher throughput and/or energy savings. We consider multicast scenarios with network coded mechanisms employing Random Linear Network Coding (RLNC). However, although RLNC is good for low amount...... of transmissions in multicast, it has an inherent overhead from extreme high or low field related caveats. Thus, as a second objective, we review and propose the application of new network codes that posses low overhead for multicasting, by having a short representation and low dependence probability. We provide...

  10. Near-field self-interference cancellation and quality of service multicast beamforming in full-duplex

    Science.gov (United States)

    Wu, Fei; Shao, Shihai; Tang, Youxi

    2016-10-01

    To enable simultaneous multicast downlink transmit and receive operations on the same frequency band, also known as full-duplex links between an access point and mobile users. The problem of minimizing the total power of multicast transmit beamforming is considered from the viewpoint of ensuring the suppression amount of near-field line-of-sight self-interference and guaranteeing prescribed minimum signal-to-interference-plus-noise-ratio (SINR) at each receiver of the multicast groups. Based on earlier results for multicast groups beamforming, the joint problem is easily shown to be NP-hard. A semidefinite relaxation (SDR) technique with linear program power adjust method is proposed to solve the NP-hard problem. Simulation shows that the proposed method is feasible even when the local receive antenna in nearfield and the mobile user in far-filed are in the same direction.

  11. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  12. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  13. Link importance incorporated failure probability measuring solution for multicast light-trees in elastic optical networks

    Science.gov (United States)

    Li, Xin; Zhang, Lu; Tang, Ying; Huang, Shanguo

    2018-03-01

    The light-tree-based optical multicasting (LT-OM) scheme provides a spectrum- and energy-efficient method to accommodate emerging multicast services. Some studies focus on the survivability technologies for LTs against a fixed number of link failures, such as single-link failure. However, a few studies involve failure probability constraints when building LTs. It is worth noting that each link of an LT plays different important roles under failure scenarios. When calculating the failure probability of an LT, the importance of its every link should be considered. We design a link importance incorporated failure probability measuring solution (LIFPMS) for multicast LTs under independent failure model and shared risk link group failure model. Based on the LIFPMS, we put forward the minimum failure probability (MFP) problem for the LT-OM scheme. Heuristic approaches are developed to address the MFP problem in elastic optical networks. Numerical results show that the LIFPMS provides an accurate metric for calculating the failure probability of multicast LTs and enhances the reliability of the LT-OM scheme while accommodating multicast services.

  14. Bit rate maximization for multicast LP-OFDM systems in PLC context

    OpenAIRE

    Maiga , Ali; Baudais , Jean-Yves; Hélard , Jean-François

    2009-01-01

    ISBN: 978-88-900984-8-2.; International audience; In this paper, we propose a new resource allocation algorithm based on linear precoding technique for multicast OFDM systems. Linear precoding technique applied to OFDM systems has already proved its ability to significantly increase the system throughput in a powerline communication (PLC) context. Simulations through PLC channels show that this algorithm outperforms the classical multicast method (up to 7.3% bit rate gain) and gives better pe...

  15. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  16. A debugging method of the Quadrotor UAV based on infrared thermal imaging

    Science.gov (United States)

    Cui, Guangjie; Hao, Qian; Yang, Jianguo; Chen, Lizhi; Hu, Hongkang; Zhang, Lijun

    2018-01-01

    High-performance UAV has been popular and in great need in recent years. The paper introduces a new method in debugging Quadrotor UAVs. Based on the infrared thermal technology and heat transfer theory, a UAV is under debugging above a hot-wire grid which is composed of 14 heated nichrome wires. And the air flow propelled by the rotating rotors has an influence on the temperature distribution of the hot-wire grid. An infrared thermal imager below observes the distribution and gets thermal images of the hot-wire grid. With the assistance of mathematic model and some experiments, the paper discusses the relationship between thermal images and the speed of rotors. By means of getting debugged UAVs into test, the standard information and thermal images can be acquired. The paper demonstrates that comparing to the standard thermal images, a UAV being debugging in the same test can draw some critical data directly or after interpolation. The results are shown in the paper and the advantages are discussed.

  17. History-based Adaptive Modulation for a Downlink Multicast Channel in OFDMA systems

    DEFF Research Database (Denmark)

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2008-01-01

    In this paper we investigated the adaptive modulation strategies for Multicast service in orthogonal frequency division multiple access systems. We defined a Reward function as the performance optimization target and developed adaptive modulation strategies to maximize this Reward function....... The proposed optimization algorithm varied the instantaneous BER constraint of each mobile Multicast receiver according to its individual cumulated BER, which resulted in a significant Reward gain....

  18. A Grooming Nodes Optimal Allocation Method for Multicast in WDM Networks

    Directory of Open Access Journals (Sweden)

    Chengying Wei

    2016-01-01

    Full Text Available The grooming node has the capability of grooming multicast traffic with the small granularity into established light at high cost of complexity and node architecture. In the paper, a grooming nodes optimal allocation (GNOA method is proposed to optimize the allocation of the grooming nodes constraint by the blocking probability for multicast traffic in sparse WDM networks. In the proposed GNOA method, the location of each grooming node is determined by the SCLD strategy. The improved smallest cost largest degree (SCLD strategy is designed to select the nongrooming nodes in the proposed GNOA method. The simulation results show that the proposed GNOA method can reduce the required number of grooming nodes and decrease the cost of constructing a network to guarantee a certain request blocking probability when the wavelengths per fiber and transmitter/receiver ports per node are sufficient for the optical multicast in WDM networks.

  19. Empirical Evaluation of Superposition Coded Multicasting for Scalable Video

    KAUST Repository

    Chun Pong Lau

    2013-03-01

    In this paper we investigate cross-layer superposition coded multicast (SCM). Previous studies have proven its effectiveness in exploiting better channel capacity and service granularities via both analytical and simulation approaches. However, it has never been practically implemented using a commercial 4G system. This paper demonstrates our prototype in achieving the SCM using a standard 802.16 based testbed for scalable video transmissions. In particular, to implement the superposition coded (SPC) modulation, we take advantage a novel software approach, namely logical SPC (L-SPC), which aims to mimic the physical layer superposition coded modulation. The emulation results show improved throughput comparing with generic multicast method.

  20. A Novel Method for Live Debugging of Production Web Applications by Dynamic Resource Replacement

    OpenAIRE

    Khalid Al-Tahat; Khaled Zuhair Mahmoud; Ahmad Al-Mughrabi

    2014-01-01

    This paper proposes a novel methodology for enabling debugging and tracing of production web applications without affecting its normal flow and functionality. This method of debugging enables developers and maintenance engineers to replace a set of existing resources such as images, server side scripts, cascading style sheets with another set of resources per web session. The new resources will only be active in the debug session and other sessions will not be affected. T...

  1. Debugging a high performance computing program

    Science.gov (United States)

    Gooding, Thomas M.

    2013-08-20

    Methods, apparatus, and computer program products are disclosed for debugging a high performance computing program by gathering lists of addresses of calling instructions for a plurality of threads of execution of the program, assigning the threads to groups in dependence upon the addresses, and displaying the groups to identify defective threads.

  2. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  3. Vdebug: debugging tool for parallel scientific programs. Design report on vdebug

    International Nuclear Information System (INIS)

    Matsuda, Katsuyuki; Takemiya, Hiroshi

    2000-02-01

    We report on a debugging tool called vdebug which supports debugging work for parallel scientific simulation programs. It is difficult to debug scientific programs with an existing debugger, because the volume of data generated by the programs is too large for users to check data in characters. Usually, the existing debugger shows data values in characters. To alleviate it, we have developed vdebug which enables to check the validity of large amounts of data by showing these data values visually. Although targets of vdebug have been restricted to sequential programs, we have made it applicable to parallel programs by realizing the function of merging and visualizing data distributed on programs on each computer node. Now, vdebug works on seven kinds of parallel computers. In this report, we describe the design of vdebug. (author)

  4. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  5. Multicast backup reprovisioning problem for Hamiltonian cycle-based protection on WDM networks

    Science.gov (United States)

    Din, Der-Rong; Huang, Jen-Shen

    2014-03-01

    As networks grow in size and complexity, the chance and the impact of failures increase dramatically. The pre-allocated backup resources cannot provide 100% protection guarantee when continuous failures occur in a network. In this paper, the multicast backup re-provisioning problem (MBRP) for Hamiltonian cycle (HC)-based protection on WDM networks for the link-failure case is studied. We focus on how to recover the protecting capabilities of Hamiltonian cycle against the subsequent link-failures on WDM networks for multicast transmissions, after recovering the multicast trees affected by the previous link-failure. Since this problem is a hard problem, an algorithm, which consists of several heuristics and a genetic algorithm (GA), is proposed to solve it. The simulation results of the proposed method are also given. Experimental results indicate that the proposed algorithm can solve this problem efficiently.

  6. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  7. Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks.

    Science.gov (United States)

    Lin, Frank Yeong-Sung; Hsiao, Chiu-Han; Lin, Leo Shih-Chang; Wen, Yean-Fu

    2013-03-14

    Recent advance in wireless sensor network (WSN) applications such as the Internet of Things (IoT) have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS) is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay) becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  8. Providing resilience for carrier ethernet multicast traffic

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Wessing, Henrik; Zhang, Jiang

    2009-01-01

    This paper presents an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, we detail how multicast traffic, which is essential for e.g. IPTV can be protected. We present Carrier Ethernet resilience methods for linear and ring networks and show by simulation...

  9. Debugging Nondeterministic Failures in Linux Programs through Replay Analysis

    Directory of Open Access Journals (Sweden)

    Shakaiba Majeed

    2018-01-01

    Full Text Available Reproducing a failure is the first and most important step in debugging because it enables us to understand the failure and track down its source. However, many programs are susceptible to nondeterministic failures that are hard to reproduce, which makes debugging extremely difficult. We first address the reproducibility problem by proposing an OS-level replay system for a uniprocessor environment that can capture and replay nondeterministic events needed to reproduce a failure in Linux interactive and event-based programs. We then present an analysis method, called replay analysis, based on the proposed record and replay system to diagnose concurrency bugs in such programs. The replay analysis method uses a combination of static analysis, dynamic tracing during replay, and delta debugging to identify failure-inducing memory access patterns that lead to concurrency failure. The experimental results show that the presented record and replay system has low-recording overhead and hence can be safely used in production systems to catch rarely occurring bugs. We also present few concurrency bug case studies from real-world applications to prove the effectiveness of the proposed bug diagnosis framework.

  10. On-Chip SDM Switching for Unicast, Multicast and Traffic Grooming in Data Center Networks

    DEFF Research Database (Denmark)

    Kamchevska, Valerija; Ding, Yunhong; Dalgaard, Kjeld

    2017-01-01

    This paper reports on the use of a novel photonic integrated circuit that facilitates multicast and grooming in an optical data center architecture. The circuit allows for on-chip spatial multiplexing and demultiplexing as well as fiber core switching. Using this device, we experimentally verify...... that multicast and/or grooming can be successfully performed along the full range of output ports, for different group size and different power ratio. Moreover, we experimentally demonstrate SDM transmission and 5 Tbit/s switching using the on-chip fiber switch with integrated fan-in/fan-out devices and achieve...... errorfree performance (BER≤10-9) for a network scenario including simultaneous unicast/multicast switching and traffic grooming....

  11. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    Science.gov (United States)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  12. Analysis and Optimization of Sparse Random Linear Network Coding for Reliable Multicast Services

    DEFF Research Database (Denmark)

    Tassi, Andrea; Chatzigeorgiou, Ioannis; Roetter, Daniel Enrique Lucani

    2016-01-01

    Point-to-multipoint communications are expected to play a pivotal role in next-generation networks. This paper refers to a cellular system transmitting layered multicast services to a multicast group of users. Reliability of communications is ensured via different random linear network coding (RLNC......) techniques. We deal with a fundamental problem: the computational complexity of the RLNC decoder. The higher the number of decoding operations is, the more the user's computational overhead grows and, consequently, the faster the battery of mobile devices drains. By referring to several sparse RLNC...... techniques, and without any assumption on the implementation of the RLNC decoder in use, we provide an efficient way to characterize the performance of users targeted by ultra-reliable layered multicast services. The proposed modeling allows to efficiently derive the average number of coded packet...

  13. Optimal multicasting in a multi-line-rate ethernet-over-WDM network

    Science.gov (United States)

    Harve, Shruthi; Batayneh, Marwan; Mukherjee, Biswanath

    2009-11-01

    Ethernet is the dominant transport technology for Local Area Networks. Efforts are now under way to use carrier-grade Ethernet in backbone networks of different service providers. With the advent of applications such as IPTV and Videoon- Demand, there is need for techniques to route multicast traffic over the Ethernet backbone networks. Here, we address the problem of Routing and Wavelength Assignment (RWA) of a set of multicast requests in a Multi-Line-Rate Ethernet backbone network with the objective of minimizing the cost of setting up the network, in terms of the Service Provider's Capital Expenditure (CAPEX). We present an Auxiliary Graph based heuristic algorithm that routes each multicast request on a light-tree structure, and assigns minimum cost wavelengths along the route. We compare the properties of the algorithm to the optimal solution given by a mathematical model formulated as an Integer Linear Program (ILP), and show that they compare very well. We also find that the algorithm is most cost-effective when the incoming requests are processed in descending order of their bandwidth requirements.

  14. Empirical Evaluation of Superposition Coded Multicasting for Scalable Video

    KAUST Repository

    Chun Pong Lau; Shihada, Basem; Pin-Han Ho

    2013-01-01

    In this paper we investigate cross-layer superposition coded multicast (SCM). Previous studies have proven its effectiveness in exploiting better channel capacity and service granularities via both analytical and simulation approaches. However

  15. Software exorcism a handbook for debugging and optimizing legacy code

    CERN Document Server

    Blunden, Bill

    2013-01-01

    Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code takes an unflinching, no bulls and look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that you are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our atten

  16. Energy-efficient multicast traffic grooming strategy based on light-tree splitting for elastic optical networks

    Science.gov (United States)

    Liu, Huanlin; Yin, Yarui; Chen, Yong

    2017-07-01

    In order to address the problem of optimizing the spectrum resources and power consumption in elastic optical networks (EONs), we investigate the potential gains by jointly employing the light-tree splitting and traffic grooming for multicast requests. An energy-efficient multicast traffic grooming strategy based on light-tree splitting (EED-MTGS-LS) is proposed in this paper. Firstly, we design a traffic pre-processing mechanism to decide the multicast requests' routing order, which considers the request's bandwidth requirement and physical hops synthetically. Then, by dividing a light-tree to some sub-light-trees and grooming the request to these sub-light-trees, the light-tree sharing ratios of multicast requests can be improved. What's more, a priority scheduling vector is constructed, which aims to improve the success rate of spectrum assignment for grooming requests. Finally, a grooming strategy is designed to optimize the total power consumption by reducing the use of transponders and IP routers during routing. Simulation results show that the proposed strategy can significantly improve the spectrum utilization and save the power consumption.

  17. Multicasting based optical inverse multiplexing in elastic optical network.

    Science.gov (United States)

    Guo, Bingli; Xu, Yingying; Zhu, Paikun; Zhong, Yucheng; Chen, Yuanxiang; Li, Juhao; Chen, Zhangyuan; He, Yongqi

    2014-06-16

    Optical multicasting based inverse multiplexing (IM) is introduced in spectrum allocation of elastic optical network to resolve the spectrum fragmentation problem, where superchannels could be split and fit into several discrete spectrum blocks in the intermediate node. We experimentally demonstrate it with a 1-to-7 optical superchannel multicasting module and selecting/coupling components. Also, simulation results show that, comparing with several emerging spectrum defragmentation solutions (e.g., spectrum conversion, split spectrum), IM could reduce blocking performance significantly but without adding too much system complexity as split spectrum. On the other hand, service fairness for traffic with different granularity of these schemes is investigated for the first time and it shows that IM performs better than spectrum conversion and almost as well as split spectrum, especially for smaller size traffic under light traffic intensity.

  18. Utilizing Joint Routing and Capacity Assignment Algorithms to Achieve Inter- and Intra-Group Delay Fairness in Multi-Rate Multicast Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yean-Fu Wen

    2013-03-01

    Full Text Available Recent advance in wireless sensor network (WSN applications such as the Internet of Things (IoT have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  19. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  20. Debugging in a multi-processor environment

    International Nuclear Information System (INIS)

    Spann, J.M.

    1981-01-01

    The Supervisory Control and Diagnostic System (SCDS) for the Mirror Fusion Test Facility (MFTF) consists of nine 32-bit minicomputers arranged in a tightly coupled distributed computer system utilizing a share memory as the data exchange medium. Debugging of more than one program in the multi-processor environment is a difficult process. This paper describes what new tools were developed and how the testing of software is performed in the SCDS for the MFTF project

  1. Adaptive live multicast video streaming of SVC with UEP FEC

    Science.gov (United States)

    Lev, Avram; Lasry, Amir; Loants, Maoz; Hadar, Ofer

    2014-09-01

    Ideally, video streaming systems should provide the best quality video a user's device can handle without compromising on downloading speed. In this article, an improved video transmission system is presented which dynamically enhances the video quality based on a user's current network state and repairs errors from data lost in the video transmission. The system incorporates three main components: Scalable Video Coding (SVC) with three layers, multicast based on Receiver Layered Multicast (RLM) and an UnEqual Forward Error Correction (FEC) algorithm. The SVC provides an efficient method for providing different levels of video quality, stored as enhancement layers. In the presented system, a proportional-integral-derivative (PID) controller was implemented to dynamically adjust the video quality, adding or subtracting quality layers as appropriate. In addition, an FEC algorithm was added to compensate for data lost in transmission. A two dimensional FEC was used. The FEC algorithm came from the Pro MPEG code of practice #3 release 2. Several bit errors scenarios were tested (step function, cosine wave) with different bandwidth size and error values were simulated. The suggested scheme which includes SVC video encoding with 3 layers over IP Multicast with Unequal FEC algorithm was investigated under different channel conditions, variable bandwidths and different bit error rates. The results indicate improvement of the video quality in terms of PSNR over previous transmission schemes.

  2. SOME NOTES ON COST ALLOCATION IN MULTICASTING

    Directory of Open Access Journals (Sweden)

    Darko Skorin-Kapov

    2012-12-01

    Full Text Available We analyze the cost allocation strategies with the problef of broadcasting information from some source to a number of communication network users. A multicast routing chooses a minimum cost tree network that spans the source and all the receivers. The cost of such a network is distributed among its receivers who may be individuals or organizations with possibly conflicting interests. Providing network developers, users and owners with practical computable 'fair' cost allocation solution procedures is of great importance for network mamagement. Consequently, this multidisciplinary problem was extensively studied by Operational Researchers, Economists, Mathematicians and Computer Scientists. The fairness of various proposed solutions was even argued in US courts. This presentation overviews some previously published, as well as some recent results, in the development of algorithmic mechanisms to efficiently compute 'attractive' cost allocation solutions for multicast networks. Specifically, we will analyze cooperative game theory based cost allocation models that avoid cross subsidies and/or are distance and population monotonic. We will also present some related open cost allocation problems and the potential contribution that such models might make to this problem in the future.

  3. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Abu-Dayya, Adnan A.

    2012-01-01

    mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles

  4. One-to-six WDM multicasting of DPSK signals based on dual-pump four-wave mixing in a silicon waveguide

    DEFF Research Database (Denmark)

    Pu, Minhao; Hu, Hao; Ji, Hua

    2011-01-01

    We present WDM multicasting based on dual-pump four-wave mixing in a 3-mm long dispersion engineered silicon waveguide. One-to-six phase-preserving WDM multicasting of 10-Gb/s differential phase-shiftkeying (DPSK) data is experimentally demonstrated with bit-error rate measurements. All the six...

  5. Lightweight and Statistical Techniques for Petascale Debugging: Correctness on Petascale Systems (CoPS) Preliminry Report

    Energy Technology Data Exchange (ETDEWEB)

    de Supinski, B R; Miller, B P; Liblit, B

    2011-09-13

    Petascale platforms with O(10{sup 5}) and O(10{sup 6}) processing cores are driving advancements in a wide range of scientific disciplines. These large systems create unprecedented application development challenges. Scalable correctness tools are critical to shorten the time-to-solution on these systems. Currently, many DOE application developers use primitive manual debugging based on printf or traditional debuggers such as TotalView or DDT. This paradigm breaks down beyond a few thousand cores, yet bugs often arise above that scale. Programmers must reproduce problems in smaller runs to analyze them with traditional tools, or else perform repeated runs at scale using only primitive techniques. Even when traditional tools run at scale, the approach wastes substantial effort and computation cycles. Continued scientific progress demands new paradigms for debugging large-scale applications. The Correctness on Petascale Systems (CoPS) project is developing a revolutionary debugging scheme that will reduce the debugging problem to a scale that human developers can comprehend. The scheme can provide precise diagnoses of the root causes of failure, including suggestions of the location and the type of errors down to the level of code regions or even a single execution point. Our fundamentally new strategy combines and expands three relatively new complementary debugging approaches. The Stack Trace Analysis Tool (STAT), a 2011 R&D 100 Award Winner, identifies behavior equivalence classes in MPI jobs and highlights behavior when elements of the class demonstrate divergent behavior, often the first indicator of an error. The Cooperative Bug Isolation (CBI) project has developed statistical techniques for isolating programming errors in widely deployed code that we will adapt to large-scale parallel applications. Finally, we are developing a new approach to parallelizing expensive correctness analyses, such as analysis of memory usage in the Memgrind tool. In the first two

  6. A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast

    Institute of Scientific and Technical Information of China (English)

    ZHAO Anjun; LU Xiangli; GUO Lei

    2006-01-01

    A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

  7. IPTV multicast with peer-assisted lossy error control

    Science.gov (United States)

    Li, Zhi; Zhu, Xiaoqing; Begen, Ali C.; Girod, Bernd

    2010-07-01

    Emerging IPTV technology uses source-specific IP multicast to deliver television programs to end-users. To provide reliable IPTV services over the error-prone DSL access networks, a combination of multicast forward error correction (FEC) and unicast retransmissions is employed to mitigate the impulse noises in DSL links. In existing systems, the retransmission function is provided by the Retransmission Servers sitting at the edge of the core network. In this work, we propose an alternative distributed solution where the burden of packet loss repair is partially shifted to the peer IP set-top boxes. Through Peer-Assisted Repair (PAR) protocol, we demonstrate how the packet repairs can be delivered in a timely, reliable and decentralized manner using the combination of server-peer coordination and redundancy of repairs. We also show that this distributed protocol can be seamlessly integrated with an application-layer source-aware error protection mechanism called forward and retransmitted Systematic Lossy Error Protection (SLEP/SLEPr). Simulations show that this joint PARSLEP/ SLEPr framework not only effectively mitigates the bottleneck experienced by the Retransmission Servers, thus greatly enhancing the scalability of the system, but also efficiently improves the resistance to the impulse noise.

  8. Linear and non-linear video and TV applications using IPv6 and IPv6 multicast

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging trends in next-generation delivery of entertainment-quality video. These trends are observable and can be capitalized upon by progressive service providers, telcos, cable operators, and ISPs. This comprehensive guide explores these evolving directions in the TV/v

  9. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  10. Tunable Photonic RF Generator for Dynamic Allocation and Multicast of 1.25 Gbps Channels in the 60 GHz Unlicensed Band

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Pang, Xiaodan; Vegas Olmos, Juan José

    2013-01-01

    ) or in the central office (CO). At the RN, we perform the replication of the original channel suitable for closely spaced multicast applications such as high definition (HD) video delivery where RN serves as a photonic radio frequency (RF) generator for both channel allocation and multicast. Experimental...

  11. Test and debug features of the RTO7 chip

    NARCIS (Netherlands)

    Kaam, van K.M.M.; Vermeulen, H.G.H.; Bergveld, H.J.

    2005-01-01

    The Philips RTO7 chip consists of a complete receive chain from RF up to and including digital demodulation for Bluetooth-like radio communication. This paper describes both the implementation and verification of the test and debugs hardware for the digital core of the RTO7. The core-based DfT and

  12. Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission

    Directory of Open Access Journals (Sweden)

    Fan Jiang

    2017-11-01

    Full Text Available In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective resource allocation and power control schemes, while considering the quality of service (QoS requirements of both cellular users (CUs and D2D clusters. We first build the optimization model and a heuristic resource and power allocation algorithm is then proposed to solve the energy-efficiency problem with less computational complexity. Numerical results indicate that the proposed algorithm outperforms existing schemes in terms of throughput per energy consumption.

  13. Modern multithreading implementing, testing, and debugging multithreaded Java and C++/Pthreads/Win32 programs

    CERN Document Server

    Carver, Richard H

    2005-01-01

    Master the essentials of concurrent programming,including testing and debuggingThis textbook examines languages and libraries for multithreaded programming. Readers learn how to create threads in Java and C++, and develop essential concurrent programming and problem-solving skills. Moreover, the textbook sets itself apart from other comparable works by helping readers to become proficient in key testing and debugging techniques. Among the topics covered, readers are introduced to the relevant aspects of Java, the POSIX Pthreads library, and the Windows Win32 Applications Programming Interface.

  14. Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Francesco Chiti

    2017-12-01

    Full Text Available The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has triggered new communication paradigms such as device-to-device (D2D and relaying communication schemes, which are both considered as strong drivers for the next fifth-generation (5G cellular systems. Recently, the social-aware layer and its relationship to and influence on the physical communications layer have gained great attention as emerging focus points. We focus here on the case of relaying communications to pursue the multicast data dissemination to a group of users forming a social community through a relay node, according to the extension of the D2D mode to the case of device-to-many devices. Moreover, in our case, the source selects the device to act as the relay among different users of the multicast group by taking into account both the propagation link conditions and the relay social-trust level with the constraint of minimizing the end-to-end content delivery delay. An optimization procedure is also proposed in order to achieve the best performance. Finally, numerical results are provided to highlight the advantages of considering the impact of social level on the end-to-end delivery delay in the integrated social–physical network in comparison with the classical relay-assisted multicast communications for which the relay social-trust level is not considered.

  15. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  16. An Economic Case for End System Multicast

    Science.gov (United States)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    This paper presents a non-strategic model for the end-system multicast networks based on the concept of replica exchange economy. We believe that microeconomics is a good candidate to investigate the problem of selfishness of the end-users (peers) in order to maximize the aggregate throughput. In this solution concept, the decisions that a peer might make, does not affect the actions of the other peers at all. The proposed mechanism tunes the price of the service in such a way that general equilibrium holds.

  17. All-optical broadcast and multicast technologies based on PPLN waveguide

    DEFF Research Database (Denmark)

    Ye, Lingyun; Wang, Ju; Hu, Hao

    2013-01-01

    All-optical 1×4 broadcast and 1×3 multicast experiments of a 40-Gb/s return-to-zero on-off keying (RZ-OOK) signal based on a periodically poled lithium niobate (PPLN) waveguide are demonstrated in this letter. Clear opened eye diagrams and error-free performance are achieved for the broadcast...

  18. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  19. Hybrid digital-analog video transmission in wireless multicast and multiple-input multiple-output system

    Science.gov (United States)

    Liu, Yu; Lin, Xiaocheng; Fan, Nianfei; Zhang, Lin

    2016-01-01

    Wireless video multicast has become one of the key technologies in wireless applications. But the main challenge of conventional wireless video multicast, i.e., the cliff effect, remains unsolved. To overcome the cliff effect, a hybrid digital-analog (HDA) video transmission framework based on SoftCast, which transmits the digital bitstream with the quantization residuals, is proposed. With an effective power allocation algorithm and appropriate parameter settings, the residual gains can be maximized; meanwhile, the digital bitstream can assure transmission of a basic video to the multicast receiver group. In the multiple-input multiple-output (MIMO) system, since nonuniform noise interference on different antennas can be regarded as the cliff effect problem, ParCast, which is a variation of SoftCast, is also applied to video transmission to solve it. The HDA scheme with corresponding power allocation algorithms is also applied to improve video performance. Simulations show that the proposed HDA scheme can overcome the cliff effect completely with the transmission of residuals. What is more, it outperforms the compared WSVC scheme by more than 2 dB when transmitting under the same bandwidth, and it can further improve performance by nearly 8 dB in MIMO when compared with the ParCast scheme.

  20. Almost optimal distributed M2M multicasting in wireless mesh networks

    DEFF Research Database (Denmark)

    Xin, Qin; Manne, Fredrik; Zhang, Yan

    2012-01-01

    Wireless Mesh Networking (WMN) is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. In this paper, we study the problem of multipoint-to- multipoint (M2M) multicasting in a WMN which aims to use the minimum nu...

  1. Fundamentals of IP and SoC security design, verification, and debug

    CERN Document Server

    Ray, Sandip; Sur-Kolay, Susmita

    2017-01-01

    This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on desi...

  2. Realization of rapid debugging for detection circuit of optical fiber gas sensor: Using an analog signal source

    Science.gov (United States)

    Tian, Changbin; Chang, Jun; Wang, Qiang; Wei, Wei; Zhu, Cunguang

    2015-03-01

    An optical fiber gas sensor mainly consists of two parts: optical part and detection circuit. In the debugging for the detection circuit, the optical part usually serves as a signal source. However, in the debugging condition, the optical part can be easily influenced by many factors, such as the fluctuation of ambient temperature or driving current resulting in instability of the wavelength and intensity for the laser; for dual-beam sensor, the different bends and stresses of the optical fiber will lead to the fluctuation of the intensity and phase; the intensity noise from the collimator, coupler, and other optical devices in the system will also result in the impurity of the optical part based signal source. In order to dramatically improve the debugging efficiency of the detection circuit and shorten the period of research and development, this paper describes an analog signal source, consisting of a single chip microcomputer (SCM), an amplifier circuit, and a voltage-to-current conversion circuit. It can be used to realize the rapid debugging detection circuit of the optical fiber gas sensor instead of optical part based signal source. This analog signal source performs well with many other advantages, such as the simple operation, small size, and light weight.

  3. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.

    Science.gov (United States)

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2016-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

  4. Evaluación de ancho de banda en transmisiones multicast sparse mode implementadas en redes IPV6

    OpenAIRE

    Pineda Ancco, Ferdinand; Directora Asociada de Investigación, Universidad Peruana Unión. Lima; Cruz de la Cruz, José; Mamani Pari, David

    2017-01-01

    En el trabajo de investigación se describió el diseño e implementación del protocolo multicast de tipo Sparsemode con el objetivo de mejorar el tráfico de datos en redes que transporten información unidireccional. Eldiseño se realiza sobre una red que implementa IPV6 como protocolo de capa 3 del modelo de referencia OSI.Para validar el método, la evaluación del tráfico se realizó analizando el ancho de banda, retardos y cantidad debits enviados por el protocolo multicast Sparse mode cursado e...

  5. Joint NC-ARQ and AMC for QoS-Guaranteed Mobile Multicast

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Wang, Haibo; Schwefel, Hans-Peter

    2010-01-01

    the scalability problem of applying ARQ in multicast. Then we propose two joint NC-ARQ-AMC schemes, namely, the Average PER-based AMC (AvgPER-AMC) with Opt-ARQ and AvgPER-AMC with SubOpt-ARQ in a cross-layer design framework to maximize the average spectral efficiency per receiver under specific QoS constraints...

  6. Debugging and Logging Services for Defence Service Oriented Architectures

    Science.gov (United States)

    2012-02-01

    Service A software component and callable end point that provides a logically related set of operations, each of which perform a logical step in a...important to note that in some cases when the fault is identified to lie in uneditable code such as program libraries, or outsourced software services ...debugging is limited to characterisation of the fault, reporting it to the software or service provider and development of work-arounds and management

  7. Modelo de asignación predictivo de longitudes de ondas en redes WDM teniendo en cuenta dispersión residual y tráficos unicast/multicast con QoS

    Directory of Open Access Journals (Sweden)

    Javier Sierra

    2009-01-01

    Full Text Available El tráfico de Internet está en constante crecimiento y con él las aplicaciones del tipo unicast/multicast con diferentes requerimientos de Calidad de Servicio (QoS. Esto es motivo para que las Redes de Transporte Ópticas (OTN deban continuar su evolución hacia redes completamente ópticas (sin conversiones Óptico-Electrónico-Óptico: OEO. S/G Light-tree es una arquitectura de los nodos de las redes all-OTN que permite el optimo enrutamiento y/o manejo de tráficos unicast/multicast empleando el concepto de Traffic Grooming (TG, granularidad de tráfico en un ambiente óptico. Las técnicas de grooming así como los algoritmos de asignación y enrutamiento propuestos hasta el momento no tienen en cuenta los fenómenos que se pueden prestar en la fibra óptica, los cuales atenúan o alteran las diferentes longitudes de onda en las redes WDM (Wavelength Division Multiplexing. La dispersión cromática es un fenómeno que deforma los pulsos transmitidos en una fibra óptica y el efecto depende de la longitud de onda empleada en la transmisión. En este artículo, se propone un modelo predictivo de asignación de longitudes de ondas basado en cadenas de Markov que tiene en cuenta la dispersión residual en redes WDM que soportan traffic grooming y tráficos unicast/multicast con requerimientos de QoS. Los resultados de las simulaciones realizadas muestran que el modelo propuesto mejora la probabilidad de bloqueo de tráficos con requerimientos de QoS.

  8. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    Science.gov (United States)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  9. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  10. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  11. A Low-Complexity Subgroup Formation with QoS-Aware for Enhancing Multicast Services in LTE Networks

    Science.gov (United States)

    Algharem, M.; Omar, M. H.; Rahmat, R. F.; Budiarto, R.

    2018-03-01

    The high demand of Multimedia services on in Long Term Evolution (LTE) and beyond networks forces the networks operators to find a solution that can handle the huge traffic. Along with this, subgroup formation techniques are introduced to overcome the limitations of the Conventional Multicast Scheme (CMS) by splitting the multicast users into several subgroups based on the users’ channels quality signal. However, finding the best subgroup configuration with low complexity is need more investigations. In this paper, an efficient and simple subgroup formation mechanisms are proposed. The proposed mechanisms take the transmitter MAC queue in account. The effectiveness of the proposed mechanisms is evaluated and compared with CMS in terms of throughput, fairness, delay, Block Error Rate (BLER).

  12. Multi-Objective Resource Allocation Scheme for D2D Multicast with QoS Guarantees in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Fangmin Li

    2016-09-01

    Full Text Available Device-to-device (D2D multicast communication can greatly improve the spectrum utilization in a content delivery scenario. However, the co-channel interference and power consumption brought by D2D bring new challenges. All the D2D multicast groups expect to achieve a higher system capacity with less extra energy cost. In this paper, we investigate the uplink resource allocation issue when D2D multicast groups share the resources with other cellular uses (CUs, while guaranteeing a certain level of quality of service (QoS to CUs and D2D users. Firstly we address a flexible tradeoff framework in which the system power consumption and the system capacity (i.e., the number of admitted D2D links are assigned with different weight factors so that these two objectives are jointly considered. Then we propose an efficient resource optimization scheme, which comprises sub-channel allocation and signal-to-interference- plus-noise ratio (SINR assignment. Numerical results validate the effectiveness of the proposed framework, and demonstrate the advantages in dealing with the proposed multi-objective optimization problem.

  13. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  14. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James; Ho, Pin-Han; Shihada, Basem

    2009-01-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  15. TOPIC: a debugging code for torus geometry input data of Monte Carlo transport code

    International Nuclear Information System (INIS)

    Iida, Hiromasa; Kawasaki, Hiromitsu.

    1979-06-01

    TOPIC has been developed for debugging geometry input data of the Monte Carlo transport code. the code has the following features: (1) It debugs the geometry input data of not only MORSE-GG but also MORSE-I capable of treating torus geometry. (2) Its calculation results are shown in figures drawn by Plotter or COM, and the regions not defined or doubly defined are easily detected. (3) It finds a multitude of input data errors in a single run. (4) The input data required in this code are few, so that it is readily usable in a time sharing system of FACOM 230-60/75 computer. Example TOPIC calculations in design study of tokamak fusion reactors (JXFR, INTOR-J) are presented. (author)

  16. Resource management in energy-limited, bandwidth-limited, transceiver-limited wireless networks for session-based multicasting

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2001-01-01

    In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well as on bandwidth and transceiver resources...

  17. Out-of-Sequence Prevention for Multicast Input-Queuing Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah; Berger, Michael Stübert

    2011-01-01

    This paper proposes two cell dispatching algorithms for the input-queuing space-memory-memory (IQ-SMM) Closnetwork to reduce out-of-sequence (OOS) for multicast traffic. The frequent connection pattern change of DSRR results in a severe OOS problem. Based on the principle of DSRR, MFDSRR is able ...

  18. Real-time video streaming system for LHD experiment using IP multicast

    International Nuclear Information System (INIS)

    Emoto, Masahiko; Yamamoto, Takashi; Yoshida, Masanobu; Nagayama, Yoshio; Hasegawa, Makoto

    2009-01-01

    In order to accomplish smooth cooperation research, remote participation plays an important role. For this purpose, the authors have been developing various applications for remote participation for the LHD (Large Helical Device) experiments, such as Web interface for visualization of acquired data. The video streaming system is one of them. It is useful to grasp the status of the ongoing experiment remotely, and we provide the video images displayed in the control room to the remote users. However, usual streaming servers cannot send video images without delay. The delay changes depending on how to send the images, but even a little delay might become critical if the researchers use the images to adjust the diagnostic devices. One of the main causes of delay is the procedure of compressing and decompressing the images. Furthermore, commonly used video compression method is lossy; it removes less important information to reduce the size. However, lossy images cannot be used for physical analysis because the original information is lost. Therefore, video images for remote participation should be sent without compression in order to minimize the delay and to supply high quality images durable for physical analysis. However, sending uncompressed video images requires large network bandwidth. For example, sending 5 frames of 16bit color SXGA images a second requires 100Mbps. Furthermore, the video images must be sent to several remote sites simultaneously. It is hard for a server PC to handle such a large data. To cope with this problem, the authors adopted IP multicast to send video images to several remote sites at once. Because IP multicast packets are sent only to the network on which the clients want the data; the load of the server does not depend on the number of clients and the network load is reduced. In this paper, the authors discuss the feasibility of high bandwidth video streaming system using IP multicast. (author)

  19. MeshTree: A Delay optimised Overlay Multicast Tree Building Protocol

    OpenAIRE

    Tan, Su-Wei; Waters, A. Gill; Crawford, John

    2005-01-01

    We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if computed centrally. We identify two problems in traditional distributed solutions, namely the greedy problem and delay-cost trade-off. By offering solutions to these problems, we propose a new self-organising distributed tree building protocol called MeshTree. The main idea is to embed the delivery tree in a degree-bound...

  20. Adaptive Modulation for a Downlink Multicast Channel in OFDMA Systems

    DEFF Research Database (Denmark)

    Wang, Haibo; Schwefel, Hans-Peter; Toftegaard, Thomas Skjødeberg

    2007-01-01

    In this paper we focus on adaptive modulation strategies for multicast service in orthogonal frequency division multiple access systems. A reward function has been defined as the optimization target, which includes both the average user throughput and bit error rate. We also developed an adaptive...... modulation strategy, namely local best reward strategy, to maximize this reward function. The performance of different modulation strategies are compared in different SNR distribution scenarios, and the optimum strategy in each scenario is suggested....

  1. Flexible and re-configurable optical three-input XOR logic gate of phase-modulated signals with multicast functionality for potential application in optical physical-layer network coding.

    Science.gov (United States)

    Lu, Guo-Wei; Qin, Jun; Wang, Hongxiang; Ji, XuYuefeng; Sharif, Gazi Mohammad; Yamaguchi, Shigeru

    2016-02-08

    Optical logic gate, especially exclusive-or (XOR) gate, plays important role in accomplishing photonic computing and various network functionalities in future optical networks. On the other hand, optical multicast is another indispensable functionality to efficiently deliver information in optical networks. In this paper, for the first time, we propose and experimentally demonstrate a flexible optical three-input XOR gate scheme for multiple input phase-modulated signals with a 1-to-2 multicast functionality for each XOR operation using four-wave mixing (FWM) effect in single piece of highly-nonlinear fiber (HNLF). Through FWM in HNLF, all of the possible XOR operations among input signals could be simultaneously realized by sharing a single piece of HNLF. By selecting the obtained XOR components using a followed wavelength selective component, the number of XOR gates and the participant light in XOR operations could be flexibly configured. The re-configurability of the proposed XOR gate and the function integration of the optical logic gate and multicast in single device offer the flexibility in network design and improve the network efficiency. We experimentally demonstrate flexible 3-input XOR gate for four 10-Gbaud binary phase-shift keying signals with a multicast scale of 2. Error-free operations for the obtained XOR results are achieved. Potential application of the integrated XOR and multicast function in network coding is also discussed.

  2. Energy-minimized design in all-optical networks using unicast/multicast traffic grooming

    Science.gov (United States)

    Puche, William S.; Amaya, Ferney O.; Sierra, Javier E.

    2013-09-01

    The increased bandwidth required by applications, tends to raise the amount of optical equipment, for this reason, it is essential to maintain a balance between the wavelength allocation, available capacity and number of optical devices to achieve the lowest power consumption. You could say that we propose a model that minimizes energy consumption, using unicast / multicast traffic grooming in optical networks.

  3. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  4. Re-targeting the Graze performance debugging tool for Java threads and analyzing the re-targeting to automatically parallelized (FORTRAN) code

    OpenAIRE

    Tsai, Pedro T. H.

    2000-01-01

    Approved for public release; distribution is unlimited This research focuses on the design of a language-independent concept, Glimpse, for performance debugging of multi-threaded programs. This research extends previous work on Graze, a tool designed and implemented for performance debugging of C++ programs. Not only is Glimpse easily portable among different programming languages, (i) it is useful in many different paradigms ranging from few long-lived threads to many short-lived...

  5. Improvement of the Response Time in an Open Source Audioconference Architecture Based on SIP Multicast Implemented with JainSIP, JainSDP and JGAP Libraries

    Directory of Open Access Journals (Sweden)

    Carlos M. Moreno

    2014-06-01

    Full Text Available Group services like the audioconference require a minimum level of quality of service for multicast sessions. This work proposes a new overlay multicast architecture based on SIP extensions and a genetic algorithm. The architecture consists of a SIP Extender client (SE, a Multicast Gateway Agent (MGA and a Multicast Manager (MM. The SE receives information about the most adequate MGA for it determined by a genetic algorithm inside the MM, then connects the chosen MGA and maintains connection with the MM itself. The genetic algorithm is implemented with JGAP(Java Genetic Algorithm Package libraries. The SE and MGA are programmed with JainSIP and JainSDP libraries which contain Java structures associated with the SIP protocol and session description. Some experiments over UTP wired and WiFi IEEE802.11n network were performed. Partial results with static and dynamic MGA selection show that, if we compare the joining and leaving time measured inside a station containing SE client programmed with JainSIP and JainSDP libraries versus SJphone proprietary client, the software engineering may have more influence than the medium access method in the response time for a potential group member. Even more, the genetic algorithm at the MM minimizes the response time at great scale.

  6. Iterative Authoring Using Story Generation Feedback: Debugging or Co-creation?

    Science.gov (United States)

    Swartjes, Ivo; Theune, Mariët

    We explore the role that story generation feedback may play within the creative process of interactive story authoring. While such feedback is often used as 'debugging' information, we explore here a 'co-creation' view, in which the outcome of the story generator influences authorial intent. We illustrate an iterative authoring approach in which each iteration consists of idea generation, implementation and simulation. We find that the tension between authorial intent and the partially uncontrollable story generation outcome may be relieved by taking such a co-creation approach.

  7. Efficiency Intra-Cluster Device-to-Device Relay Selection for Multicast Services Based on Combinatorial Auction

    Directory of Open Access Journals (Sweden)

    Yong Zhang

    2015-12-01

    Full Text Available In Long Term Evolution-Advanced (LTE-A networks, Device-to-device (D2D communications can be utilized to enhance the performance of multicast services by leveraging D2D relays to serve nodes with worse channel conditions within a cluster. For traditional D2D relay schemes, D2D links with poor channel condition may be the bottleneck of system sum data rate. In this paper, to optimize the throughput of D2D communications, we introduce an iterative combinatorial auction algorithm for efficient D2D relay selection. In combinatorial auctions, the User Equipments (UEs that fails to correctly receive multicast data from eNodeB (eNB are viewed as bidders that compete for D2D relays, while the eNB is treated as the auctioneer. We also give properties of convergency and low-complexity and present numerical simulations to verify the efficiency of the proposed algorithm.

  8. Error Control Techniques for Efficient Multicast Streaming in UMTS Networks: Proposals andPerformance Evaluation

    Directory of Open Access Journals (Sweden)

    Michele Rossi

    2004-06-01

    Full Text Available In this paper we introduce techniques for efficient multicast video streaming in UMTS networks where a video content has to be conveyed to multiple users in the same cell. Efficient multicast data delivery in UMTS is still an open issue. In particular, suitable solutions have to be found to cope with wireless channel errors, while maintaining both an acceptable channel utilization and a controlled delivery delay over the wireless link between the serving base station and the mobile terminals. Here, we first highlight that standard solutions such as unequal error protection (UEP of the video flow are ineffective in the UMTS systems due to its inherent large feedback delay at the link layer (Radio Link Control, RLC. Subsequently, we propose a local approach to solve errors directly at the UMTS link layer while keeping a reasonably high channel efficiency and saving, as much as possible, system resources. The solution that we propose in this paper is based on the usage of the common channel to serve all the interested users in a cell. In this way, we can save resources with respect to the case where multiple dedicated channels are allocated for every user. In addition to that, we present a hybrid ARQ (HARQ proactive protocol that, at the cost of some redundancy (added to the link layer flow, is able to consistently improve the channel efficiency with respect to the plain ARQ case, by therefore making the use of a single common channel for multicast data delivery feasible. In the last part of the paper we give some hints for future research, by envisioning the usage of the aforementioned error control protocols with suitably encoded video streams.

  9. Configuration and debug of field programmable gate arrays using MATLAB[reg)/SIMULINK[reg

    International Nuclear Information System (INIS)

    Grout, I; Ryan, J; O'Shea, T

    2005-01-01

    Increasingly, the need to seamlessly link high-level behavioural descriptions of electronic hardware for modelling and simulation purposes to the final application hardware highlights the gap between the high-level behavioural descriptions of the required circuit functionality (considering here digital logic) in commonly used mathematical modelling tools, and the hardware description languages such as VHDL and Verilog-HDL. In this paper, the linking of a MATLAB[reg] model for digital algorithm for implementation on a programmable logic device for design synthesis from the MATLAB[reg] model into VHDL is discussed. This VHDL model is itself synthesised and downloaded to the target Field Programmable Gate Array, for normal operation and also for design debug purposes. To demonstrate this, a circuit architecture mapped from a SIMULINK[reg] model is presented. The rationale is for a seamless interface between the initial algorithm development and the target hardware, enabling the hardware to be debugged and compared to the simulated model from a single interface for use with by a non-expert in the programmable logic and hardware description language use

  10. An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding

    Directory of Open Access Journals (Sweden)

    Zhaoyuan Wang

    2015-08-01

    Full Text Available Recent years witness a significant growth in multimedia applications. Among them, a stream of applications is real-time and requires one-to-many fast data transmission with stringent quality-of-service (QoS requirements, where multicast is an important supporting technology. In particular, with more and more mobile end users requesting real-time broadband multimedia applications, it is of vital importance to provide them with satisfied quality of experience. As network coding can offer higher bandwidth to users and accommodate more flows for networks than traditional routing, this paper studies the multicast routing problem with network coding and formulates it as a multi-objective optimization problem. As delay and packet loss ratio (PLR are two important performance indicators for QoS, we consider them as the two objectives for minimization. To address the problem above, we present a multi-objective evolutionary algorithm based on decomposition (MOEA/D, where an all population updating rule is devised to address the problem of lacking feasible solutions in the search space. Experimental results demonstrate the effectiveness of the proposed algorithm and it outperforms a number of state-of-the-art algorithms.

  11. High Performance with Prescriptive Optimization and Debugging

    DEFF Research Database (Denmark)

    Jensen, Nicklas Bo

    parallelization and automatic vectorization is attractive as it transparently optimizes programs. The thesis contributes an improved dependence analysis for explicitly parallel programs. These improvements lead to more loops being vectorized, on average we achieve a speedup of 1.46 over the existing dependence...... analysis and vectorizer in GCC. Automatic optimizations often fail for theoretical and practical reasons. When they fail we argue that a hybrid approach can be effective. Using compiler feedback, we propose to use the programmer’s intuition and insight to achieve high performance. Compiler feedback...... enlightens the programmer why a given optimization was not applied, and suggest how to change the source code to make it more amenable to optimizations. We show how this can yield significant speedups and achieve 2.4 faster execution on a real industrial use case. To aid in parallel debugging we propose...

  12. Visual Debugging of Object-Oriented Systems With the Unified Modeling Language

    Science.gov (United States)

    2004-03-01

    to be “the systematic and imaginative use of the technology of interactive computer graphics and the disciplines of graphic design, typography ...Traditional debugging involves the user creating a mental image of the structure and execution path based on source code. According to Miller, the 7 ± 2...of each FigClass (the class that represents the image of a class), the DOI and LOD for each, and finally calls a method to apply the visual

  13. Performance Evaluation of Multicast Video Distribution using LTE-A in Vehicular Environments

    OpenAIRE

    Thota, Jayashree; Bulut, Berna; Doufexi, Angela; Armour, Simon; Nix, Andrew

    2017-01-01

    Application Layer Forward Error Correction (AL-FEC) based on Raptor codes has been employed in Multimedia Broadcast/Multicast Services (MBMS) to improve reliability. This paper considers a cross-layer system based on the latest Raptor Q codes for transmitting high data rate video. Multiple Input Multiple Output (MIMO) channels in a realistic outdoor environment for a user moving at 50kmph in an LTE-A system is considered. A link adaptation model with optimized cross-layer parameters is propos...

  14. The Impact of Packet Loss Behavior in 802.11g on the Cooperation Gain in Reliable Multicast

    DEFF Research Database (Denmark)

    Heide, Janus; Vingelmann, Peter; Pedersen, Morten Videbæk

    2012-01-01

    In group-oriented applications for wireless networks, reliable multicast strategies are important in order to efficiently distribute data, e.g. in Wireless Mesh Networks (WMNs) and Mobile Ad-hoc NETworks (MANETs). To ensure that developed protocols and systems will operate as expected when deploy...

  15. All-optical multi-wavelength conversion with negative power penalty by a commercial SOA-MZI for WDM wavelength multicast

    NARCIS (Netherlands)

    Yan, N.; Jung, H.D.; Tafur Monroy, I.; Waardt, de H.; Koonen, A.M.J.

    2007-01-01

    WDM wavelength multicast is demonstrated by all-optical multi-wavelength conversion at 10 Gb/s using a commercial SOA-MZI. We report for the first time simultaneous one-to-four conversion with negative power penalty of 1.84 dB.

  16. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  17. Hybrid monitoring scheme for end-to-end performance enhancement of multicast-based real-time media

    Science.gov (United States)

    Park, Ju-Won; Kim, JongWon

    2004-10-01

    As real-time media applications based on IP multicast networks spread widely, end-to-end QoS (quality of service) provisioning for these applications have become very important. To guarantee the end-to-end QoS of multi-party media applications, it is essential to monitor the time-varying status of both network metrics (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In this paper, targeting the multicast-enabled AG (Access Grid) a next-generation group collaboration tool based on multi-party media services, the applicability of hybrid monitoring scheme that combines active and passive monitoring is investigated. The active monitoring measures network-layer metrics (i.e., network condition) with probe packets while the passive monitoring checks both application-layer metrics (i.e., user traffic condition by analyzing RTCP packets) and system metrics. By comparing these hybrid results, we attempt to pinpoint the causes of performance degradation and explore corresponding reactions to improve the end-to-end performance. The experimental results show that the proposed hybrid monitoring can provide useful information to coordinate the performance improvement of multi-party real-time media applications.

  18. Prototype application for the control and debugging of CMS upgrade projects

    CERN Document Server

    Mills-Howell, Dominic

    2016-01-01

    Following the high-luminosity upgrades of the LHC, many subsystems of the CMS experiment require upgrading and others are using the LHC shutdowns as an opportunity to improve performance. The upgrades, themselves, have served to highlight the exigency to attack problems that were previously unaddressed. One such problem is the need for a tool that allows the users to easily monitor, debug, and test custom hardware. Such a tool could be abstracted to work, in theory, with various hardware devices. In addition to having the added benefit of being able to support future hardware, and maintaining parallel operations with the remaining control software.

  19. Application of remote debugging techniques in user-centric job monitoring

    International Nuclear Information System (INIS)

    Dos Santos, T; Mättig, P; Harenberg, T; Volkmer, F; Beermann, T; Kalinin, S; Ahrens, R; Wulff, N

    2012-01-01

    With the Job Execution Monitor, a user-centric job monitoring software developed at the University of Wuppertal and integrated into the job brokerage systems of the WLCG, job progress and grid worker node health can be supervised in real time. Imminent error conditions can thus be detected early by the submitter and countermeasures can be taken. Grid site admins can access aggregated data of all monitored jobs to infer the site status and to detect job misbehaviour. To remove the last 'blind spot' from this monitoring, a remote debugging technique based on the GNU C compiler suite was developed and integrated into the software; its design concept and architecture is described in this paper and its application discussed.

  20. Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Young-Ho; Choi, Jihoon

    2017-02-25

    A new hybrid automatic repeat request (HARQ) scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.

  1. Hybrid ARQ Scheme with Autonomous Retransmission for Multicasting in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Ho Jung

    2017-02-01

    Full Text Available A new hybrid automatic repeat request (HARQ scheme for multicast service for wireless sensor networks is proposed in this study. In the proposed algorithm, the HARQ operation is combined with an autonomous retransmission method that ensure a data packet is transmitted irrespective of whether or not the packet is successfully decoded at the receivers. The optimal number of autonomous retransmissions is determined to ensure maximum spectral efficiency, and a practical method that adjusts the number of autonomous retransmissions for realistic conditions is developed. Simulation results show that the proposed method achieves higher spectral efficiency than existing HARQ techniques.

  2. An efficient mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2014-08-01

    This paper proposes an efficient overlay multicast provisioning (OMP) mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks. To facilitate request provisioning, OMP jointly utilizes a data learning (DL) scheme on the IP/MPLS layer for logical link cost estimation, and a lightpath fragmentation (LPF) based method on the WDM layer for improving resource sharing in grooming process. Extensive simulations are carried out to evaluate the performance of OMP mechanism under different traffic loads, with either limited or unlimited port resources. Simulation results demonstrate that OMP significantly outperforms the existing methods. To evaluate the respective influences of the DL scheme and the LPF method on OMP performance, provisioning mechanisms only utilizing either the IP/MPLS layer DL scheme or the WDM layer LPF method are also devised. Comparison results show that both DL and LPF methods help improve OMP blocking performance, and contribution from the DL scheme is more significant when the fixed routing and first-fit wavelength assignment (RWA) strategy is adopted on the WDM layer. Effects of a few other factors, including definition of connection cost to be reported by the WDM layer to the IP/MPLS layer and WDM-layer routing method, on OMP performance are also evaluated.

  3. Development of a real-time monitoring system and integration of different computer system in LHD experiments using IP multicast

    International Nuclear Information System (INIS)

    Emoto, Masahiko; Nakamura, Yukio; Teramachi, Yasuaki; Okumura, Haruhiko; Yamaguchi, Satarou

    2002-01-01

    There are several different computer systems in LHD (Large Helical Device) experiment, and therefore the coalition of these computers is a key to perform the experiment. Real-time monitoring system is also important because the long discharge is needed in the LHD experiment. In order to achieve these two requirements, the technique of IP multicast is adopted. The authors have developed three new systems, the first one is the real-time monitoring system, the next one is the delivery system of the shot number and the last one is the real-time notification system of the plasma data registration. The first system can deliver the real-time monitoring data to the LHD experimental LAN through the firewall of the LHD control LAN in NIFS. The other two systems are used to realize high coalition of the different computers in the LHD plasma experiment. We can conclude that IP multicast is very useful both in the LHD experiment and a future large plasma experiment from various experiences. (author)

  4. Next Generation Integrated Environment for Collaborative Work Across Internets

    Energy Technology Data Exchange (ETDEWEB)

    Harvey B. Newman

    2009-02-24

    We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

  5. An integrated development environment for PMESII model authoring, integration, validation, and debugging

    Science.gov (United States)

    Pioch, Nicholas J.; Lofdahl, Corey; Sao Pedro, Michael; Krikeles, Basil; Morley, Liam

    2007-04-01

    To foster shared battlespace awareness in Air Operations Centers supporting the Joint Forces Commander and Joint Force Air Component Commander, BAE Systems is developing a Commander's Model Integration and Simulation Toolkit (CMIST), an Integrated Development Environment (IDE) for model authoring, integration, validation, and debugging. CMIST is built on the versatile Eclipse framework, a widely used open development platform comprised of extensible frameworks that enable development of tools for building, deploying, and managing software. CMIST provides two distinct layers: 1) a Commander's IDE for supporting staff to author models spanning the Political, Military, Economic, Social, Infrastructure, Information (PMESII) taxonomy; integrate multiple native (third-party) models; validate model interfaces and outputs; and debug the integrated models via intuitive controls and time series visualization, and 2) a PMESII IDE for modeling and simulation developers to rapidly incorporate new native simulation tools and models to make them available for use in the Commander's IDE. The PMESII IDE provides shared ontologies and repositories for world state, modeling concepts, and native tool characterization. CMIST includes extensible libraries for 1) reusable data transforms for semantic alignment of native data with the shared ontology, and 2) interaction patterns to synchronize multiple native simulations with disparate modeling paradigms, such as continuous-time system dynamics, agent-based discrete event simulation, and aggregate solution methods such as Monte Carlo sampling over dynamic Bayesian networks. This paper describes the CMIST system architecture, our technical approach to addressing these semantic alignment and synchronization problems, and initial results from integrating Political-Military-Economic models of post-war Iraq spanning multiple modeling paradigms.

  6. Wavelength conversion, time demultiplexing and multicasting based on cross-phase modulation and four-wave mixing in dispersion-flattened highly nonlinear photonic crystal fiber

    International Nuclear Information System (INIS)

    Hui, Zhan-Qiang; Zhang, Jian-Guo

    2012-01-01

    We propose the use of cross-phase modulation (XPM) and four-wave mixing (FWM) in dispersion-flattened highly nonlinear photonic crystal fibers (HNL-PCFs) to implement the functionalities of wavelength conversion, simultaneous time demultiplexing and wavelength multicasting in optical time-division multiplexing (OTDM) systems. The experiments on wavelength conversion at 80 Gbit s −1 and OTDM demultiplexing from 80 to 10 Gbit s −1 with wavelength multicasting of two channels are successfully demonstrated to validate the proposed scheme, which are carried out by using two segments of dispersion-flattened HNL-PCFs with lengths of 100 and 50 m, respectively. Moreover, the bit error rate (BER) performance is also measured. The results show that our designed system can achieve a power penalty of less than 4.6 dB for two multicasting channels with a 24 nm wavelength span at the BER of 10 −9 when compared with the 10 Gbit/s back-to-back measurement. The proposed system is transparent to bit rate since only an ultrafast third-order nonlinear effect is used. The resulting configuration is compact, robust and reliable, benefiting from the use of dispersion-flattened HNL-PCFs with short lengths. This also makes the proposed system more flexible in the operational wavelengths than those based on dispersion-shifted fibers and traditional highly nonlinear fibers. (paper)

  7. Provenance-Based Debugging and Drill-Down in Data-Oriented Workflows

    KAUST Repository

    Ikeda, Robert

    2012-04-01

    Panda (for Provenance and Data) is a system that supports the creation and execution of data-oriented workflows, with automatic provenance generation and built-in provenance tracing operations. Workflows in Panda are arbitrary a cyclic graphs containing both relational (SQL) processing nodes and opaque processing nodes programmed in Python. For both types of nodes, Panda generates logical provenance - provenance information stored at the processing-node level - and uses the generated provenance to support record-level backward tracing and forward tracing operations. In our demonstration we use Panda to integrate, process, and analyze actual education data from multiple sources. We specifically demonstrate how Panda\\'s provenance generation and tracing capabilities can be very useful for workflow debugging, and for drilling down on specific results of interest. © 2012 IEEE.

  8. Design alternatives for process group membership and multicast

    Science.gov (United States)

    Birman, Kenneth P.; Cooper, Robert; Gleeson, Barry

    1991-01-01

    Process groups are a natural tool for distributed programming, and are increasingly important in distributed computing environments. However, there is little agreement on the most appropriate semantics for process group membership and group communication. These issues are of special importance in the Isis system, a toolkit for distributed programming. Isis supports several styles of process group, and a collection of group communication protocols spanning a range of atomicity and ordering properties. This flexibility makes Isis adaptable to a variety of applications, but is also a source of complexity that limits performance. This paper reports on a new architecture that arose from an effort to simplify Isis process group semantics. Our findings include a refined notion of how the clients of a group should be treated, what the properties of a multicast primitive should be when systems contain large numbers of overlapping groups, and a new construct called the casuality domain. As an illustration, we apply the architecture to the problem of converting processes into fault-tolerant process groups in a manner that is 'transparent' to other processes in the system.

  9. Multicast in Femtocell Networks: A Successive Interference Cancellation Approach

    Directory of Open Access Journals (Sweden)

    Donglin Hu

    2014-09-01

    Full Text Available A femtocell is a small cellular base station (BS, typically used for serving approved users within a small coverage. In this paper, we investigate the problem of data multicast in femtocell networks that incorporates superposition coding (SC and successive interference cancellation (SIC. The problem is to decide the transmission schedule for each BS, as well as the power allocation for the SC layers, to achieve a sufficiently large SNR for each layer to be decodable with SIC at each user. Minimizing the total BS power consumption achieves the goal of “green” communications. We formulate a Mixed Integer Nonlinear Programming (MINLP problem, and then reformulate the problem into a simpler form. Upper and lower performance bounds on the total BS power consumption are derived. Finally, we consider three typical connection scenarios, and develop optimal and nearoptimal algorithms for the three scenarios. The proposed algorithms have low computational complexity, and outperform a heuristic scheme with considerable gains in our simulation study.

  10. Development and Technical Validation of the Mobile Based Assistive Listening System: A Smartphone-Based Remote Microphone.

    Science.gov (United States)

    Lopez, Esteban Alejandro; Costa, Orozimbo Alves; Ferrari, Deborah Viviane

    2016-10-01

    The purpose of this research note is to describe the development and technical validation of the Mobile Based Assistive Listening System (MoBALS), a free-of-charge smartphone-based remote microphone application. MoBALS Version 1.0 was developed for Android (Version 2.1 or higher) and was coded with Java using Eclipse Indigo with the Android Software Development Kit. A Wi-Fi router with background traffic and 2 affordable smartphones were used for debugging and technical validation comprising, among other things, multicasting capability, data packet loss, and battery consumption. MoBALS requires at least 2 smartphones connected to the same Wi-Fi router for signal transmission and reception. Subscriber identity module cards or Internet connections are not needed. MoBALS can be used alone or connected to a hearing aid or cochlear implant via direct audio input. Maximum data packet loss was 99.28%, and minimum battery life was 5 hr. Other relevant design specifications and their implementation are described. MoBALS performed as a remote microphone with enhanced accessibility features and avoids overhead expenses by using already-available and affordable technology. The further development and technical revalidation of MoBALS will be followed by clinical evaluation with persons with hearing impairment.

  11. Decentralized Cloud Method For Multicasting Media Stream

    Directory of Open Access Journals (Sweden)

    D M B N Bandara

    2015-08-01

    Full Text Available With the advancement of Information technology the concept of idea sharing has advanced. Mostly on presentations personal computer and projector have become essentials. But on most occasions for connecting these equipment cables and physical devices are used. This is inefficient and time consuming. If a problem occurs someone with technical knowledge is necessary to solve the situation. The objective of this research is to use the wireless technology to reduce the manual configuration and build up a platform where one can easily share files a visuals media and feedback. A system has been developed to detect all the devices over a network and upon granted permission will share video audio and access controls. Final outcome of the research was a collaborative software bundle which work together on a network. One part of the system is a Desktop Network Software. And other is a Mobile Application. Desktop application can detect all other devices in the network which provides the same facility and if required can allocate a group and share its screen files and have a message stream to each device using multicasting. Mobile application can act as a mobile remote to the host computer of the group which can detect any input from user and pass it to the system.

  12. Dynamic Programming Optimization of Multi-rate Multicast Video-Streaming Services

    Directory of Open Access Journals (Sweden)

    Nestor Michael Caños Tiglao

    2010-06-01

    Full Text Available In large scale IP Television (IPTV and Mobile TV distributions, the video signal is typically encoded and transmitted using several quality streams, over IP Multicast channels, to several groups of receivers, which are classified in terms of their reception rate. As the number of video streams is usually constrained by both the number of TV channels and the maximum capacity of the content distribution network, it is necessary to find the selection of video stream transmission rates that maximizes the overall user satisfaction. In order to efficiently solve this problem, this paper proposes the Dynamic Programming Multi-rate Optimization (DPMO algorithm. The latter was comparatively evaluated considering several user distributions, featuring different access rate patterns. The experimental results reveal that DPMO is significantly more efficient than exhaustive search, while presenting slightly higher execution times than the non-optimal Multi-rate Step Search (MSS algorithm.

  13. Evaluación del punto de conmutación unicast- multicast para ahorro de potencia de transmisión en redes MBMS

    Directory of Open Access Journals (Sweden)

    Raúl Tamayo Fernández

    2014-01-01

    Full Text Available La oferta de aplicaciones y servicios multimedia para terminales móviles se hace principalmente a través de las redes celulares de tercera y cuarta generación (3G/4G existentes. El envío de los datos en este tipo de redes se realiza en modo unicast, es decir, a cada usuario se le dedican recursos de radio (ancho de banda y potencia de transmisión durante toda la sesión. Esto presenta algunos inconvenientes, tales como agotamiento rápido del ancho de banda del operador móvil, alto consumo de potencia de transmisión, incremento de la interferencia, y costos altos del servicio. Los operadores móviles requieren de nuevas tecnologías que optimicen el uso de sus recursos de radio y así lograr un mayor índice de penetración de los servicios. De ahí la necesidad de cambiar de paradigma hacia un modo de transmisión en multicast o broadcast, en el que una misma señal pueda recibirse por varios usuarios simultáneamente, de tal forma que los recursos de radio se puedan compartir. Para ello, la solución técnica sobre redes celulares LTE (Long Term Evolution se dio en la especificación 3GPP Release 6, llamada Servicio Multimedia por Broadcast/Multicast (MBMS, Multimedia Broadcast Multicast Service. La especificación de MBMS permite que una transmisión cambie de modo unicast a modo multicast a partir de un “punto de conmutación”, que determina el momento de hacer el cambio para obtener un ahorro tanto en ancho de banda como en potencia de transmisión. Este artículo presenta una evaluación para determinar los puntos de conmutación de modo de transmisión óptimos en el estándar MBMS para diferentes ambientes de propagación inalámbrica. Además, dado que MBMS se puede utilizar en topologías de Red de Frecuencia Única (SFN, Single Frequency Networks, que tienen la propiedad de “ganancia de red”, también se determina el ahorro de potencia de transmisión adicional que se obtiene en esta configuración.

  14. Data Integration Tool: Permafrost Data Debugging

    Science.gov (United States)

    Wilcox, H.; Schaefer, K. M.; Jafarov, E. E.; Pulsifer, P. L.; Strawhacker, C.; Yarmey, L.; Basak, R.

    2017-12-01

    We developed a Data Integration Tool (DIT) to significantly speed up the time of manual processing needed to translate inconsistent, scattered historical permafrost data into files ready to ingest directly into the Global Terrestrial Network-Permafrost (GTN-P). The United States National Science Foundation funded this project through the National Snow and Ice Data Center (NSIDC) with the GTN-P to improve permafrost data access and discovery. We leverage this data to support science research and policy decisions. DIT is a workflow manager that divides data preparation and analysis into a series of steps or operations called widgets (https://github.com/PermaData/DIT). Each widget does a specific operation, such as read, multiply by a constant, sort, plot, and write data. DIT allows the user to select and order the widgets as desired to meet their specific needs, incrementally interact with and evolve the widget workflows, and save those workflows for reproducibility. Taking ideas from visual programming found in the art and design domain, debugging and iterative design principles from software engineering, and the scientific data processing and analysis power of Fortran and Python it was written for interactive, iterative data manipulation, quality control, processing, and analysis of inconsistent data in an easily installable application. DIT was used to completely translate one dataset (133 sites) that was successfully added to GTN-P, nearly translate three datasets (270 sites), and is scheduled to translate 10 more datasets ( 1000 sites) from the legacy inactive site data holdings of the Frozen Ground Data Center (FGDC). Iterative development has provided the permafrost and wider scientific community with an extendable tool designed specifically for the iterative process of translating unruly data.

  15. Debugging Nano-Bio Interfaces: Systematic Strategies to Accelerate Clinical Translation of Nanotechnologies.

    Science.gov (United States)

    Mahmoudi, Morteza

    2018-03-17

    Despite considerable efforts in the field of nanomedicine that have been made by researchers, funding agencies, entrepreneurs, and the media, fewer nanoparticle (NP) technologies than expected have made it to clinical trials. The wide gap between the efforts and effective clinical translation is, at least in part, due to multiple overlooked factors in both in vitro and in vivo environments, a poor understanding of the nano-bio interface, and misinterpretation of the data collected in vitro, all of which reduce the accuracy of predictions regarding the NPs' fate and safety in humans. To minimize this bench-to-clinic gap, which may accelerate successful clinical translation of NPs, this opinion paper aims to introduce strategies for systematic debugging of nano-bio interfaces in the current literature. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Energy Bucket: A Tool for Power Profiling and Debugging of Sensor Nodes

    DEFF Research Database (Denmark)

    Andersen, Jacob; Hansen, Morten Tranberg

    2009-01-01

    The ability to precisely measure and compare energy consumption and relate this to particular parts of programs is a recurring theme in sensor network research. This paper presents the Energy Bucket, a low-cost tool designed for quick empirical measurements of energy consumptions across 5 decades...... of current draw. The Energy Bucket provides a light-weight state API for the target system, which facilitates easy scorekeeping of energy consumption between different parts of a target program. We demonstrate how this tool can be used to discover programming errors and debug sensor network applications.......Furthermore, we show how this tool, together with the target system API, offers a very detailed analysis of where energy is spent in an application, which proves to be very useful when comparing alternative implementations or validating theoretical energy consumption models....

  17. Alcatel-Lucent Service Routing Architect (SRA) self-study guide preparing for the BGP, VPRN and Multicast exams

    CERN Document Server

    Warnock, Glenn; Shaheen, Ghassan

    2015-01-01

    A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (SRA) certification Networking professionals are taking note of Alcatel-Lucent and its quick ascent in the networking and telecom industries. IP networking professionals looking for a comprehensive guide to obtaining the Alcatel-Lucent Service Routing Architect (SRA) certification will be pleased to learn of this new publication, Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams. The book comprises approximately 2,600 pages of print a

  18. Implementación y análisis de CBTv2 en el medioambiente Ns

    OpenAIRE

    Rigotti, Guillermo

    1998-01-01

    Desde la definición del modelo de servicio multicast en IP, el uso de estas facilidades ha ido adquiriendo cada vez mayor importancia en el ámbito de la Internet. El número de aplicaciones que demandan transmisión multicast, tales como conferencias de audio y video, simulación interactiva distribuida, descubrimiento de recursos, etc, ha aumentado en forma continua, viéndose reflejado en el crecimiento experimentado por el MBONE, experimental en sus inicios en 1992 y actualmente considerado in...

  19. Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Chuanxin Zhao

    2014-01-01

    Full Text Available In order to improve network throughput and reduce energy consumption, we propose in this paper a cross-layer optimization design that is able to achieve multicast utility maximization and energy consumption minimization. The joint optimization of congestion control and power allocation is formulated to be a nonlinear nonconvex problem. Using dual decomposition, a distributed optimization algorithm is proposed to avoid the congestion by control flow rate at the source node and eliminate the bottleneck by allocating the power at the intermediate node. Simulation results show that the cross-layer algorithm can increase network performance, reduce the energy consumption of wireless nodes and prolong the network lifetime, while keeping network throughput basically unchanged.

  20. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  1. Joint Power Allocation for Multicast Systems with Physical-Layer Network Coding

    Directory of Open Access Journals (Sweden)

    Zhu Wei-Ping

    2010-01-01

    Full Text Available This paper addresses the joint power allocation issue in physical-layer network coding (PLNC of multicast systems with two sources and two destinations communicating via a large number of distributed relays. By maximizing the achievable system rate, a constrained optimization problem is first formulated to jointly allocate powers for the source and relay terminals. Due to the nonconvex nature of the cost function, an iterative algorithm with guaranteed convergence is developed to solve the joint power allocation problem. As an alternative, an upper bound of the achievable rate is also derived to modify the original cost function in order to obtain a convex optimization solution. This approximation is shown to be asymptotically optimal in the sense of maximizing the achievable rate. It is confirmed through Monte Carlo simulations that the proposed joint power allocation schemes are superior to the existing schemes in terms of achievable rate and cumulative distribution function (CDF.

  2. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  3. 4 × 10 Gb s−1 wavelength multicasting with tunable NRZ-to-RZ format conversion using nonlinear polarization rotation in an SOA

    International Nuclear Information System (INIS)

    Liu, S; Fu, S; Tang, M; Shum, P; Liu, D

    2013-01-01

    We experimentally demonstrate simultaneous 4 × 10 Gb s −1 all-optical wavelength multicasting and non-return-to-zero (NRZ)-on-off-keying (OOK) to return-to-zero (RZ)-OOK format conversion with a tunable duty cycle using nonlinear polarization rotation in a semiconductor optical amplifier (SOA). The experimental results show that the duty cycle of four converted RZ-OOK signals can be tuned by adjusting the orientation of a polarizer placed at the SOA output. Four-channel NRZ-OOK-to-RZ-OOK conversion with a full width at half maximum of 33–67 ps can be simultaneously obtained with an extinction ratio over 10 dB. Moreover, it is experimentally verified that such a wavelength multicasting scheme with simultaneous NRZ-OOK-to-RZ-OOK conversion is insensitive to the wavelength of the input signal, indicating that such a scheme can be operated in the whole C-band with less than 0.18 dB power penalty at a bit error ratio level of 10 −9 . The device can facilitate the cross-connection between optical transmission networks employing different modulation formats. (paper)

  4. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  5. Multicast Services of QoS-Aware Active Queue Management over IP Multimedia Applications

    Science.gov (United States)

    Hwang, I.-Shyan; Hwang, Bor-Jiunn; Chang, Pen-Ming

    2010-10-01

    Recently, the multimedia services such as IPTV, video conference emerges to be the main traffic source. When UDP coexists with TCP, it induces not only congestion collapse but also unfairness problem. In this paper, a new Active Queue Management (AQM) algorithm, called Traffic Sensitive Active Queue Management (TSAQM), is proposed for providing multimedia services. The TSAQM comprise Dynamic Weight Allocate Scheme (DWAS) and Service Guarantee Scheme (SGS), the purpose of DWAS is to allocate resource with fairness and high end-user utility, and the purpose of SGS is to determine the satisfactory threshold (TH) and threshold region (TR). Several objectives of this proposed scheme include achieving high end-user utility for video service, considering the multicast as well as unicast proprieties to meet inter-class fairness and achieving the QoS requirement by adjusting the thresholds adaptively based on traffic situations.

  6. Improvement of visual debugging tool. Shortening the elapsed time for getting data and adding new functions to compare/combine a set of visualized data

    International Nuclear Information System (INIS)

    Matsuda, Katsuyuki; Takemiya, Hiroshi

    2001-03-01

    The visual debugging tool 'vdebug' has been improved, which was designed for the debugging of programs for scientific computing. Improved were the following two points; (1) shortening the elapsed time required for getting appropriate data to visualize; (2) adding new functions which enable to compare and/or combine a set of visualized data originated from two or more different programs. As for shortening elapsed time for getting data, with the improved version of 'vdebug', we could achieve the following results; over hundred times shortening the elapsed time with dbx, pdbx of SX-4 and over ten times with ndb of SR2201. As for the new functions to compare/combine visualized data, it was confirmed that we could easily checked the consistency between the computational results obtained in each calculational steps on two different computers: SP and ONYX. In this report, we illustrate how the tool 'vdebug' has been improved with an example. (author)

  7. Wavelength Tuning Free Transceiver Module in OLT Downstream Multicasting 4λ × 10 Gb/s TWDM-PON System

    OpenAIRE

    M. S. Salleh; A. S. M. Supa’at; S. M. Idrus; S. Yaakob; Z. M. Yusof

    2014-01-01

    We propose a new architecture of dynamic time-wavelength division multiplexing-passive optical network (TWDM-PON) system that employs integrated all-optical packet routing (AOPR) module using 4λ×10 Gbps downstream signal to support 20 km fiber transmission. This module has been designed to support high speed L2 aggregation and routing in the physical layer PON system by using multicasting cross-gain modulation (XGM) to route packet from any PON port to multiple PON links. Meanwhile, the fixed...

  8. The Challenges in Communication

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The Challenges in Communication. The conflict between connection oriented and connectionless. The seamless integration needs of broadcast, unicast and multicast in the midst growing security concerns. Like Indian roads – need to carry voice, internet traffic, video ...

  9. MAC based Approaches for Multicast Source Authentication: a survey

    NARCIS (Netherlands)

    Kaur, R.; Lal Sangal, A.; Kumar, K.

    2012-01-01

    With the explosive growth of the internet and growing demand for novel types of group communication, simultaneous transmission of digital information becomes prevalent model of communication. They have applications in TV over internet, video-conferencing, news feeds, stock quotes, online video games

  10. Simulation software support (S3) system a software testing and debugging tool

    International Nuclear Information System (INIS)

    Burgess, D.C.; Mahjouri, F.S.

    1990-01-01

    The largest percentage of technical effort in the software development process is accounted for debugging and testing. It is not unusual for a software development organization to spend over 50% of the total project effort on testing. In the extreme, testing of human-rated software (e.g., nuclear reactor monitoring, training simulator) can cost three to five times as much as all other software engineering steps combined. The Simulation Software Support (S 3 ) System, developed by the Link-Miles Simulation Corporation is ideally suited for real-time simulation applications which involve a large database with models programmed in FORTRAN. This paper will focus on testing elements of the S 3 system. In this paper system support software utilities are provided which enable the loading and execution of modules in the development environment. These elements include the Linking/Loader (LLD) for dynamically linking program modules and loading them into memory and the interactive executive (IEXEC) for controlling the execution of the modules. Features of the Interactive Symbolic Debugger (SD) and the Real Time Executive (RTEXEC) to support the unit and integrated testing will be explored

  11. Implementation of IGMP v3 and its application to IPTV carrying network

    Science.gov (United States)

    Zhou, Min; Dong, Ximing

    2008-11-01

    IGMP is a host-router signaling protocol, and it is used to manage the membership of Internet Protocol multicast groups for IPv4. IGMPv3 adds "source filtering" function required to support SSM. Firstly, this paper analyses the improvements and implementation of IGMPv3. Secondly, it points out the problems when applying IGMPv3 to IPTV carrying network. Then it presents the solutions by improving IGMPv3 protocol to reduce channel zapping time which is one of the important metrics affecting the QoE in IPTV service. Method to realize the end user authentication, authorization and accounting in the IP multicast security and authentication area by extending the IGMPv3 protocol is described at last.

  12. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  13. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    Science.gov (United States)

    2012-03-01

    Protocol Version 4 IPv4 Internet Protocol Version 6 IRC Internet Relay Chat LAN Local Area Network xv MiTM Man in the Middle MLD Multicast Listener...section. 1. Sniffing 2. Application Layer Attacks 3. Rogue Devices 4. Man In the Middle ( MITM ) 5. Flooding 6. Reconnaissance 7. Unauthorized access 8...the method by which worms find hosts may have to change. Man In The Middle ( MITM ) The general theory of the Man in the Middle ( MITM ) threat does not

  14. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  15. Opportunistic Relay Selection in Multicast Relay Networks using Compressive Sensing

    KAUST Repository

    Elkhalil, Khalil

    2014-12-01

    Relay selection is a simple technique that achieves spatial diversity in cooperative relay networks. However, for relay selection algorithms to make a selection decision, channel state information (CSI) from all cooperating relays is usually required at a central node. This requirement poses two important challenges. Firstly, CSI acquisition generates a great deal of feedback overhead (air-time) that could result in significant transmission delays. Secondly, the fed back channel information is usually corrupted by additive noise. This could lead to transmission outages if the central node selects the set of cooperating relays based on inaccurate feedback information. In this paper, we introduce a limited feedback relay selection algorithm for a multicast relay network. The proposed algorithm exploits the theory of compressive sensing to first obtain the identity of the “strong” relays with limited feedback. Following that, the CSI of the selected relays is estimated using linear minimum mean square error estimation. To minimize the effect of noise on the fed back CSI, we introduce a back-off strategy that optimally backs-off on the noisy estimated CSI. For a fixed group size, we provide closed form expressions for the scaling law of the maximum equivalent SNR for both Decode and Forward (DF) and Amplify and Forward (AF) cases. Numerical results show that the proposed algorithm drastically reduces the feedback air-time and achieves a rate close to that obtained by selection algorithms with dedicated error-free feedback channels.

  16. A Framework for Debugging Geoscience Projects in a High Performance Computing Environment

    Science.gov (United States)

    Baxter, C.; Matott, L.

    2012-12-01

    High performance computing (HPC) infrastructure has become ubiquitous in today's world with the emergence of commercial cloud computing and academic supercomputing centers. Teams of geoscientists, hydrologists and engineers can take advantage of this infrastructure to undertake large research projects - for example, linking one or more site-specific environmental models with soft computing algorithms, such as heuristic global search procedures, to perform parameter estimation and predictive uncertainty analysis, and/or design least-cost remediation systems. However, the size, complexity and distributed nature of these projects can make identifying failures in the associated numerical experiments using conventional ad-hoc approaches both time- consuming and ineffective. To address these problems a multi-tiered debugging framework has been developed. The framework allows for quickly isolating and remedying a number of potential experimental failures, including: failures in the HPC scheduler; bugs in the soft computing code; bugs in the modeling code; and permissions and access control errors. The utility of the framework is demonstrated via application to a series of over 200,000 numerical experiments involving a suite of 5 heuristic global search algorithms and 15 mathematical test functions serving as cheap analogues for the simulation-based optimization of pump-and-treat subsurface remediation systems.

  17. GeoBuilder: a geometric algorithm visualization and debugging system for 2D and 3D geometric computing.

    Science.gov (United States)

    Wei, Jyh-Da; Tsai, Ming-Hung; Lee, Gen-Cher; Huang, Jeng-Hung; Lee, Der-Tsai

    2009-01-01

    Algorithm visualization is a unique research topic that integrates engineering skills such as computer graphics, system programming, database management, computer networks, etc., to facilitate algorithmic researchers in testing their ideas, demonstrating new findings, and teaching algorithm design in the classroom. Within the broad applications of algorithm visualization, there still remain performance issues that deserve further research, e.g., system portability, collaboration capability, and animation effect in 3D environments. Using modern technologies of Java programming, we develop an algorithm visualization and debugging system, dubbed GeoBuilder, for geometric computing. The GeoBuilder system features Java's promising portability, engagement of collaboration in algorithm development, and automatic camera positioning for tracking 3D geometric objects. In this paper, we describe the design of the GeoBuilder system and demonstrate its applications.

  18. Testing effort dependent software reliability model for imperfect debugging process considering both detection and correction

    International Nuclear Information System (INIS)

    Peng, R.; Li, Y.F.; Zhang, W.J.; Hu, Q.P.

    2014-01-01

    This paper studies the fault detection process (FDP) and fault correction process (FCP) with the incorporation of testing effort function and imperfect debugging. In order to ensure high reliability, it is essential for software to undergo a testing phase, during which faults can be detected and corrected by debuggers. The testing resource allocation during this phase, which is usually depicted by the testing effort function, considerably influences not only the fault detection rate but also the time to correct a detected fault. In addition, testing is usually far from perfect such that new faults may be introduced. In this paper, we first show how to incorporate testing effort function and fault introduction into FDP and then develop FCP as delayed FDP with a correction effort. Various specific paired FDP and FCP models are obtained based on different assumptions of fault introduction and correction effort. An illustrative example is presented. The optimal release policy under different criteria is also discussed

  19. Space-Based FPGA Radio Receiver Design, Debug, and Development of a Radiation-Tolerant Computing System

    Directory of Open Access Journals (Sweden)

    Zachary K. Baker

    2010-01-01

    Full Text Available Los Alamos has recently completed the latest in a series of Reconfigurable Software Radios, which incorporates several key innovations in both hardware design and algorithms. Due to our focus on satellite applications, each design must extract the best size, weight, and power performance possible from the ensemble of Commodity Off-the-Shelf (COTS parts available at the time of design. A large component of our work lies in determining if a given part will survive in space and how it will fail under various space radiation conditions. Using two Xilinx Virtex 4 FPGAs, we have achieved 1 TeraOps/second signal processing on a 1920 Megabit/second datastream. This processing capability enables very advanced algorithms such as our wideband RF compression scheme to operate at the source, allowing bandwidth-constrained applications to deliver previously unattainable performance. This paper will discuss the design of the payload, making electronics survivable in the radiation of space, and techniques for debug.

  20. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  1. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  2. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  3. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  4. Command and Control Data Dissemination Using IP Multicast

    National Research Council Canada - National Science Library

    Barrera, Raymond

    1999-01-01

    Tools have been developed which allow tactical data to be exchanged over Internet Protocol networks, but the quality of service necessary to operate these tools is not available for most Naval vessels at this time...

  5. Network connectivity enhancement by exploiting all optical multicast in semiconductor ring laser

    Science.gov (United States)

    Siraj, M.; Memon, M. I.; Shoaib, M.; Alshebeili, S.

    2015-03-01

    The use of smart phone and tablet applications will provide the troops for executing, controlling and analyzing sophisticated operations with the commanders providing crucial documents directly to troops wherever and whenever needed. Wireless mesh networks (WMNs) is a cutting edge networking technology which is capable of supporting Joint Tactical radio System (JTRS).WMNs are capable of providing the much needed bandwidth for applications like hand held radios and communication for airborne and ground vehicles. Routing management tasks can be efficiently handled through WMNs through a central command control center. As the spectrum space is congested, cognitive radios are a much welcome technology that will provide much needed bandwidth. They can self-configure themselves, can adapt themselves to the user requirement, provide dynamic spectrum access for minimizing interference and also deliver optimal power output. Sometimes in the indoor environment, there are poor signal issues and reduced coverage. In this paper, a solution utilizing (CR WMNs) over optical network is presented by creating nanocells (PCs) inside the indoor environment. The phenomenon of four-wave mixing (FWM) is exploited to generate all-optical multicast using semiconductor ring laser (SRL). As a result same signal is transmitted at different wavelengths. Every PC is assigned a unique wavelength. By using CR technology in conjunction with PC will not only solve network coverage issue but will provide a good bandwidth to the secondary users.

  6. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  7. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  8. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  9. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  10. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  11. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  12. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  13. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  14. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  15. MDP: Reliable File Transfer for Space Missions

    Science.gov (United States)

    Rash, James; Criscuolo, Ed; Hogie, Keith; Parise, Ron; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC by the Operating Missions as Nodes on the Internet (OMNI) project to demonstrate the application of the Multicast Dissemination Protocol (MDP) to space missions to reliably transfer files. This work builds on previous work by the OMNI project to apply Internet communication technologies to space communication. The goal of this effort is to provide an inexpensive, reliable, standard, and interoperable mechanism for transferring files in the space communication environment. Limited bandwidth, noise, delay, intermittent connectivity, link asymmetry, and one-way links are all possible issues for space missions. Although these are link-layer issues, they can have a profound effect on the performance of transport and application level protocols. MDP, a UDP-based reliable file transfer protocol, was designed for multicast environments which have to address these same issues, and it has done so successfully. Developed by the Naval Research Lab in the mid 1990's, MDP is now in daily use by both the US Post Office and the DoD. This paper describes the use of MDP to provide automated end-to-end data flow for space missions. It examines the results of a parametric study of MDP in a simulated space link environment and discusses the results in terms of their implications for space missions. Lessons learned are addressed, which suggest minor enhancements to the MDP user interface to add specific features for space mission requirements, such as dynamic control of data rate, and a checkpoint/resume capability. These are features that are provided for in the protocol, but are not implemented in the sample MDP application that was provided. A brief look is also taken at the status of standardization. A version of MDP known as NORM (Neck Oriented Reliable Multicast) is in the process of becoming an IETF standard.

  16. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  17. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  18. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  19. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  20. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  1. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  2. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  3. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  4. Feature-based comparison and selection of software defined networking (SDN) controllers

    OpenAIRE

    Khondoker, Rahamatullah; Zaalouk, Adel; Marx, Ronald; Bayarou, Kpatcha

    2014-01-01

    Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradigm that separates the control plane of a networking device (e.g., a switch / router) from its data plane, making it feasible to control, monitor, and manage a network from a centralized node (the SDN controller). However, today there exists many SDN controllers including POX, Flo...

  5. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  6. [Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation].

    Science.gov (United States)

    Kammerl, Rudolf; Wartberg, Lutz

    2018-02-01

    Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.

  7. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  8. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  9. Compulsive Internet use: the role of online gaming and other internet applications.

    Science.gov (United States)

    van Rooij, Antonius J; Schoenmakers, Tim M; van de Eijnden, Regina J J M; van de Mheen, Dike

    2010-07-01

    Increasing research on Internet addiction makes it necessary to distinguish between the medium of Internet and its specific applications. This study explores the relationship between time spent on various Internet applications (including online gaming) and Compulsive Internet Use in a large sample of adolescents. The 2007 (N=4,920) and 2008 (N=4,753) samples of a longitudinal survey study among adolescents were used, as well as the 2007-2008 cohort subsample (N=1421). Compulsive Internet Use was predicted from the time spent on the various Internet applications in two cross-sectional multiple linear regression models and one longitudinal regression model in which changes in behavior were related to changes in Compulsive Internet Use. In both samples, downloading, social networking, MSN use, Habbo Hotel, chatting, blogging, online games, and casual games were shown to be associated with Compulsive Internet Use. Off these, online gaming was shown to have the strongest association with Compulsive Internet Use. Moreover, changes in online gaming were most strongly associated with changes in Compulsive Internet Use over time for the longitudinal cohort. A clear relationship was shown between online gaming and Compulsive Internet Use. It is further argued that a subgroup of compulsive Internet users should be classified as compulsive online gamers. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  11. The impact of internet gambling on gambling problems: a comparison of moderate-risk and problem Internet and non-Internet gamblers.

    Science.gov (United States)

    Gainsbury, Sally M; Russell, Alex; Hing, Nerilee; Wood, Robert; Blaszczynski, Alex

    2013-12-01

    Numerous studies have reported higher rates of gambling problems among Internet compared with non-Internet gamblers. However, little research has examined those at risk of developing gambling problems or overall gambling involvement. This study aimed to examine differences between problem and moderate-risk gamblers among Internet and non-Internet gamblers to determine the mechanisms for how Internet gambling may contribute to gambling problems. Australian gamblers (N = 6,682) completed an online survey that included measures of gambling participation, problem gambling severity, and help seeking. Compared with non-Internet gamblers, Internet gamblers were younger, engaged in a greater number of gambling activities, and were more likely to bet on sports. These differences were significantly greater for problem than moderate-risk gamblers. Non-Internet gamblers were more likely to gamble on electronic gaming machines, and a significantly higher proportion of problem gamblers participated in this gambling activity. Non-Internet gamblers were more likely to report health and psychological impacts of problem gambling and having sought help for gambling problems. Internet gamblers who experience gambling-related harms appear to represent a somewhat different group from non-Internet problem and moderate-risk gamblers. This has implications for the development of treatment and prevention programs, which are often based on research that does not cater for differences between subgroups of gamblers. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  12. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  13. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  14. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  15. Is there a relationship between Internet dependence and eating disorders? A comparison study of Internet dependents and non-Internet dependents.

    Science.gov (United States)

    Tao, Z L; Liu, Y

    2009-01-01

    Several studies have examined the underlying psychopathology in overuse of the Internet, including depression, social anxiety, and substance dependence. A relationship between these psychological disorders appears to exist. No links have been established between Internet dependence and eating disorders. Fifty-four Internet dependents were compared with a control group concerning symptomatic aspects of eating disorders and psychological characteristics related to eating disorders. They all belonged to 1199 respondents of Chinese secondary school and college students between the ages of 12 and 25 years old. A Mann-Whitney U-test was used to determine the difference between Internet dependent groups and non-Internet dependent groups concerning Eating Attitudes Test and Eating Disorder Inventory scores. Females and male Internet dependents rated themselves with significantly higher symptomatic aspects of eating disorders than control groups. Female and male Internet dependents showed significantly higher psychological characteristics related to eating disorders than control groups. A relationship between Internet dependence and eating disorders appears to exist.

  16. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  17. Internet use and suicidal behaviors: internet as a threat or opportunity?

    Science.gov (United States)

    Robert, Anna; Suelves, Josep Maria; Armayones, Manuel; Ashley, Sivakamy

    2015-04-01

    Suicidal behavior is a common and severe health problem around the world. Internet use has been related to an increase in suicidal behaviors, but few studies have focused on the potential benefits of Internet use for preventing self-harm and suicide. We reviewed the existing literature on the relationship between suicide and Internet use. The accessibility of suicide-related information on the Internet seems to have an impact on the incidence of suicide behaviors. However, the Internet is useful for linking people who feel lonely or isolated, and it provides access to suicide prevention information and resources. The Internet can influence vulnerable people to attempt suicide, but it can also be used to prevent self-harm and suicide. We propose some efforts that can be made in this preventive line.

  18. Problematic internet users' skin conductance and anxiety increase after exposure to the internet.

    Science.gov (United States)

    Romano, Michela; Roaro, Alessandra; Re, Federica; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2017-12-01

    To examine the impact of cessation of an internet session on skin conductance responses and anxiety of higher and lower problem internet users, in order to explore possible physiological withdrawal effects. Participants were measured in terms of their skin conductance before (15min), during (15min), and after (15min) an internet session, and completed self-report measures of state anxiety and problematic internet use. Higher, but not lower, problem users showed increased skin conductance after internet use was stopped, relative to before their internet session. Higher problem users' GSR scores increased, as the time from internet cessation became longer. Higher problem users also showed increased levels of anxiety, following their internet session, which correlated with their skin conductance scores. These results suggest that, following termination of an internet session, withdrawal-like effects are seen, both psychologically and physiologically. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Modeling traditional literacy, internet skills and internet usage: an empirical study

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2016-01-01

    This paper focuses on the relationships among traditional literacy (reading, writing and understanding text), medium-related Internet skills (consisting of operational and formal skills), content-related Internet skills (consisting of information and strategic skills) and Internet usage types

  20. Undesigning the Internet : An exploratory study of reducing everyday Internet connectivity

    OpenAIRE

    Widdicks, Kelly Victoria; Ringenson, Tina; Pargman, Daniel; Kuppusamy, Vishnupriya; Lago, Patricia

    2018-01-01

    Internet connectivity is seamlessly integrated into many of our everyday habits and activities. Despite this, previous research has highlighted that our rather excessive Internet use is not sustainable or even always socially beneficial. In this paper, we carried out an exploratory study on how Internet disconnection affects our everyday lives and whether such disconnection is even possible in today’s society. Through daily surveys, we captured what Internet use means for ten participants and...

  1. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  2. A study on Turkish adolescent's Internet use: possible predictors of Internet addiction.

    Science.gov (United States)

    Ak, Serife; Koruklu, Nermin; Yılmaz, Yusuf

    2013-03-01

    The purpose of this study is to investigate the internet use of Turkish adolescents, with a (particular) focus on the risk of Internet addiction. A web-based questionnaire was completed by a total of 4,311 adolescents attending public high schools in grades 9-12, in a small-sized city in western Turkey. Ages ranged from 15 to 19 years, 54 percent were female and 46 percent male. The questionnaire included items on sociodemographic information, Internet usage, and a Turkish version of the Young's Internet Addiction Test. The data were analyzed in SPPS 15.0 program using the t test, the Mann-Whitney U test, correlation and hierarchic regression analysis. The findings show that, regardless of gender, Facebook ranked highest in the classification of students' purpose of Internet use; it was also found that females mainly used the Internet for communication, whereas males were more interested in playing online games and reading newspapers and magazines. The results of hierarchic regression analysis indicated that the significant predictors of the internet addiction were the presence of Internet access at home, gender, and family income levels.

  3. Period of internet usage: An indicator of the buying behaviour of internet users?

    Directory of Open Access Journals (Sweden)

    PJ du Plessis

    2004-07-01

    Full Text Available This article focuses on the experience of the Internet user with regard to purchasing goods and services. A self-administered survey, hosted on a dedicated website, was used as a data collection method and 1005 responses were received. It was found that the period of Internet usage significantly influenced the decision to purchase via the Internet. Another finding was that the period of Internet usage significantly influenced whether those shopping on the Internet searched for, or considered searching for, product and service information online prior to purchasing from non-Internet-based sellers.

  4. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  5. Internet Freedom in Asia: Case of Internet Censorship in China

    Directory of Open Access Journals (Sweden)

    ZAINUDDIN MUDA Z. MONGGILO

    2016-02-01

    Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.

  6. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  7. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  8. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  9. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  10. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  11. Internet Self-Efficacy Preferences of Internet Based Environments and Achievement of Prospective Teachers

    Science.gov (United States)

    Ozyalcin Oskay, Ozge

    2011-01-01

    The aims of this study are to determine prospective chemistry teachers' internet self-efficacy and preferences of constructivist internet-assisted environments and to examine the relationship between their internet self-efficacy and their preferences for constructivist internet-assisted environments, the relationship between their achievement in…

  12. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  13. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  14. Conviviality of internet social networks: An exploratory study of internet campaigns in Iran

    OpenAIRE

    Ameripour, Aghil; Nicholson, Brian; Newman, Michael

    2010-01-01

    In this study, we focus on the relationship between Internet social networks and societal change by examining case studies of the impact of Internet-based campaigns in Iran. Ivan Illich's theory of Conviviality of Tools enables an analysis of the conviviality of the Internet. Subsequently, this conceptual lens is used to examine empirical data from two Internet-based campaigns. The paper contributes theoretical and practical implications regarding conviviality of Internet social networks and ...

  15. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  16. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  17. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  18. Addictive Potential of Internet Applications and Differential Correlates of Problematic Use in Internet Gamers versus Generalized Internet Users in a Representative Sample of Adolescents.

    Science.gov (United States)

    Rosenkranz, Tabea; Müller, Kai W; Dreier, Michael; Beutel, Manfred E; Wölfling, Klaus

    2017-01-01

    This paper examines the addictive potential of 8 different Internet applications, distinguishing male and female users. Moreover, differential correlates of problematic use are investigated in Internet gamers (IG) and generalized Internet users (GIU). In a representative sample of 5,667 adolescents aged 12-19 years, use of Internet applications, problematic Internet use, psychopathologic symptoms (emotional problems, hyperactivity/inattention, and psychosomatic complaints), personality (conscientiousness and extraversion), psychosocial correlates (perceived stress and self-efficacy), and coping strategies were assessed. The addictive potential of Internet applications was examined in boys and girls using regression analysis. MANOVAs were conducted to examine differential correlates of problematic Internet use between IG and GIU. Chatting and social networking most strongly predicted problematic Internet use in girls, while gaming was the strongest predictor in boys. Problematic IG exhibited multiple psychosocial problems compared to non-problematic IG. In problematic Internet users, GIU reported even higher psychosocial burden and displayed dysfunctional coping strategies more frequently than gamers. The results extend previous findings on the addictive potential of Internet applications and validate the proposed distinction between specific and generalized problematic Internet use. In addition to Internet gaming disorder, future studies should also focus on other highly addictive Internet applications, that is, chatting or social networking, regarding differential correlates of problematic use. © 2017 S. Karger AG, Basel.

  19. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  20. Gender differences in Internet identification and Internet anxiety ...

    African Journals Online (AJOL)

    This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.

  1. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  2. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  3. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  4. Multi-objective optimization in computer networks using metaheuristics

    CERN Document Server

    Donoso, Yezid

    2007-01-01

    Metaheuristics are widely used to solve important practical combinatorial optimization problems. Many new multicast applications emerging from the Internet-such as TV over the Internet, radio over the Internet, and multipoint video streaming-require reduced bandwidth consumption, end-to-end delay, and packet loss ratio. It is necessary to design and to provide for these kinds of applications as well as for those resources necessary for functionality. Multi-Objective Optimization in Computer Networks Using Metaheuristics provides a solution to the multi-objective problem in routing computer networks. It analyzes layer 3 (IP), layer 2 (MPLS), and layer 1 (GMPLS and wireless functions). In particular, it assesses basic optimization concepts, as well as several techniques and algorithms for the search of minimals; examines the basic multi-objective optimization concepts and the way to solve them through traditional techniques and through several metaheuristics; and demonstrates how to analytically model the compu...

  5. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  6. La ética en internet

    OpenAIRE

    Issa Luna Pla

    2015-01-01

    En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporat...

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  9. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  10. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  11. La ética en internet

    Directory of Open Access Journals (Sweden)

    Issa Luna Pla

    2015-01-01

    Full Text Available En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporativo, Autorregulación en Internet, tecnología para rastrear contenidos y la situación de América Latina.

  12. Distributed and cloud computing from parallel processing to the Internet of Things

    CERN Document Server

    Hwang, Kai; Fox, Geoffrey C

    2012-01-01

    Distributed and Cloud Computing, named a 2012 Outstanding Academic Title by the American Library Association's Choice publication, explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Starting with an overview of modern distributed models, the book provides comprehensive coverage of distributed and cloud computing, including: Facilitating management, debugging, migration, and disaster recovery through virtualization Clustered systems for resear

  13. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  14. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  15. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  16. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  17. Internet addiction, problematic internet use, nonproblematic internet use among Chinese adolescents: Individual, parental, peer, and sociodemographic correlates.

    Science.gov (United States)

    Zhou, Nan; Cao, Hongjian; Li, Xiaomin; Zhang, Jintao; Yao, Yuanwei; Geng, Xiaomin; Lin, Xiuyun; Hou, Shumeng; Liu, Fenge; Chen, Xiaoli; Fang, Xiaoyi

    2018-05-01

    Internet addiction has been typically conceptualized as either a continuous construct or a dichotomous construct. Limited research has differentiated adolescents with problematic Internet use (PIU) from the Internet addiction group (IA) and/or nonproblematic Internet use group (NPIU) and examined the potential correlates. To fill this gap, based on data obtained from 956 Chinese adolescents (11-19 years, 47% male), this study examined if adolescents with PIU is a distinctive group from the IA and NPIU. This study also examined factors from different ecological levels that may differentiate among the three groups, including individual, parental, peer, and sociodemographic factors. Results indicated that IA, PIU, and NPIU differed significantly on scores of Young's Diagnostic Questionnaire (YDQ). Critical factors emerging from different ecological levels could differentiate between PIU and NPIU and between IA and NPIU. Such findings suggest that PIU may represent a distinct, intermediate group of Internet users. The potential theoretical and practical implications of identifying PIU were also discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  18. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  19. Risk Factors of Internet Addiction among Internet Users: An Online Questionnaire Survey.

    Directory of Open Access Journals (Sweden)

    Chia-Yi Wu

    Full Text Available Internet addiction (IA has become a major public health issue worldwide and is closely linked to psychiatric disorders and suicide. The present study aimed to investigate the prevalence of IA and its associated psychosocial and psychopathological determinants among internet users across different age groups.The study was a cross-sectional survey initiated by the Taiwan Suicide Prevention Center. The participants were recruited from the general public who responded to the online questionnaire. They completed a series of self-reported measures, including Chen Internet Addiction Scale-revised (CIAS-R, Five-item Brief Symptom Rating Scale (BSRS-5, Maudsley Personality Inventory (MPI, and questions about suicide and internet use habits.We enrolled 1100 respondents with a preponderance of female subjects (85.8%. Based on an optimal cutoff for CIAS-R (67/68, the prevalence rate of IA was 10.6%. People with higher scores of CIAS-R were characterized as: male, single, students, high neuroticism, life impairment due to internet use, time for internet use, online gaming, presence of psychiatric morbidity, recent suicide ideation and past suicide attempts. Multiple regression on IA showed that age, gender, neuroticism, life impairment, internet use time, and BSRS-5 score accounted for 31% of variance for CIAS-R score. Further, logistic regression showed that neuroticism, life impairment and internet use time were three main predictors for IA. Compared to those without IA, the internet addicts had higher rates of psychiatric morbidity (65.0%, suicide ideation in a week (47.0%, lifetime suicide attempts (23.1%, and suicide attempt in a year (5.1%.Neurotic personality traits, psychopathology, time for internet use and its subsequent life impairment were important predictors for IA. Individuals with IA may have higher rates of psychiatric morbidity and suicide risks. The findings provide important information for further investigation and prevention of IA.

  20. SimpleGeO - new developments in the interactive creation and debugging of geometries for Monte Carlo simulations

    International Nuclear Information System (INIS)

    Theis, Christian; Feldbaumer, Eduard; Forkel-Wirth, Doris; Jaegerhofer, Lukas; Roesler, Stefan; Vincke, Helmut; Buchegger, Karl Heinz

    2010-01-01

    Nowadays radiation transport Monte Carlo simulations have become an indispensable tool in various fields of physics. The applications are diversified and range from physics simulations, like detector studies or shielding design, to medical applications. Usually a significant amount of time is spent on the quite cumbersome and often error prone task of implementing geometries, before the actual physics studies can be performed. SimpleGeo is an interactive solid modeler which allows for the interactive creation and visualization of geometries for various Monte Carlo particle transport codes in 3D. Even though visual validation of the geometry is important, it might not reveal subtle errors like overlapping or undefined regions. These might eventually corrupt the execution of the simulation or even lead to incorrect results, the latter being sometimes hard to identify. In many cases a debugger is provided by the Monte Carlo package, but most often they lack interactive visual feedback, thus making it hard for the user to localize and correct the error. In this paper we describe the latest developments in SimpleGeo, which include debugging facilities that support immediate visual feedback, and apply various algorithms based on deterministic, Monte Carlo or Quasi Monte Carlo methods. These approaches allow for a fast and robust identification of subtle geometry errors that are also marked visually. (author)

  1. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  2. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  3. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  4. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  5. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  6. Assessing internet addiction using the parsimonious internet addiction components model—A preliminary study.

    OpenAIRE

    Kuss, D.J.; Shorter, G.W.; Rooij, A.J. van; Griffiths, M.D.; Schoenmakers, T.M.

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence estimations difficult. To overcome the present problems a preliminary study was conducted testing a parsimonious Internet addiction components model based on Griffiths’ addiction components (Journal ...

  7. Internet-Related Disorders: Development of the Short Compulsive Internet Use Scale.

    Science.gov (United States)

    Besser, Bettina; Rumpf, Hans-Jürgen; Bischof, Anja; Meerkerk, Gert-Jan; Higuchi, Susumu; Bischof, Gallus

    2017-11-01

    The addiction treatment system only reaches a small number of individuals suffering from Internet-related disorders. Therefore, it is important to improve case detection for preventive measures and brief interventions. Existing screening instruments are often time-consuming and rarely validated using clinical criteria. The aim of this study is to develop an optimized short screening for problematic Internet use and Internet addiction (IA). A regression analysis was conducted in random subsamples of a merged sample (N = 3,040; N = 1,209) to examine the item performance of the Compulsive Internet Use Scale (CIUS). Based on the results, a short version of the CIUS was developed and compared with the original CIUS. A fully structured diagnostic interview, covering the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) criteria for the Internet gaming disorder with a broader focus on all Internet activities, was conducted. A five-item version of the short screening performed best across the samples. Comparing the area under the curve (AUC) of the receiver operating characteristic between the Short CIUS and the original test revealed no significant difference (AUC = 0.968; 0.977). A cutoff point of 7 turned out to perform best for case detection and yielded a sensitivity of 0.95 and a specificity of 0.87, Cronbach's alpha was 0.77. The analysis showed that the performance of the Short CIUS is just as good in detecting problematical Internet use and IA as the performance of the original CIUS. The Short CIUS provides an economical and valid instrument for the assessment of problematic Internet use and IA.

  8. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  9. Internet Infidelity: Exploration of Attitudes towards Partners Internet Behaviors

    Directory of Open Access Journals (Sweden)

    Mohammad R. Abdi

    2012-09-01

    Full Text Available Background: Today, the Internet has become a part of our everyday life and online communications have made it easy for people to develop interpersonal relationships. However, certain problems and difficulties have arisen from this issue. One of these problems, which have been prevalent among couples and families, is extramarital internet relationships or internet infidelity. The present research has been done to study people's attitudes towards this phenomenon. Materials and Methods: A 43-item Internet Infidelity Questionnaire (IIQ was presented on a website designed for this purpose. 481 Iranian users who were members of Farsi language forums and chat rooms were selected through available community sampling and enrolled in the study. To analyze research data, descriptive statistics and the t-test were used.Results: The results showed that either women or men considered online sexual activities of their partners as traitorous compared with friendly and emotional activities in cyberspace. In addition, women in comparison with men had a more negative attitude towards their partners’ internet activity (especially online sexual activities.Conclusion: This study expanded our understanding of the traditional concept of infidelity that had merely limited it to face-to-face sexual and emotional behavior. The results also showed that women had more negative attitudes towards such activities compared to men.

  10. Screening for Internet dependence: do the proposed diagnostic criteria differentiate normal from dependent Internet use?

    Science.gov (United States)

    Dowling, Nicki A; Quirk, Kelly L

    2009-02-01

    There is continued discussion of including Internet dependence as a diagnosis in future editions of the Diagnostic and Statistical Manual of Mental Disorders. The primary aim of the study was to evaluate the utility of the proposed diagnostic criteria for Internet dependence as measured by Young's Diagnostic Questionnaire (YDQ). Although the YDQ does not provide any measure of severity, there is emerging recognition that some Internet users may display less severe or at risk Internet dependence. The degree to which the cutoff of 5 out of 8 criteria is appropriate to differentiate nondependent from dependent Internet use was evaluated by comparing the Internet usage and psychological dysfunction of 424 university students endorsing 3 and 4 diagnostic criteria (at-risk Internet dependence) to those endorsing less than 3 criteria (nondependent) and those endorsing 5 or more criteria (Internet dependence). The findings suggest that the proposed diagnostic criteria do not adequately discriminate individuals scoring 3 or 4 from those currently classified as Internet dependent. The implications of the findings for the assessment, diagnosis, and treatment of Internet dependence are discussed.

  11. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet.

    Science.gov (United States)

    Northrup, Jason C; Lapierre, Coady; Kirk, Jeffrey; Rae, Cosette

    2015-07-28

    The Internet Process Addiction Test (IPAT) was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term "Internet addiction" is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT) demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  12. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  13. Internet addiction and problematic Internet use: A systematic review of clinical research.

    Science.gov (United States)

    Kuss, Daria J; Lopez-Fernandez, Olatz

    2016-03-22

    To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science. Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions (including problematic Internet use) more generally. The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving (1) treatment seeker characteristics; (2) psychopharmacotherapy; (3) psychological therapy; and (4) combined treatment. A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers.

  14. Internet addiction and problematic Internet use: A systematic review of clinical research

    Science.gov (United States)

    Kuss, Daria J; Lopez-Fernandez, Olatz

    2016-01-01

    AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science. METHODS: Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions (including problematic Internet use) more generally. RESULTS: The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving (1) treatment seeker characteristics; (2) psychopharmacotherapy; (3) psychological therapy; and (4) combined treatment. CONCLUSION: A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers. PMID:27014605

  15. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  16. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  17. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  18. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  19. The Association between Internet User Characteristics and Dimensions of Internet Addiction among Greek Adolescents

    Science.gov (United States)

    Andreou, Eleni; Svoli, Hionia

    2013-01-01

    This study examined how internet users' psychological characteristics, amount of internet use and demographic factors contribute to particular dimensions of internet addiction. The sample consisted of 384 adolescents, ranging in age from 15 to 18 years. Participants were asked to complete the Internet Addiction Test (IAT), measures of Locus of…

  20. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  1. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet

    Directory of Open Access Journals (Sweden)

    Jason C. Northrup

    2015-07-01

    Full Text Available The Internet Process Addiction Test (IPAT was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term “Internet addiction” is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  2. Neural correlate of Internet use in patients undergoing psychological treatment for Internet addiction.

    Science.gov (United States)

    Lai, Carlo; Altavilla, Daniela; Mazza, Marianna; Scappaticci, Silvia; Tambelli, Renata; Aceto, Paola; Luciani, Massimiliano; Corvino, Stefano; Martinelli, David; Alimonti, Flaminia; Tonioni, Federico

    2017-06-01

    The new version of Diagnostic and Statistical Manual of Mental Disorders (DSM-5th) proposed the Internet Gaming Disorder for the diagnosis of Internet addiction (IA) considering the neurobiological evidence of the craving. The aim was to test the neural correlate in response to the Internet cue in patients with IA. Sixteen males with IA diagnosis (clinical group) and 14 healthy male (control group) were recruited for an experimental visual task composed of Internet images and emotional images. During the visual presentation of Internet cue, electroencefalographic data were recorded using Net Station 4.5.1 with a 256-channels HydroCel Geodesic Sensor Net. Event-related potential (ERP) components and low-resolution electromagnetic tomography (sLoreta) were analysed. sLoreta analyses showed that patients from the clinical group presented a higher primary somatosensorial cortex and lower paralimbic, temporal and orbito-frontal activation in response to both Internet and emotional images compared to those of the control group. These results suggest that clinically recognized pathological use of Internet could be linked to dissociative symptoms.

  3. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  4. A comparative study of uses of the Internet among college students with and without Internet addiction.

    Science.gov (United States)

    Kesici, Sahin; Sahin, Ismail

    2009-12-01

    The current study examined uses of the Internet among college students classified as addicted to the Internet or not. Data were gathered from 384 college students. Students classified as Internet Addicted used the Internet more for social functions, leisure functions, and virtual emotional functions, when compared to students considered as Internet Nonaddicted. Effect sizes were large, indicating important group differences in uses of the Internet.

  5. The Association between Internet Parenting Styles and Children's Use of the Internet at Home

    Science.gov (United States)

    Ihmeideh, Fathi Mahmoud; Shawareb, Aseel Akram

    2014-01-01

    Parenting styles are known to have a powerful influence on child development, and as such they can significantly influence children's Internet use. The purpose of this study is to examine the Internet parenting style of Jordanian parents and their perspectives on their children's Internet use. Children's Internet use was evaluated in terms of four…

  6. Assessing internet addiction using the parsimonious internet addiction components model—A preliminary study.

    NARCIS (Netherlands)

    Kuss, D.J.; Shorter, G.W.; Rooij, A.J. van; Griffiths, M.D.; Schoenmakers, T.M.

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  8. Characteristics of Internet Addiction/Pathological Internet Use in U.S. University Students: A Qualitative-Method Investigation

    Science.gov (United States)

    Li, Wen; O’Brien, Jennifer E.; Snyder, Susan M.; Howard, Matthew O.

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students’ self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants’ lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research. PMID:25647224

  9. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Directory of Open Access Journals (Sweden)

    Wen Li

    Full Text Available Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7, and first had a problem with Internet overuse at an average age of 16 (SD = 4.3. Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  10. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Science.gov (United States)

    Li, Wen; O'Brien, Jennifer E; Snyder, Susan M; Howard, Matthew O

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  11. The Impact of Pathological Levels of Internet-Related Anxiety on Internet Usage

    Science.gov (United States)

    Brosnan, Mark; Joiner, Richard; Gavin, Jeff; Crook, Charles; Maras, Pam; Guiller, Jane; Scott, Adrian J.

    2012-01-01

    This article compares the use of the Internet during the first year of university education of students who have pathological levels of Internet anxiety with those who do not. Two hundred and sixteen first year psychology students (females 184, males 32) were surveyed for their levels of Internet-related anxiety, from which 12 (5.6%) were…

  12. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  13. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  14. INTERNET5: Shaping an Internet for women's empowerment | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-12-08

    Dec 8, 2017 ... Poor women, girls, and other marginalized communities in the developing ... INTERNET5 — an Internet that helps achieve SDG 5 on gender equality — aims to support ... To ensure that the benefits of broadband are more evenly ... The project seeks to provide an effective and low-cost educational model ...

  15. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  16. Self-Disclosure and Internet Addiction

    Science.gov (United States)

    Arslan, Nihan; Kiper, Aydin

    2018-01-01

    The aim of study is to investigate the relationship between self-disclosure and internet addiction. Self-Disclosure Scale and Internet Addiction Scale were applied to students. Results indicated a negative correlation between self-disclosure and internet addiction. Self-disclosure was negative predicted by internet addiction in the structural…

  17. Peer attachment, specific patterns of internet use and problematic internet use in male and female adolescents.

    Science.gov (United States)

    Reiner, Iris; Tibubos, Ana N; Hardt, Jochen; Müller, Kai; Wölfling, Klaus; Beutel, Manfred E

    2017-10-01

    Problematic internet use may lead to serious psychosocial dysfunction. Recent studies have found comparable prevalence in both male and female adolescents. We pursue the neglected questions how male and female adolescents differ regarding their patterns of internet use and how gender, peer attachment and patterns of use are related to pathological internet use. In 2410 adolescents (1307 girls and 1103 boys) aged 12-18 years from different types of school we assessed peer attachment, frequency and use of eight specific applications and indicators of pathological internet use. Three patterns of internet use, 'social'; 'sex and games" and 'functional' were identified and connections between variables were modeled by ordered sequences of regression. We found that problematic internet use-sex and games as well as social usage-was more prevalent in boys. Insecure peer attachment predicted problematic internet use in both sexes. Also, excessive usage of internet games and sex mediated the influence of peer attachment insecurity on problematic internet use, but only for boys. Our study identified that adolescents with insecure peer attachment are at higher risk for problematic internet use. With regard to specific types of internet use, the consumption of online games and sex was identified as risk factor in boys with increasing age. Further studies are needed to understand and possibly subgroup problematic internet use behavior in girls. Our findings suggest that increasing the quality of peer relationships may be promising approach in the prevention and treatment of problematic internet use.

  18. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  19. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  20. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    OpenAIRE

    Zehra Deniz Yakıncı; Perihan Gürbüz; Gülsüm Yetiş

    2018-01-01

    Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF) was used on ‘Health Services Vocational High School’ students, in...

  1. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  2. QoS Adaptation in Multimedia Multicast Conference Applications for E-Learning Services

    Science.gov (United States)

    Deusdado, Sérgio; Carvalho, Paulo

    2006-01-01

    The evolution of the World Wide Web service has incorporated new distributed multimedia conference applications, powering a new generation of e-learning development and allowing improved interactivity and prohuman relations. Groupware applications are increasingly representative in the Internet home applications market, however, the Quality of…

  3. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  4. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  5. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Science.gov (United States)

    Ma, Hing Keung; Chu, Miranda K. Y.; Chan, Winnie W. Y.

    2011-01-01

    In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper. PMID:22125462

  6. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  7. Assessing Internet addiction using the parsimonious Internet addiction components model - a preliminary study [forthcoming

    OpenAIRE

    Kuss, DJ; Shorter, GW; Van Rooij, AJ; Griffiths, MD; Schoenmakers, T

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence estimations difficult. To overcome the present problems a preliminary study was conducted testing a parsimonious Internet addiction components model based on Griffiths’ addiction components (2005), i...

  8. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  9. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  10. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  11. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  12. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  13. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  14. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  15. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  16. The Effect of Flow Frequency on Internet Addiction to Different Internet Usage Activities

    Science.gov (United States)

    Yang, Hui-Ling; Wu, Wei-Pang

    2017-01-01

    This study investigated the online flow frequency among college students in regard to different internet activities, and analyzed the effect of flow frequency on internet addiction. This study surveyed 525 undergraduate internet users in Taiwan by using convenience sampling to question participants. In this paper, analysis of variance (ANOVA) was…

  17. Risk personality traits of Internet addiction: a longitudinal study of Internet-addicted Chinese university students.

    Science.gov (United States)

    Dong, Guangheng; Wang, Jiangyang; Yang, Xuelong; Zhou, Hui

    2013-12-01

    As the world's fastest growing "addiction", Internet addiction is still controversial. The present study aimed to examine the potential personality predictors of Internet addicts. Eight hundred and sixty-eight students were tested using the Eysenck Personality Questionnaire after they had just entered university. Two years later, 49 were found to be addicted to the Internet as defined by high Internet addiction test scores. Comparisons of means and logistic regression analysis were used to explore their relationship. Students addicted to the Internet showed higher Neuroticism/Stability scores, higher Psychoticism/Socialization scores, and lower Lie scores than their normal peers before their addiction. Regression results showed that Internet addiction was accounted by three independent variables: Neuroticism/Stability, Psychoticism/Socialization, and Lie. These results suggest that the risk personality traits of Internet addiction include neuroticism, psychoticism, and immaturity. Copyright © 2012 Wiley Publishing Asia Pty Ltd.

  18. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  19. [Internet addiction--a case report].

    Science.gov (United States)

    Pejović-Milovancević, Milica; Popović-Deusić, Smiljka; Draganić-Gajić, Saveta; Lecić-Tosevski, Dusica

    2009-01-01

    Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction). Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behaviour. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  20. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  1. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    Science.gov (United States)

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  2. The Internet's effect on personality traits: An important casualty of the "Internet addiction" paradigm.

    Science.gov (United States)

    Aboujaoude, Elias

    2017-03-01

    Background and aims The "Internet addiction" paradigm has been criticized for several shortcomings, including inattention to specific online behaviors, not distinguishing the Internet from other media, insufficient focus on comorbidities, and definitions that do not take into account the constant access now possible. The paradigm's biggest casualty, however, may be that it has diverted attention away from subtle personality changes that seem to occur online, including in users who cannot be considered "addicted" under any definition. Methods A narrative assessment of the literature was conducted, focusing on the Internet's effects on personality traits as revealed in studies of Internet users. Results Impulsivity, narcissism, and aggression are some of the personality traits that seem to be nurtured by the Internet, with possible negative offline consequences. Discussion Ignoring the Internet's subtle effects on personality as we embrace an addiction model that implies severe pathology makes the majority of Internet users feel deceptively immune to the psychological effects of new technologies. It also limits our understanding of the big cultural shifts that are happening as a result. Conclusion The Internet's potentially negative effect on personality, and by extension on society at large, is a fundamental part of online psychology, one well worthy of further investigation.

  3. Internet gaming addiction, problematic use of the internet, and sleep problems: a systematic review.

    Science.gov (United States)

    Lam, Lawrence T

    2014-04-01

    The effect of problematic use of the Internet on mental health, particularly depression among young people, has been established but without a probable model for the underlying mechanism. In this study, a model is presented to describe possible pathways for the linkage between Internet gaming addiction and depression possibly mediated by sleep problems. A systematic review was conducted to gather epidemiological evidence to support or refute the link between addictive Internet gaming, problematic Internet use, and sleep problems including insomnia and poor sleep quality. Seven studies were identified through a systematic literature search, of these three related to addictive Internet gaming and four on problematic Internet uses and sleep problems. Information was extracted and analysed systematically from each of the studies and tabulated as a summary. Results of the review suggest that additive gaming, particularly massively multiplayer online role-playing games MMORPG, might be associated with poorer quality of sleep. Results further indicated that problematic Internet use was associated with sleep problems including subjective insomnia and poor sleep quality.

  4. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    Directory of Open Access Journals (Sweden)

    Zehra Deniz Yakıncı

    2018-04-01

    Full Text Available Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF was used on ‘Health Services Vocational High School’ students, in this study. 3.4 % of students were found to have internet addiction and the average internet usage was found to be 5 hours daily. When students were asked to enumerate the internet sites they use, the result was: social media, news sites, movie and series sites, educational and informational content sites, play sites, e-mail, shopping sites, and sexual content sites in order of usage preferance. While social media was preferred by 79.4% in the first place, educational content sites were determined to be preferred by 5.7% in the first place among others. The second most frequently used sites by students were movies and series (22.8%. Educational / informational content (20.2 % sites were the fifth preferred sites in the preference order.

  5. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  6. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  7. Internet Parenting Styles and the Impact on Internet Use of Primary School Children

    Science.gov (United States)

    Valcke, M.; Bonte, S.; De Wever, B.; Rots, I.

    2010-01-01

    Next to available data about actual Internet use of young children at home, most research especially focuses on the threats and opportunities about active Internet usage. Limited empirical research focuses on the role and impact of parents in this context. In the present study, Internet parenting styles are defined and operationalized to study the…

  8. [Effects of an Integrated Internet Addiction Prevention Program on Elementary Students' Self-regulation and Internet Addiction].

    Science.gov (United States)

    Mun, So Youn; Lee, Byoung Sook

    2015-04-01

    The purpose of this study was to develop an integrated internet addiction prevention program and test its effects on the self-regulation and internet addiction of elementary students who are at risk for internet addiction. A quasi-experimental study with a nonequivalent control group pretest-posttest design was used. Participants were assigned to the experimental group (n=28) or control group (n=28). Contents of the program developed in this study included provision of information about internet addiction, interventions for empowerment and methods of behavioral modification. A pre-test and two post-tests were done to identify the effects of the program and their continuity. Effects were testified using Repeated measures ANOVA, simple effect analysis, and Time Contrast. The self-regulation of the experimental group after the program was significantly higher than the control group. The score for internet addiction self-diagnosis and the internet use time in the experimental group were significantly lower than the control group. The effects of the integrated internet addiction prevention program for preventing internet addiction in elementary students at risk for internet addiction were validated.

  9. Internet use among Turkish adolescents.

    Science.gov (United States)

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  10. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  11. Impact of the Internet on Globalization : Industrial Internet

    OpenAIRE

    Jukics, Márk

    2016-01-01

    The thesis consists of two main parts. The first part is the theoretical framework, the second part is about assisting in a project of Centria University of Applied Sciences. The theoretical part of the thesis expounds the evolution and the benefits of the industrial internet. It explains the roots of globalization, internet, and industries. Lean manufacturing and management is also involved in the theory, as this way of management is successfully spreading by the help of globalization. I...

  12. Internet Access: How to Design and Test an Internet Use/Management Policy

    National Research Council Canada - National Science Library

    Montgomery, Doris

    2001-01-01

    The Internet is filled with tremendous marketing potential and vulnerabilities, organizations should develop polices that offer both Internet Usage/Management policies that are consisted with their organization...

  13. On Internet and Internet of things%论 Internet与 Internet of Things

    Institute of Scientific and Technical Information of China (English)

    曾华燊

    2012-01-01

    从Internet发展历史及应用环境变化的角度讨论IoT( Internet of Things)提出背景、内涵、组成结构和体系结构等关键问题.在分析对IoT的典型定义的基础上,笔者认为“ITU把IoT作为Internet平台在应用领域实现人、机、和智能化物理对象(SPO)信息全方位互通和实践普适计算理念的下一代Internet及其应用系统的概括”是对IoT更为合理的广义定义.以该定义为基础,全面地分析了“由多个用户域网(CPN)通过骨干通信子网互联”的基本组成结构,讨论了两类SPO-CPN的基本组成结构及其支撑技术;指出SPO的引入主要影响CPN资源网络中的接入部分,属于应用系统的范畴,对Internet基本技术影响甚微.笔者不赞同以欧盟为代表的把IoT定义为联物专用网的狭义定义,指出其IoT模型和体系结构研究混淆了网络平台与应用系统,实质上是网络应用系统模型和体系结构.%Based on the analysis of development history and application environment changes of Internet, this paper provided a comprehensive discussion on the incentive, connotation, organization, and some key issues of the Internet of Things (IoT). On the basis of the analysis of the typical definition of IoT, the author believed that " the full range of information interoperability ITU to IoT as an Internet platform in the application areas of human, machine, and intelligent physical objects (SPO) and the next generation Internet applications generalization of Pervasive Computing (Ubiquitous Computing) concept " is a more reasonable broad definition of the IoT. Based on this definition, the author analyzed the basic organization of IoT, which consisted of interconnected multiple Customer Premises Network (CPN) via backbone Subnetworks, and examined two types of components of SPO-CPN and their supporting techniques. It was also pointed out that introduction of SPO has little impact on Internet technology, except on access part of

  14. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  15. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  16. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  17. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  18. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  19. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  20. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  1. The future of mathematical communication. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    Christy, J.

    1994-12-31

    One of the first fruits of cooperation with LBL was the use of the MBone (Multi-Cast Backbone) to broadcast the Conference on the Future of Mathematical Communication, held at MSRI November 30--December 3, 1994. Late last fall, MSRI brought together more than 150 mathematicians, librarians, software developers, representatives of scholarly societies, and both commercial and not-for-profit publishers to discuss the revolution in scholarly communication brought about by digital technology. The conference was funded by the Department of Energy, the National Science Foundation, and the Paul and Gabriella Rosenbaum Foundation. It focused on the impact of the technological revolution on mathematics, but necessarily included issues of a much wider scope. There were talks on electronic publishing, collaboration across the Internet, economic and intellectual property issues, and various new technologies which promise to carry the revolution forward. There were panel discussions of electronic documents in mathematics, the unique nature of electronic journals, technological tools, and the role of scholarly societies. There were focus groups on Developing Countries, K-12 Education, Libraries, and Te{sub X}. The meeting also embodied the promises of the revolution; it was multicast over the MBone channel of the Internet to hundreds of sites around the world and much information on the conference will be available on their World Wide Web server at the URL http://www.msri.org/fmc. The authors have received many comments about the meeting indicating that it has had a profound impact on how the community thinks about how scientists can communicate and make their work public.

  2. STUDY ON GEOGRAPHY STUDENTS’ INTERNET USE

    Directory of Open Access Journals (Sweden)

    MARIA ELIZA DULAMĂ

    2015-01-01

    Full Text Available In this study we analyze the behavior of a sample of 30 third-year students of various majors of the Faculty of Geography, “Babeş-Bolyai” University of ClujNapoca, Romania, regarding the Internet use. We applied a questionnaire containing 15 items related to: Internet activities performed; length of time students spend on the Internet; devices used to access the Internet; types of materials that students downloaded, read, viewed, forwarded or posted on the Internet; types of applications used. Taking into account the time students spent daily on the Internet and correlated with other responses we concluded that their concerns were closely related to the Internet, whether it was about communication, career, or personal life.

  3. Internet FAQ Archives - Online Education - faqs.org

    Science.gov (United States)

    faqs.org Internet FAQ Archives - Online Education faqs.org faqs.org - Internet FAQ Archives Internet FAQ Archives Online Education Internet RFC Index Usenet FAQ Index Other FAQs Documents Tools IFC Rated FAQs Internet RFC/STD/FYI/BCP Archives The Internet RFC series of documents is also available from

  4. Internet Uses and Gratifications: Understanding Motivations for Using the Internet.

    Science.gov (United States)

    Ko, Hanjun

    In this study, the uses and gratifications theory was applied to investigate the Internet users' motivations and their relationship with attitudes toward the Internet as well as types of Web site visited by users. Subjects were 185 college students who completed a self-report questionnaire. Four motivations and five types of Web sites were…

  5. Differential physiological changes following internet exposure in higher and lower problematic internet users.

    Science.gov (United States)

    Reed, Phil; Romano, Michela; Re, Federica; Roaro, Alessandra; Osborne, Lisa A; Viganò, Caterina; Truzoli, Roberto

    2017-01-01

    Problematic internet use (PIU) has been suggested as in need of further research with a view to being included as a disorder in future Diagnostic and Statistical Manual (DSM) of the American Psychiatric Association, but lack of knowledge about the impact of internet cessation on physiological function remains a major gap in knowledge and a barrier to PIU classification. One hundred and forty-four participants were assessed for physiological (blood pressure and heart rate) and psychological (mood and state anxiety) function before and after an internet session. Individuals also completed a psychometric examination relating to their usage of the internet, as well as their levels of depression and trait anxiety. Individuals who identified themselves as having PIU displayed increases in heart rate and systolic blood pressure, as well as reduced mood and increased state of anxiety, following cessation of internet session. There were no such changes in individuals with no self-reported PIU. These changes were independent of levels of depression and trait anxiety. These changes after cessation of internet use are similar to those seen in individuals who have ceased using sedative or opiate drugs, and suggest PIU deserves further investigation and serious consideration as a disorder.

  6. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  7. Pemanfaatan Teknologi Internet Dalam Pendidikan

    OpenAIRE

    Aziz, Nurazzmi

    2013-01-01

    Internet technology keeps on developing and touching various aspects of human daily life. Starting from the very simple utilization of internet, such as the use of email for communication purposes, browsing varied information, up to the relatively advanced one, such as designing and developing homepage or the use of internet for shopping purposes (e-shopping). Some initiatives, either individually or in collaboration, to utilize internet for learning has been conducted by some Secondary Schoo...

  8. Internet café addiction of Taiwanese adolescents.

    Science.gov (United States)

    Wu, Chin-Shan; Cheng, Fei-Fei

    2007-04-01

    With the recent vigorous development, the Internet has become a part of life. And the Internet café has become an emerging industry under this new wave of Internet heat. However, the Internet café has also brought about many unexpected social problems and negative effects on society in Taiwan. For example, Internet café addiction (or pathological use) is a particular phenomenon derived from Internet café in Taiwan. But currently there are just a few scholars who attend to this problem. This study focuses mainly on the phenomenon of Internet café addiction among adolescents in Taiwan, the Internet café patronage behavior, and the cause of this phenomenon. Result of a questionnaire survey indicate that a significant difference exists between male and female adolescent in the following two aspects: "the stay hours for each visit in Internet café" and "Internet café addiction scores." Males' stay hours in Internet café are longer than females', and males also get higher Internet café addiction scores than females. The results also indicate that participants' degree of self-esteem and support from their social network can account for 30% of variance of Internet café addiction. Further, the results also suggest that social support is positively related to Internet café addiction score, whereas a negative relationship between self-esteem and Internet café addiction score is observed.

  9. Microservice scaling optimization based on metric collection in Kubernetes

    OpenAIRE

    Blažej, Aljaž

    2017-01-01

    As web applications become more complex and the number of internet users rises, so does the need to optimize the use of hardware supporting these applications. Optimization can be achieved with microservices, as they offer several advantages compared to the monolithic approach, such as better utilization of resources, scalability and isolation of different parts of an application. Another important part is collecting metrics, since they can be used for analysis and debugging as well as the ba...

  10. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  11. Undesigning the Internet: An exploratory study of reducing everyday Internet connectivity

    NARCIS (Netherlands)

    Widdicks, Kelly; Ringenson, Tina; Pargman, Daniel; Kuppusamy, Vishnupriya; Lago, Patricia; Penzenstadler, Birgit; Easterbrook, Steve; Venters, Colin; Ishtiaque Ahmed, Syed

    Internet connectivity is seamlessly integrated into many of our everyday habits and activities. Despite this, previous research has highlighted that our rather excessive Internet use is not sustainable or even always socially benecial. In this paper, we carried out an exploratory study on how

  12. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  13. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  14. Balancing participation and risks in children's Internet use: the role of internet literacy and parental mediation.

    Science.gov (United States)

    Lee, Sook-Jung; Chae, Young-Gil

    2012-05-01

    This study analyzed the survey data from 566 Korean children between the ages of 10 and 15 to examine the role of Internet literacy and parental mediation in solving the dilemma of children's Internet use. According to the findings, children's online participation was associated with increased exposure to online risks. The association was moderated by Internet skills and parental restrictive mediation; that is, for children with a high level of Internet skills and for children who received more restrictive mediation, the positive association between online participation and online risks weakened, but was still significant. The limited roles of Internet skills and parental restrictive mediation in children's Internet use were discussed in the context of media education.

  15. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  16. The myth of the decentralised internet

    Directory of Open Access Journals (Sweden)

    Ashwin J. Mathew

    2016-09-01

    Full Text Available In popular culture, and in policy discussions, the internet is often conceived of as a decentralised technology, which cannot be controlled. Drawing from research into internet infrastructure, focusing on the Border Gateway Protocol, I show that the internet has never been, and never can be, decentralised. I argue that the internet is better viewed as being distributed, both in terms of technologies and governance arrangements. The shift in perspective, from decentralised to distributed, is essential to understand the past and present internet, and to imagine possible future internets which preserve and support the public good.

  17. ITSA: Internet Traffic Statistics Archive

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Pras, Aiko

    Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of

  18. Internet gaming addiction: current perspectives

    Directory of Open Access Journals (Sweden)

    Kuss DJ

    2013-11-01

    Full Text Available Daria J KussPsychology Research and Behavior Management, Birmingham City University, Birmingham, UKAbstract: In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual's context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive

  19. Internet trials: participant experiences and perspectives.

    Science.gov (United States)

    Mathieu, Erin; Barratt, Alexandra; Carter, Stacy M; Jamtvedt, Gro

    2012-10-23

    Use of the Internet to conduct randomised controlled trials is increasing, and provides potential to increase equity of access to medical research, increase the generalisability of trial results and decrease the costs involved in conducting large scale trials. Several studies have compared response rates, completeness of data, and reliability of surveys using the Internet and traditional methods, but very little is known about participants' attitudes towards Internet-based randomised trials or their experience of participating in an Internet-based trial. To obtain insights into the experiences and perspectives of participants in an Internet-based randomised controlled trial, their attitudes to the use of the Internet to conduct medical research, and their intentions regarding future participation in Internet research. All English speaking participants in a recently completed Internet randomised controlled trial were invited to participate in an online survey. 1246 invitations were emailed. 416 participants completed the survey between May and October 2009 (33% response rate). Reasons given for participating in the Internet RCT fell into 4 main areas: personal interest in the research question and outcome, ease of participation, an appreciation of the importance of research and altruistic reasons. Participants' comments and reflections on their experience of participating in a fully online trial were positive and less than half of participants would have participated in the trial had it been conducted using other means of data collection. However participants identified trade-offs between the benefits and downsides of participating in Internet-based trials. The main trade-off was between flexibility and convenience - a perceived benefit - and a lack connectedness and understanding - a perceived disadvantage. The other tradeoffs were in the areas of: ease or difficulty in use of the Internet; security, privacy and confidentiality issues; perceived benefits and

  20. [The Role of Internet Parenting for the Internet use of Children in Pre-, Primary and Secondary School].

    Science.gov (United States)

    Festl, Ruth; Langmeyer, Alexandra N

    2018-02-01

    The Role of Internet Parenting for the Internet use of Children in Pre-, Primary and Secondary School The present study analyzes the relationship between mothers' and fathers' Internet parenting and children's Internet use across different age groups (1-15 years). Especially, we looked at the influencing factors of parental mediation strategies and the interplay of mothers' and fathers' Internet parenting. Based on data of the DJI-survey "Growing up in Germany" (Aufwachsen in Deutschland: Alltagswelten, AID:A II 2015, N = 1,196), dyadic structural equation models have shown that across all age groups shared parent-child online activities were important influencing factors of regulating the children's Internet use. Also, the self-perceived Internet education competence of mothers and fathers has been confirmed as a relevant factor influencing a more intense use of parental mediation strategies for school-aged children. While the amount of Internet use among young children (1-6 years) was exclusively influenced by features and strategies of mothers' Internet parenting, the transition to elementary school not only marked changes in the frequency of children's Internet use, but also in the ICT parenting of mothers and fathers. For school-aged children, we indeed found an influence of fathers as well as, in case of the oldest age group, a reduced use of parental mediation strategies. However, parents' attitudes, competences and strategies regarding Internet parenting still stayed important during adolescence.

  1. [Internet use and adolescents' sexual health].

    Science.gov (United States)

    Tseng, Ying-Hua; Wang, Ruey-Hsia; Wang, Hsiu-Hung; Chou, Fan-Hao

    2012-12-01

    Internet use is an important part of the daily life of adolescents. The ease of searching the internet for information makes finding information on sex, a topic of particular interest to adolescents, easy. Although the internet is replete with sexual information, the influence of internet use on adolescents' sexual health is analogous to a double-edged sword. This article identifies the four main sexual dilemmas facing Taiwan adolescents and analyzes the pros and cons of internet use with regard to adolescents' sexual health. Cons include the predominance of internet pornography and the potential risks of making friends online. Pros include the internet's role as an optimal communications platform and tool for sex-related research. We suggest that nurses have a unique role and functions to play in promoting adolescent sexual health. We also offer recommendations for school health nursing and clinical nursing. Further internet-based quantitative and qualitative research is necessary to clarify relevant sexual health issues. Finally, we offer design suggestions for sexual education homepages.

  2. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics

  3. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  4. Internet for the internationals: effects of internet use motivations on international students' college adjustment.

    Science.gov (United States)

    Lee, Eun-Ju; Lee, Lu; Jang, Jeongwoo

    2011-01-01

    Drawing upon the uses and gratifications approach, the current study examined how international students' Internet use motivations affect their academic, social, and emotional adjustments in the new environment. A total of 166 Chinese students studying in Korea participated in a web-based survey. First, a factor analysis identified four distinct motivations for Internet use: homeland orientation (to stay connected to the home country), local information seeking (to learn about the host society), local social interaction (to form interpersonal relationships locally), and entertainment. After controlling for the effects of sociodemographic variables (i.e., gender, year at school, length of residence, Korean language proficiency) and personality traits (i.e., extraversion, openness to experience, neuroticism), Internet use motivations were found to be significant predictors of international students' social and emotional adjustments. Specifically, those seeking to build a local social network through the Internet reported greater satisfaction with their social life, whereas homeland orientation was associated with poorer emotional adaptation. Various Internet activities, such as e-mail, blogging, and instant messaging, were not significantly related to college adjustments, suggesting the multi-functionality of Internet-based communication channels.

  5. Oncology information on the Internet.

    Science.gov (United States)

    Goto, Yasushi; Nagase, Takahide

    2012-05-01

    Owing to new developments in Internet technologies, the amount of available oncology information is growing. Both patients and caregivers are increasingly using the Internet to obtain medical information. However, while it is easy to provide information, ensuring its quality is always a concern. Thus, many instruments for evaluating the quality of health information have been created, each with its own advantages and disadvantages. The increasing importance of online search engines such as Google warrants the examination of the correlation between their rankings and medical quality. The Internet also mediates the exchange of information from one individual to another. Mailing lists of advocate groups and social networking sites help spread information to patients and caregivers. While text messages are still the main medium of communication, audio and video messages are also increasing rapidly, accelerating the communication on the Internet. Future health information developments on the Internet include merging patients' personal information on the Internet with their traditional health records and facilitating the interaction among patients, caregivers and health-care providers. Through these developments, the Internet is expected to strengthen the mutually beneficial relationships among all stakeholders in the field of medicine.

  6. Adopting Internet Banking in Ghana

    OpenAIRE

    G.O. Ofori-Dwumfuo; Betty A. Dankwah

    2013-01-01

    This study looks at the benefits, challenges and barriers in adopting Internet banking at a major bank in Ghana. The development of the Internet is changing the way financial services are provided in Ghana. The Internet banking facility has resulted in new ways of delivering banking services. The research is a case study based on the staffs that has worked with the bank for more than three years. In evaluating benefits, challenges and barriers to the bank in adopting Internet banking, intervi...

  7. Internet gratifications and internet addiction: on the uses and abuses of new media.

    Science.gov (United States)

    Song, Indeok; LaRose, Robert; Eastin, Matthew S; Lin, Carolyn A

    2004-08-01

    Internet addiction has been identified as a pathological behavior, but its symptoms may be found in normal populations, placing it within the scope of conventional theories of media attendance. The present study drew upon fresh conceptualizations of gratifications specific to the Internet to uncover seven gratification factors: Virtual Community, Information Seeking, Aesthetic Experience, Monetary Compensation, Diversion, Personal Status, and Relationship Maintenance. With no parallel in prior research, Virtual Community might be termed a "new" gratification. Virtual Community, Monetary Compensation, Diversion, and Personal Status gratifications accounted for 28% of the variance in Internet Addiction Tendency. The relationship between Internet addiction and gratifications was discussed in terms of the formation of media habits and the distinction between content and process gratifications.

  8. Internet-based communications in radiation oncology

    International Nuclear Information System (INIS)

    Goldwein, Joel W.

    1996-01-01

    Currently, it is estimated that 40 million Americans have access to the Internet. The emergence of widely available software, inexpensive hardware and affordable connectivity have all led to an explosive growth in its use. Medicine in general and radiation oncology specifically are deriving great benefits from this technology. The use of this technology will result in a paradigm shift that is likely to change the way we all communicate. An understanding of the technology is therefore mandatory. The objectives of the course are to provide a practical introduction to the use of Internet technologies as they relate to our profession. The following topics will be reviewed. 1. A brief history of the Internet 2. Getting connected to the Internet 3. Internet venues - The Web, ftp, USENETS ... 4. Basic software tools - email, browsers ... 5. Specific Internet resources 6. Advanced Internet utilization 7. Business and the Internet 8. Intranet utilization 9. Philosophical and medicolegal issues 10. Predictions of the future Upon completion, the attendee will be familiar with the Internet, how it works, and how it can be used to fulfill the research, educational, and clinical care missions of our profession

  9. Internet in der Schule, Schule im Internet - Schulische Kommunikationskultur in der Informationsgesellschaft

    Directory of Open Access Journals (Sweden)

    Axel Maireder

    2009-12-01

    Full Text Available Fragen nach der Bedeutung des Internet für schulische Lehr- und Lernprozesse und der Bedeutung der Schule für das Internetnutzungsverhalten Jugendlicher standen im Zentrum dieses explorativen Forschungsprojektes, das 2008/2009 an zehn österreichischen Schulen durchgeführt wurde. In der Analyse von Gruppendiskussionen von Lehrerinnen und Lehrern sowie Schülerinnen und Schülern zeigen sich dabei folgende zentrale Problemfelder: . unterschiedliche Quellenevaluationskonzepte von Jugendlichen und ihren Lehrkräften führen zu Missverständnissen; . fehlendes Feedback auf schulische Arbeiten lässt die Sorgfalt bei der schulischen Informationsarbeit schwinden; . in Social Media bilden sich schulische Support- als auch Inhibitionsnetzwerke heraus; . sowie Lehrerinnen und Lehrer werden vielfach von einer impliziten Internetangst vor der Implementierung des Internet in den Unterricht abgehalten. Das Projekt wurde vom Bundesministerium für Unterricht, Kunst und Kultur finanziert und von Univ. Prof. Dr. Thomas A. Bauer geleitet. The terms and consequences of internet use in schools and the impact of the school on the internet practices of teens are the questions researched in this exploratory project. The study was carried out in ten Austrian schools in 2008/2009. The data, mainly group interviews with students and teachers, revealed a couple of interesting phenomena: . Different concepts to evaluate the reliability of information lead to misunderstanding among students and teachers; . missing feedback from teachers let students ‚learn’ that information quality is not important; . communication networks work both as support and suppression networks for school tasks; . the synchronous use of internet while doing homework leads to misjudgement of time by the students and to problems with time management; . teachers have a certain level of internet anxiety that keeps them from using the internet within their classes. The project was financed by the

  10. Literasi Media Internet di Kalangan Mahasiswa

    Directory of Open Access Journals (Sweden)

    Gracia Rachmi Adiarsi

    2015-10-01

    Full Text Available This study aims to find out to what extent the Internet users in line with media literacy. According to Indonesia Internet Service Provider Association (APJII and BPS Statistic Indonesia, it was found that Internet users in Indonesia have grown since three years ago up to 13% or become 71.19 million people until the end of 2013. According to research survey MarkPlus Insight, “netizen” or Internet users who spend more than three hours per day on Internet. Moreover, they are increasing from 24,2 Million people in 2012 and become 31,7 million people in 2013. This research used qualitative method by gathering the data through Focus Group Discussion (FGD to private university students who spent for Internet 5 hours per day and less than 5 hours per day. The theory used in this research was media literacy. The result of this research stated that students who accessed the Internet below 5 hours per day were already busy with work and not too intense in using the Internet either via smartphone or a computer. Different findings came up from the students who accessed the Internet over 5 hours per day. Most of the time, they used the Internet for social media and instant messaging (instant messenger through smartphones. Critical attitude towards the media message depends on the informants’ interest toward the information. 

  11. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  12. INTERNET ADDICTION – EMPIRICAL VERIFICATION FOR SLOVENIA

    Directory of Open Access Journals (Sweden)

    Mateja Gorenc

    2016-09-01

    Full Text Available The Internet has become an essential part of the day and the working lives of many people. Daily use of the Internet has the potential to become the worrying problem of the moment as some of Internet users begin to neglect their families, abandon hobbies, are late for work and, thus, lose contact with reality only to spend as much time as possible on the Internet. The aim of the research was to explore Internet addiction in Slovenia. We have designed a structural model to study Internet addiction. The research was conducted to collect data on Internet addiction. The sample surveys included employed people in Slovenia. Our results indicate a serious problem with Internet addiction. The predicted model in this study can be used for further research on Internet addiction.

  13. Internet trials: participant experiences and perspectives

    Science.gov (United States)

    2012-01-01

    Background Use of the Internet to conduct randomised controlled trials is increasing, and provides potential to increase equity of access to medical research, increase the generalisability of trial results and decrease the costs involved in conducting large scale trials. Several studies have compared response rates, completeness of data, and reliability of surveys using the Internet and traditional methods, but very little is known about participants’ attitudes towards Internet-based randomised trials or their experience of participating in an Internet-based trial. Objective To obtain insights into the experiences and perspectives of participants in an Internet-based randomised controlled trial, their attitudes to the use of the Internet to conduct medical research, and their intentions regarding future participation in Internet research. Methods All English speaking participants in a recently completed Internet randomised controlled trial were invited to participate in an online survey. Results 1246 invitations were emailed. 416 participants completed the survey between May and October 2009 (33% response rate). Reasons given for participating in the Internet RCT fell into 4 main areas: personal interest in the research question and outcome, ease of participation, an appreciation of the importance of research and altruistic reasons. Participants’ comments and reflections on their experience of participating in a fully online trial were positive and less than half of participants would have participated in the trial had it been conducted using other means of data collection. However participants identified trade-offs between the benefits and downsides of participating in Internet-based trials. The main trade-off was between flexibility and convenience – a perceived benefit – and a lack connectedness and understanding – a perceived disadvantage. The other tradeoffs were in the areas of: ease or difficulty in use of the Internet; security, privacy and

  14. Internet trials: participant experiences and perspectives

    Directory of Open Access Journals (Sweden)

    Mathieu Erin

    2012-10-01

    Full Text Available Abstract Background Use of the Internet to conduct randomised controlled trials is increasing, and provides potential to increase equity of access to medical research, increase the generalisability of trial results and decrease the costs involved in conducting large scale trials. Several studies have compared response rates, completeness of data, and reliability of surveys using the Internet and traditional methods, but very little is known about participants’ attitudes towards Internet-based randomised trials or their experience of participating in an Internet-based trial. Objective To obtain insights into the experiences and perspectives of participants in an Internet-based randomised controlled trial, their attitudes to the use of the Internet to conduct medical research, and their intentions regarding future participation in Internet research. Methods All English speaking participants in a recently completed Internet randomised controlled trial were invited to participate in an online survey. Results 1246 invitations were emailed. 416 participants completed the survey between May and October 2009 (33% response rate. Reasons given for participating in the Internet RCT fell into 4 main areas: personal interest in the research question and outcome, ease of participation, an appreciation of the importance of research and altruistic reasons. Participants’ comments and reflections on their experience of participating in a fully online trial were positive and less than half of participants would have participated in the trial had it been conducted using other means of data collection. However participants identified trade-offs between the benefits and downsides of participating in Internet-based trials. The main trade-off was between flexibility and convenience – a perceived benefit – and a lack connectedness and understanding – a perceived disadvantage. The other tradeoffs were in the areas of: ease or difficulty in use of the Internet

  15. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  16. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  17. The three-factor model of Internet addiction: the development of the Problematic Internet Use Questionnaire.

    Science.gov (United States)

    Demetrovics, Zsolt; Szeredi, Beatrix; Rózsa, Sándor

    2008-05-01

    Despite the fact that more and more clinical case studies and research reports have been published on the increasing problem of Internet addiction, no generally accepted standardized tool is available to measure problematic Internet use or Internet addiction. The aim of our study was to create such a questionnaire. On the basis of earlier studies and our previous experience withYoung's (1998a) Internet Addiction Test, initially, we created a 30-item questionnaire, which was assessed together with other questions regarding participants' Internet use. Data were collected online from 1,037 persons (54.1% of them male; mean age, 23.3 years; SD, 9.1). As a result of reliability analysis and factor analysis, we reduced the number of items to 18 and created the Problematic Internet Use Questionnaire (PIUQ) containing three subscales: obsession, neglect, and control disorder. Cronbach's alpha of the PIUQ is .87 (Cronbach's alpha of the subscales is .85, .74, and .76, respectively). The test-retest correlation of the PIUQ is .90. The PIUQ proved to be a reliable measurement for assessing the extent of problems caused by the "misuse" of the Internet; however, further analysis is needed.

  18. Identifying problematic Internet users: development and validation of the Internet Motive Questionnaire for Adolescents (IMQ-A).

    Science.gov (United States)

    Bischof-Kastner, Christina; Kuntsche, Emmanuel; Wolstein, Jörg

    2014-10-09

    Internationally, up to 15.1% of intensive Internet use among adolescents is dysfunctional. To provide a basis for early intervention and preventive measures, understanding the motives behind intensive Internet use is important. This study aims to develop a questionnaire, the Internet Motive Questionnaire for Adolescents (IMQ-A), as a theory-based measurement for identifying the underlying motives for high-risk Internet use. More precisely, the aim was to confirm the 4-factor structure (ie, social, enhancement, coping, and conformity motives) as well as its construct and concurrent validity. Another aim was to identify the motivational differences between high-risk and low-risk Internet users. A sample of 101 German adolescents (female: 52.5%, 53/101; age: mean 15.9, SD 1.3 years) was recruited. High-risk users (n=47) and low-risk users (n=54) were identified based on a screening measure for online addiction behavior in children and adolescents (Online-Suchtverhalten-Skala, OSVK-S). Here, "high-risk" Internet use means use that exceeds the level of intensive Internet use (OSVK-S sum score ≥7). The confirmatory factor analysis confirmed the IMQ-A's 4-factor structure. A reliability analysis revealed good internal consistencies of the subscales (.71 up to .86). Moreover, regression analyses confirmed that the enhancement and coping motive groups significantly predicted high-risk Internet consumption and the OSVK-S sum score. A mixed-model ANOVA confirmed that adolescents mainly access the Internet for social motives, followed by enhancement and coping motives, and that high-risk users access the Internet more frequently for coping and enhancement motives than low-risk users. Low-risk users were primarily motivated socially. The IMQ-A enables the assessment of motives related to adolescent Internet use and thus the identification of populations at risk. The questionnaire enables the development of preventive measures or early intervention programs, especially dealing

  19. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  20. Classifying Internet Pathological Users: Their Usage, Internet Sensation Seeking, and Perceptions.

    Science.gov (United States)

    Lin, Sunny S. J.

    A study was conducted to identify pathological Internet users and to reveal their psychological features and problematic usage patterns. One thousand and fifty Taiwanese undergraduates were selected. An Internet Addiction Scale was adopted to classify 648 students into 4 clusters. The 146 users in the 4th cluster, who reported significantly higher…

  1. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    OpenAIRE

    Yakıncı, Zehra Deniz; Gürbüz, Perihan; Yetiş, Gülsüm

    2018-01-01

    Internetis the easiest way to access information. It provides positive contributions toindividual and surroundings, in learning and information era. At this point theanswers of the questions: ‘How do young people use internet and how much do theyuse internet for their education?’ come into prominence. In order to find theanswers; a questionnaire prepared by resarchers and Young Internet AddictionTest- Short Form (YIAT-SF) was used on ‘Health Services Vocational High School’students, in this s...

  2. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  3. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  4. Customer perceptions on Internet banking information protection

    Directory of Open Access Journals (Sweden)

    André Redlinghuis

    2010-12-01

    Objectives: This article has reported on the results of a survey (a close-ended questionnaire that was conducted by alumni of the University of Johannesburg (UJ. The research problem for this study has been formulated as ‘what are Internet banking customers’ perception on information protection when using Internet banking services and products?’ Method: The methodology for this study falls on quantitative research. The research study consisted of a detailed literature review, followed by an empirical component which consisted of a quantitative questionnaire. The questionnaire used in this study consisted of eight sections covering biographical information, financial institution and Internet banking, Internet banking service quality and delivery, Internet banking functionality, Internet banking costs, Internet banking convenience and relationships, Internet banking trust and Internet banking security and information technology (IT. Results: It was established that the findings of this research could assist financial institutions with fostering and building greater value adding relationships with their customers. These value-adding endeavours will ensure that customers experience and perceive their Internet banking experience to be enriching. Education and awareness campaigns are key focus areas financial institutions should continuously invest in. Information should be easily retrievable and communicated in a manner that makes sense to the diverse customer base, especially within South Africa with its diverse cultures and languages. Conclusion: The final conclusion that could be reached is that Internet banking products and services will continue to grow across various divides and platforms as the Internet costs decrease in future, the growth of Internet related products and services such as Internet banking will increase.

  5. Internet Advertising: Ethics and Etiquette.

    Science.gov (United States)

    Machovec, George S.

    1994-01-01

    Discusses the growth of the Internet and the attitudes of users toward advertising, provides examples of kinds of advertising used on electronic networks, and lists several companies that help advertisers use the Internet. Fifteen guidelines are suggested to help advertisers use the Internet in a reasonable and appropriate way. (Contains 11…

  6. Some Aspects Regarding Internet Advertising

    Directory of Open Access Journals (Sweden)

    Chiţu I.

    2009-12-01

    Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.

  7. Problematic Internet Usage and Immune Function.

    Science.gov (United States)

    Reed, Phil; Vile, Rebecca; Osborne, Lisa A; Romano, Michela; Truzoli, Roberto

    2015-01-01

    Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test), depression and anxiety (Hospital Anxiety and Depression Scales), social isolation (UCLA Loneliness Questionnaire), sleep problems (Pittsburgh Sleep Quality Index), and their current health - General Health Questionnaire (GHQ-28), and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28). This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol.

  8. Problematic Internet Usage and Immune Function.

    Directory of Open Access Journals (Sweden)

    Phil Reed

    Full Text Available Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test, depression and anxiety (Hospital Anxiety and Depression Scales, social isolation (UCLA Loneliness Questionnaire, sleep problems (Pittsburgh Sleep Quality Index, and their current health - General Health Questionnaire (GHQ-28, and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28. This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol.

  9. Problematic Internet Usage and Immune Function

    Science.gov (United States)

    Reed, Phil; Vile, Rebecca; Osborne, Lisa A.; Romano, Michela; Truzoli, Roberto

    2015-01-01

    Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test), depression and anxiety (Hospital Anxiety and Depression Scales), social isolation (UCLA Loneliness Questionnaire), sleep problems (Pittsburgh Sleep Quality Index), and their current health – General Health Questionnaire (GHQ-28), and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28). This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol. PMID:26244339

  10. Why do young adults develop a passion for Internet activities? The associations among personality, revealing "true self" on the Internet, and passion for the Internet.

    Science.gov (United States)

    Tosun, Leman Pinar; Lajunen, Timo

    2009-08-01

    This study examines the associations of harmonious passion (HP) and obsessive passion (OP) for Internet activities with Eysenckian personality dimensions in a sample of 421 university students. Results show that psychoticism correlates positively with both HP and OP; extroversion correlates positively with HP only; and neuroticism has no correlation with passion for Internet activities. Additionally, the study examines participants' tendency to express their "true self" on the Internet, and the results reveal that this tendency has a positive association with psychoticism, neuroticism, and both types of passion for the Internet. Moreover, the relationship between psychoticism and passion (both harmonious and obsessive) is mediated by the tendency to express true self on the Internet. The results were interpreted from the media dependency perspective.

  11. Internet and Cross Media Productions

    DEFF Research Database (Denmark)

    Petersen, Anja Bechmann

    2006-01-01

    , the Internet continues to play a minor role when compared to older media. The content of the cross media concepts and organizations' history are crucial elements in deciding the priority and use of platforms. Methodologically, the article approaches cross media and the roles of the Internet on a micro......Convergence is one of the hot topics in Internet studies. Recently, however, media organizations have turned their focus to cross media communication. Media organizations are interested in optimizing communication across platforms such as TV, radio, websites, mobile telephones and newspapers....... The aim of this article is to examine the roles of the Internet when emphasis is put on cross media rather than convergence. This article proposes not one unidirectional convergent tendency but manifold roles of the Internet in cross media communication. Inside the media organizations, however...

  12. Study on the contract characteristics of Internet architecture

    Science.gov (United States)

    Fu, Chuan; Zhang, Guoqing; Yang, Jing; Liu, Xiaona

    2011-11-01

    The importance of Internet architecture goes beyond the technical aspects. The architecture of Internet has a profound influence on the Internet-based economy in term of how the profits are shared by different market participants (Internet Server Provider, Internet Content Provider), since it is the physical foundation upon which the profit-sharing contracts are derived. In order to facilitate the continuing growth of the Internet, it is necessary to systematically study factors that curtail the Internet-based economy including the existing Internet architecture. In this paper, we used transaction cost economics and contract economics as new tools to analyse the contracts derived from the current Internet architecture. This study sheds light on how the macro characteristics of Internet architecture effect the microeconomical decisions of market participants. Based on the existing Internet architecture, we discuss the possibility of promoting Internet-based economy by encouraging user to connect their private stub network to the Internet and giving the user more right of self-governing.

  13. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  14. Internet gaming addiction: current perspectives.

    Science.gov (United States)

    Kuss, Daria J

    2013-01-01

    In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual's context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that

  15. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  16. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  17. Older Adolescent's Perceptions of Personal Internet Use

    Science.gov (United States)

    Koff, Rosalind N.; Moreno, Megan A.

    2013-01-01

    Internet use is widespread among the older adolescent population. Given the pervasiveness and frequency of internet use, concerns have been raised regarding the impact of excess internet use on adolescent health. In order to understand the impact of internet use on health, we must have accurate and reliable measures of internet use. This study…

  18. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  19. Current experiences with internet telepathology and possible evolution in the next generation of Internet services.

    Science.gov (United States)

    Della Mea, V; Beltrami, C A

    2000-01-01

    The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.

  20. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  1. Internet applications in radiation safety

    International Nuclear Information System (INIS)

    Hill, P.; Geisse, C.; Wuest, E.

    1998-01-01

    As a means of effective communication the Internet is presently becoming more and more important in German speaking countries, too. Its possibilities to exchange and to obtain information efficiently and rapidly are excellent. Internet and email access are available now in most institutions for professional use. Internet services of importance to radiation safety professionals are described. (orig.) [de

  2. Russian Initiatives in Internet Governance

    Directory of Open Access Journals (Sweden)

    Sergey Sergeevich Shirin

    2014-01-01

    Full Text Available The article is devoted to the research of Russian initiatives concerning its participation in international system of Internet governance. In the research, conceptual and theoretic basis for participation of state governments in Internet governance is given, academic discourse of this issue is assessed, the review of main Russian initiatives made from 2005 (since the second stage of the World Summit on Information Society till the present day is carried out. The conclusion is made that the most successful Internet governance initiative of Russia is the implementation of cyrillic top level domains. Much less successful are Russian attempts to reconstruct existing organizational structure of Internet governance. Russian policy is assessed as a policy of preferring loud statements and PR rather than real influence on development of Internet technologies. Russia consideres Internet as political resource and tries to increase its influence on decision making process on a political, not operational level of Internet governance. The author states that federal government of the United States of America has fully lost the control on the domain name systems. These functions are going to be given to the private sector, while ICANN, which was established according to the Memorandum of Understanding/Joint Project Agreement with U.S. Department of Commerce, is becoming a truly independent international organization. Considering this, the author comes to the conclusion that political transformations for the sake of Russia are already made. He also forecast that next initiatives of Russia will be directed to the segmentation of the Internet.

  3. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  4. PENGEMBANGAN PERANGKAT LUNAK MANAJEMEN KONEKSI INTERNET UNTUK SOHO

    Directory of Open Access Journals (Sweden)

    Muchammad Husni

    2002-07-01

    Full Text Available Untuk bisa mengakses Internet, komputer harus terhubung ke Internet melalui Internet Service Provider dan menggunakan IP address Internet. Jumlah IP address Internet saat ini (IPv4 sangat terbatas, oleh karena itu penggunaannya dibatasi dan diatur dengan sistem sewa yang cukup mahal. Alternatif koneksi Internet yang paling murah dan umum digunakan adalah Dial-up, komputer client akan otomatis menggunakan IP address dynamic yang disewakan selama kita terkoneksi. Apabila pada Local Area Network terdapat beberapa komputer yang ingin menggunakan Internet secara bersamaan apakah harus dilakukan Dial-up untuk tiap komputer ? Tidak, terdapat 2 alternativ Internet-Sharing yakni Masquerading dan Proxy. Saat ini terdapat beberapa software yang menyediakan solusi Internet-Sharing dengan Masquerading atau Proxy yang berbasis sistem operasi Windows. Permasalahannya software tersebut tidak handal (lambat dan sering hang dan tidak aman karena banyaknya celah keamanan pada sistem operasi Windows seperti Denial-of-Service dan Trojan. Penggunaan Internet yang tidak terkontrol pada suatu perusahaan dapat menyebabkan efek yang kontraproduktiv pada karyawan, oleh karena itu diperlukan manajemen akses Internet yang efektiv, efisien dan mudah digunakan. Pada makalah ini dikembangkan solusi Internet-Sharing dan Manajemen Koneksi Internet yang handal, aman, fleksibel dan mudah digunakan. Untuk Internet-Sharing menggunakan fasilitas Masquerading yang terdapat pada kernel Linux 2.2 yang terbukti handal dan aman. Sistem manajemen koneksi dan konfigurasi didesain berbasis Web agar mudah digunakan oleh network administrator dan karyawan. Sistem ini juga cocok diaplikasikan pada Internet Café/Warung Internet. Kata kunci : Internet, SOHO, IP, dial-up.

  5. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  6. A DISTRIBUTED HYPERMAP MODEL FOR INTERNET GIS

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The rapid development of Internet technology makes it possible to integrate GIS with the Internet,forming Internet GIS.Internet GIS is based on a distributed client/server architecture and TCP/IP & IIOP.When constructing and designing Internet GIS,we face the problem of how to express information units of Internet GIS.In order to solve this problem,this paper presents a distributed hypermap model for Internet GIS.This model provides a solution to organize and manage Internet GIS information units.It also illustrates relations between two information units and in an internal information unit both on clients and servers.On the basis of this model,the paper contributes to the expressions of hypermap relations and hypermap operations.The usage of this model is shown in the implementation of a prototype system.

  7. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  8. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  9. Anticipatory ethics for a future Internet: analyzing values during the design of an Internet infrastructure.

    Science.gov (United States)

    Shilton, Katie

    2015-02-01

    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team-the Named Data Networking project-based on data gathered from publications and internal documents. Networking engineers making technical choices also weigh non-technical values when working on Internet infrastructure. Analysis of the team's documents reveals both values invoked in response to technical constraints and possibilities, such as efficiency and dynamism, as well as values, including privacy, security and anonymity, which stem from a concern for personal liberties. More peripheral communitarian values espoused by the engineers include democratization and trust. The paper considers the contextual and social origins of these values, and then uses them as a method of practicing anticipatory ethics: considering the impact such priorities may have on a future Internet.

  10. Internet addiction and its determinants among medical students.

    Science.gov (United States)

    Chaudhari, Bhushan; Menon, Preethi; Saldanha, Daniel; Tewari, Abhinav; Bhattacharya, Labhanya

    2015-01-01

    Exponential use of internet has resulted in internet addiction in recent times. Students are particularly at risk because of their unique personal, social, and academic needs. The study was designed to evaluate the prevalence of internet addiction and its determinants among medical students. A cross-sectional study was conducted in 282 medical students with the help of semi-structured questionnaire consisting of questions related to demographic information, information related to internet use, and Young's internet addiction test. We found prevalence of internet addiction among medical students to be 58.87% (mild - 51.42%, moderate -7.45%) and significantly associated factors with internet addiction being male gender, staying in private accommodation, lesser age of first internet use, using mobile for internet access, higher expenditure on internet, staying online for longer time, and using internet for social networking, online videos, and watching website with sexual content. Medical students are vulnerable for internet addiction and efforts should be taken to increase awareness and prevent the problem of internet addiction in them.

  11. Internet addiction and its determinants among medical students

    Directory of Open Access Journals (Sweden)

    Bhushan Chaudhari

    2015-01-01

    Full Text Available Background: Exponential use of internet has resulted in internet addiction in recent times. Students are particularly at risk because of their unique personal, social, and academic needs. Objectives: The study was designed to evaluate the prevalence of internet addiction and its determinants among medical students. Materials and Methods: A cross-sectional study was conducted in 282 medical students with the help of semi-structured questionnaire consisting of questions related to demographic information, information related to internet use, and Young's internet addiction test. Results: We found prevalence of internet addiction among medical students to be 58.87% (mild – 51.42%, moderate –7.45% and significantly associated factors with internet addiction being male gender, staying in private accommodation, lesser age of first internet use, using mobile for internet access, higher expenditure on internet, staying online for longer time, and using internet for social networking, online videos, and watching website with sexual content. Conclusion: Medical students are vulnerable for internet addiction and efforts should be taken to increase awareness and prevent the problem of internet addiction in them.

  12. Using the Internet to access information inflates future use of the Internet to access other information.

    Science.gov (United States)

    Storm, Benjamin C; Stone, Sean M; Benjamin, Aaron S

    2017-07-01

    The ways in which people learn, remember, and solve problems have all been impacted by the Internet. The present research explored how people become primed to use the Internet as a form of cognitive offloading. In three experiments, we show that using the Internet to retrieve information alters a person's propensity to use the Internet to retrieve other information. Specifically, participants who used Google to answer an initial set of difficult trivia questions were more likely to decide to use Google when answering a new set of relatively easy trivia questions than were participants who answered the initial questions from memory. These results suggest that relying on the Internet to access information makes one more likely to rely on the Internet to access other information.

  13. Displacement and Supplemental Effects of the Mobile Internet on Fixed Internet Use

    NARCIS (Netherlands)

    Ongena, G.; Bouwman, H.; Gillebaard, H.

    2012-01-01

    Mobile devices facilitate the use of mobile services that are similar to services used via fixed Internet connections. The objective of this article is to assess displacement effects between fixed and mobile Internet services, and to research the role of technical capabilities of mobile handsets and

  14. Internet pricing: una breve rassegna critica (Internet Pricing: A Short Critical Survey

    Directory of Open Access Journals (Sweden)

    Claudio Sardoni

    2001-03-01

    Full Text Available In the article, some recent literature on Internet pricing is surveyed. The author looks at the topic by setting it in the more general framework of the analysis of activities that can be regarded as similar to Internet from the technological and economic point of view. In particular, attention is focused on the problem of the divergence between private and social costs when there occurs network congestion and the problem of efficient prices in activities characterized by the existence of peak-loads. The author argues that dealing with such issues in the context of Internet cannot be reduced to a straightforward application of traditional results of welfare economics and the literature on peak-load pricing. In a competitive market with similar features to the market for Internet services, it is well possible that there do not exist incentives that induce firms to adopt price systems such as to prevent and/or eliminate congestion. Further theoretical and analytical developments are then in order.

  15. Internet utilization by radiation oncology patients

    International Nuclear Information System (INIS)

    Metz, J.M.; Devine, P.; DeNittis, A.; Stambaugh, M.; Jones, H.; Goldwein, J.; Whittington, R.

    2001-01-01

    Purpose: Studies describing the use of the Internet by radiation oncology patients are lacking. This multi-institutional study of cancer patients presenting to academic (AC), community (CO) and veterans (VA) radiation oncology centers was designed to analyze the use of the Internet, predictive factors for utilization, and barriers to access to the Internet. Materials and Methods: A questionnaire evaluating the use of the Internet was administered to 921 consecutive patients presenting to radiation oncology departments at AC, CO and VA Medical Centers. The study included 436 AC patients (47%), 284 CO patients (31%), and 201 VA patients (22%). A computer was available at home to 427 patients (46%) and 337 patients (37%) had Email access. The mean age of the patient population was 64 years (range=14-93). Males represented 70% of the patient population. The most common diagnoses included prostate cancer (33%), breast cancer (13%), and lung cancer (11%). Results: Overall, 265/921 patients (29%) were using the Internet to find cancer related information. The Internet was used by 42% of AC patients, 25% of CO patients and only 5% of VA patients (p<.0001). A computer was available at home in 62% AC vs. 45% CO vs. 12% VA patients (p<.0001). Patients < 60 years were much more likely to use the Internet than older patients (p<.0001). Most of the Internet users considered the information either very reliable (22%) or somewhat reliable (70%). Most patients were looking for information regarding treatment of their cancer (90%), management of side effects of treatment (74%), alternative/complementary treatments (65%) and clinical trials (51%). Unconventional medical therapies were purchased over the Internet by 12% of computer users. Products or services for the treatment or management of cancer were purchased online by 12% of Internet users. Conclusion: A significant number of cancer patients seen in radiation oncology departments at academic and community medical centers

  16. [Internet in medicine--development and perspectives].

    Science.gov (United States)

    Dezelić, Gjuro

    2002-01-01

    Internet is one of information technologies marking the transition from the second to the third millennium. The present role and expansion of Internet in medicine and healthcare is reviewed together with the perspective of further development. The beginning and initial expansion of the use of Internet in medicine are described. The World Wide Web (WWW or Web) is recognized as a major reason for this expansion, reaching a state described as a Web-pandemic. The rapid increase of the number of papers dealing with Internet in medical literature is presented as well as the appearance of several journals dedicated to Internet in medicine. First specialized symposia, among them MEDNET world conferences, are noted. First uses of Internet in medicine comprised databases, discussion groups, electronic newsletters, software archives and online public access catalogues. The appearance of the Web has led to a significant improvement of the Internet use in medicine, which is reflected in an exponential increase in the number of publications. It is noted that Internet allows "to do old things in new ways", but also "to do new things". It has become clear that the information revolution evoked by the internet shall leave a deep trace in medicine, as health information has become accessible to the public and ceased to be in exclusive control of health professionals. New medical fields--telemedicine and cybermedicine--appeared as the result of the development and global expansion of information and communication technologies, with cybermedicine dealing more specifically with the use of Internet. The advantages and disadvantages of cybermedicine are discussed, and major problems related to the quality of health information are highlighted. Several systems for quality criteria of health related Web-sites are described, indicating that Websites have to conform with the quality criteria such as transparency and honesty, accountability, privacy and data protection, currency

  17. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  18. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  19. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  20. Internet Hospitals in China: Cross-Sectional Survey.

    Science.gov (United States)

    Xie, Xiaoxu; Zhou, Weimin; Lin, Lingyan; Fan, Si; Lin, Fen; Wang, Long; Guo, Tongjun; Ma, Chuyang; Zhang, Jingkun; He, Yuan; Chen, Yixin

    2017-07-04

    The Internet hospital, an innovative approach to providing health care, is rapidly developing in China because it has the potential to provide widely accessible outpatient service delivery via Internet technologies. To date, China's Internet hospitals have not been systematically investigated. The aim of this study was to describe the characteristics of China's Internet hospitals, and to assess their health service capacity. We searched Baidu, the popular Chinese search engine, to identify Internet hospitals, using search terms such as "Internet hospital," "web hospital," or "cloud hospital." All Internet hospitals in mainland China were eligible for inclusion if they were officially registered. Our search was carried out until March 31, 2017. We identified 68 Internet hospitals, of which 43 have been put into use and 25 were under construction. Of the 43 established Internet hospitals, 13 (30%) were in the hospital informatization stage, 24 (56%) were in the Web ward stage, and 6 (14%) were in full Internet hospital stage. Patients accessed outpatient service delivery via website (74%, 32/43), app (42%, 18/43), or offline medical consultation facility (37%, 16/43) from the Internet hospital. Furthermore, 25 (58%) of the Internet hospitals asked doctors to deliver health services at a specific Web clinic, whereas 18 (42%) did not. The consulting methods included video chat (60%, 26/43), telephone (19%, 8/43), and graphic message (28%, 12/43); 13 (30%) Internet hospitals cannot be consulted online any more. Only 6 Internet hospitals were included in the coverage of health insurance. The median number of doctors available online was zero (interquartile range [IQR] 0 to 5; max 16,492). The median consultation fee per time was ¥20 (approximately US $2.90, IQR ¥0 to ¥200). Internet hospitals provide convenient outpatient service delivery. However, many of the Internet hospitals are not yet mature and are faced with various issues such as online doctor scarcity and

  1. Do We Really Have an Internet Problem? Statistics, Credibility and Issues Concerning Public Internet Access in Academic Libraries.

    Science.gov (United States)

    Cubbage, Charlotte

    2002-01-01

    Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)

  2. Internet and Democracy: Is the Internet an Important Predictor for Physical Education Teacher Candidates' Attitudes towards Democracy?

    Science.gov (United States)

    Ünlü, Hüseyin

    2017-01-01

    Today, in the digital age, the Internet usage is common among university students. The Internet is also an important platform for actively participating in democracy. This study explores physical education (PE) candidate teachers' attitudes toward the Internet and democracy. It also explores whether the Internet is an important predictor for…

  3. Problematic Internet Use among Turkish University Students: A Multidimensional Investigation Based on Demographics and Internet Activities

    Science.gov (United States)

    Tekinarslan, Erkan; Gurer, Melih Derya

    2011-01-01

    This study investigated the Turkish undergraduate university students' problematic Internet use (PIU) levels on different dimensions based on demographics (e.g., gender, Internet use by time of day), and Internet activities (e.g., chat, entertainment, social networking, information searching, etc.). Moreover, the study explored some predictors of…

  4. Suicide and Self-Harm Related Internet Use.

    Science.gov (United States)

    Padmanathan, Prianka; Biddle, Lucy; Carroll, Robert; Derges, Jane; Potokar, John; Gunnell, David

    2018-05-31

    The rise in Internet use adds a new dimension to suicide prevention. We investigated suicide/self-harm (S/Sh)-related Internet use among patients presenting to hospital with self-harm. We asked 1,198 adult and 315 child and adolescent patients presenting to hospital following self-harm in a city in South West England about Internet use associated with their hospital presentation. Associations between Internet use and sociodemographic and clinical characteristics were investigated using multivariable logistic regression models. Focus groups with clinicians explored the acceptability and utility of asking about Internet use. The prevalence of S/Sh-related Internet use was 8.4% (95% CI: 6.8-10.1%) among adult hospital presentations and 26.0% (95% CI = 21.3-31.2%) among children's hospital presentations. In both samples, S/Sh-related Internet use was associated with higher levels of suicidal intent. Mostly, clinicians found it acceptable to ask about Internet use during psychosocial assessments and believed this could inform perceptions of risk and decision-making. It is unclear whether the findings in this study are applicable to the general self-harm patient population because only those who had psychosocial assessments were included. S/Sh-related Internet use is likely to become increasingly relevant as the Internet-native generation matures. Furthermore, Internet use may be a proxy marker for intent.

  5. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  6. An Overview of Internet biosurveillance

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  7. The Impact of Internet Use for Students

    Science.gov (United States)

    Puspita, R. H.; Rohedi, D.

    2018-02-01

    Development of Internet technology increasingly modern and sophisticated not only benefit users but also have an effect that is not good for users, especially among students, from a study of 120 students sampled, Internet usage will become addicted and more likely to ha-case negative and less support in learning activities. This is evident from the results of research using the Internet for social media as much as 82 respondents or 68.33% answered always and 50 respondents or 41.67% answered frequently, use for online gaming activity, response of 120 respondents 65 respondents or 54, 17% answered always utilize the internet for online games, 50 respondents or 41.67% answered frequently use the internet for online games, while utilizing the Internet for watch youtube, 56 respondents or 46.67% answered frequently use the Internet to watch youtube and 62 respondents or 51.67% always use the Internet to watch youtube, answers of 120 respondents 41 respondents or 34.17% answered rarely use the Internet to learn and seek information

  8. Overview of internet development in Russia.

    Science.gov (United States)

    Gronskaya-Palesh, O

    1999-01-01

    Internet use in Russia has been growing steadily. In the last four years the number of Russian Internet users grew from a few hundred thousand to over one million. Russian websites are diverse, and range from educational-informative to purely entertaining. This paper discusses several interesting and controversial Russian websites and possible implications associated with their use. It aims to understand and analyze a typical Internet user in Russia, by answering questions about their interests and demographics. The paper also discusses several other studies that were conducted in Russia on Internet use and looks at the currently available psychological resources on the Russian Internet.

  9. Prevalence of problematic internet use in Slovenia

    OpenAIRE

    Macur, Mirna; Kir?ly, Orsolya; Maraz, Aniko; Nagygy?rgy, Katalin; Demetrovics, Zsolt

    2016-01-01

    Abstract Background Internet use is an integral part of our everyday activities; however, Internet use may become problematic and harmful in a minority of cases. The majority of reported prevalence rates of problematic Internet use refer to adolescent samples, whereas epidemiological studies on representative adult populations are lacking. This study aimed to reveal the prevalence and characteristics of problematic Internet use in Slovenia. Methods Problematic Internet Use Questionnaire (PIUQ...

  10. Young children as Internet users

    OpenAIRE

    Daramola, O. (Oladipo)

    2015-01-01

    Abstract In the current available research concerning the real usage of the internet among the young children, most researchers particularly emphases on the risk and opportunities regarding the active use of the internet. Limited experimental research emphases on the role-based and impact of the parent guidelines in the context. In the current studies, internet parenting methods are well-defined and operationalized to study...

  11. Cooperation and community on the internet : past issues and present perspectives for theoretical-empirical internet research

    NARCIS (Netherlands)

    Matzat, U.

    2004-01-01

    This paper first summarizes two central debates in the field of social scientific Internet research, namely the debate about the so-called 'social impact of Internet use' and the debate about the existence of community on the Internet. Early research discussed whether building up a community on the

  12. Internet gaming addiction: current perspectives

    Science.gov (United States)

    Kuss, Daria J

    2013-01-01

    In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual’s context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that

  13. Internet Forums for Suicide Bereavement.

    Science.gov (United States)

    Bailey, Eleanor; Krysinska, Karolina; O'Dea, Bridianne; Robinson, Jo

    2017-11-01

    Bereavement by suicide is associated with a number of consequences including poor mental health outcomes and increased suicide risk. Despite this, the bereaved by suicide may be reluctant to seek help from friends, family, and professionals. Internet forums and social networking sites are a popular avenue of support for the bereaved, but to date there is a lack of research into their use and efficacy. To survey users of suicide bereavement Internet forums and Facebook groups regarding their help-seeking behaviors, use of forums, and perceived benefits and limitations of such use. This study employed a cross-sectional design in which users of suicide bereavement Internet forums and Facebook groups completed an anonymous online survey. Participants were 222 users of suicide bereavement Internet forums. Most participants (93.2%) had sought face-to-face help from sources other than Internet forums, but were more likely to seek help in the near future from informal rather than formal sources. Forums were perceived as highly beneficial and there were few limitations. The generalizability of these results to other internet forums may be limited. Additionally, we were not able to examine differences between forums in terms of quality or user-reported efficacy. Finally, the data reflects the subjective views of forum users, which may differ from the views of moderators or experts. Internet forums, including Facebook groups, appear to be a useful adjunct to face-to-face help-seeking for supporting those who have been bereaved by suicide.

  14. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  15. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  16. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  17. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current

  18. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  19. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. Internet safety education for youth: stakeholder perspectives.

    Science.gov (United States)

    Moreno, Megan A; Egan, Katie G; Bare, Kaitlyn; Young, Henry N; Cox, Elizabeth D

    2013-06-05

    Internet use is nearly ubiquitous among US youth; risks to internet use include cyberbullying, privacy violations and unwanted solicitation. Internet safety education may prevent these negative consequences; however, it is unclear at what age this education should begin and what group is responsible for teaching this topic. Surveys were distributed to key stakeholders in youth safety education including public school teachers, clinicians, parents and adolescents. Surveys assessed age at which internet safety education should begin, as well as experiences teaching and learning internet safety. Surveys of adults assessed willingness to teach internet safety. Finally, participants were asked to identify a group whose primary responsibility it should be to teach internet safety. A total of 356 participants completed the survey (93.4% response rate), including 77 teachers, 111 clinicians, 72 parents and 96 adolescents. Stakeholders felt the optimal mean age to begin teaching internet safety was 7.2 years (SD = 2.5), range 2-15. Internet safety was regularly taught by some teachers (20.8%), few clinicians (2.6%) and many parents (40.3%). The majority of teachers, clinicians and parents were willing to teach internet safety, but all groups surveyed identified parents as having primary responsibility for teaching this topic. Findings suggest agreement among key stakeholders for teaching internet safety at a young age, and for identifying parents as primary teachers of this topic. Clinicians have a unique opportunity to support parents by providing resources, guidance and support.