David Cypher's research while affiliated with National Institute of Standards and Technology and other places

Publications (25)

Article
In Proxy Mobile IPv6 (PMIPv6), any involvement by the Mobile Node (MN) is not required, so that any tunneling overhead can be removed from over-the-air. However, during the PMIPv6 handover process, there still exists a period when the MN is unable to send or receive packets because of PMIPv6 protocol operations, suffering from handover latency and...
Conference Paper
To reduce the handover latency in Proxy Mobile IPv6 (PMIP v6), fast handover for PMIPv6 (PFMIPv6) is also being standardized in the IETF. However, in the PFMIPv6 networks, a tunnel is established between the previous Mobile Access Gateway (MAG) and the new MAG only after the previous MAG receives an HAck (Handover Acknowledgement) message from the...
Conference Paper
In Proxy Mobile IPv6 (PMIPv6), any involvement by the Mobile Node (MN) is not required so that any tunneling overhead could be removed from over-the-air. However, during the PMIPv6 handover process, there still exists a service interruption period during which the MN is unable to send or receive data packets because of PMIPv6 protocol operations. T...
Article
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid applications. It describes an approach for translating application requirements to link traffic characteristics, determining the transmission range or coverage area of a wireless technology, and m...
Article
Effective and timely link-layer trigger mechanisms can significantly influence the handover performance. The handover process will not perform the correct decision and execution unless adequate and timely link-layer trigger information is delivered. In this paper, a predictive link trigger mechanism for seamless horizontal and vertical handovers in...
Conference Paper
In most conventional layer 2 triggering approaches, a pre-defined threshold for a specific perspective such as the received signal strength is used so that it may cause too late or too early handover executions. In this paper we propose a new predictive handover framework that uses the neighbor network information to generate timely the link trigge...
Article
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide information about events which can help handover decision and layer 3 entities better streamlin...
Conference Paper
Effective and timely link layer trigger mechanisms can significantly influence the handover performance. In this paper, a predictive link trigger mechanism for seamless horizontal and vertical handovers in heterogeneous wireless networks is proposed. Firstly, the time required to perform a handover is estimated based on the neighboring network cond...
Article
The objectives of this article are to survey the benefits and challenges posed by the deployment and operation of wireless communications in support of healthcare networks. While the main advantage of wireless communications remains to provide ubiquitous connectivity, thus allowing greater physical mobility and interoperability, a number of enginee...
Article
In this article, we discuss what wireless technologies can be used for medical applications and how well they perform in a healthcare/hospital environment. We consider the emerging low-rate Wireless Personal Area Network technology as specified in the Institute of Electrical and Electronics Engineers 802.15.4 standard and evaluate its suitability t...
Conference Paper
In this article we consider the emerging low-rate wireless personal area network (WPAN) technology as specified in the IEEE 802.15.4 standard and evaluate its suitability for medical applications. The main objective for this effort is to develop a universal and interoperable interface for medical equipment . We focus on scalability issues and the n...
Conference Paper
When looking to network devices in the home, one should look at the Bluetooth<sup>TM</sup> wireless technology. The Bluetooth<sup>TM </sup> wireless technology was designed to be a cable replacement, but is being pushed to be much more. The Bluetooth <sup>TM</sup> wireless technology consists of two base documents and numerous others, including at...
Conference Paper
Three potential home networking technologies are examined. The three networking technologies examined are Home Phoneline Networking Alliance (HomePNA) version 2.0, Home Radio Frequency (HomeRF) version 2.0, and the Bluetooth<sup>TM</sup> wireless technology versions 1.0B and 1.1. HomePNA is a wired solution designed to work on current power and pho...
Article
This paper presents an effort to use formal tools to model, validate, and generate test suites for the ATM network routing protocol called Private Network-Network Interface (PNNI). PNNI consists of three layers of protocols: the Hello protocol for identifying the status of NNIs; the Database Synchronization protocol for maintenance of routing datab...
Conference Paper
This paper shows how reliable data services can be provided in an error prone wireless environment using CDMA and a link layer retransmission protocol. A CDMA encoder using Walsh codes for 1.85 to 1.99 GHz PCS applications is simulated under various error conditions with varying packet size to determine minimum acceptable QOS relative to error temp...
Conference Paper
A code division multiple access (CDMA) wireless network is simulated to analyze errors, determine impact on services and provide an upper bound on the number of active channels. The simulation emphasizes the encoder, decoder/correlator, and a threshold detector; but assumes a resultant Gaussian function for the “air interface” noise. Since the char...
Article
The author concentrate on the provision of isochronous services to users via the existing IEEE 802.6 framework using Q.931 as the signalling protocol for providing call control functions. They present possible scenarios of isochronous service provisioning via the IEEE 802.6 network. Real time performance for call setup procedures is simulated and a...
Article
We explore the use of the two current architectures for broadband integrated services digital networks (BISDN) as being defined in IEEE P802.6 (local and metropolitan area network)1 and ANSI-accredited Committee T1's T1S1.5 baseline document.2 The standard currently defines procedures for the median access control (MAC) layer and interfaces for som...
Article
This paper presents the simulation and performance of PNNI ATM networks by using an ATM PNNI Routing Protocol Simulator (APRoPS). This simulator was developed based on the ATM Forum's PNNI routing protocol specification. With this simulator, one can design and test almost any network configuration and evaluate its performance within the constraints...
Article
This paper describes the use of the specification and description language (SDL) as a prototyping tool for a developing low rate wireless personal area network protocol. A simplification of the guidelines for protocol formalization using SDL is used to create a behavioral model. This behavior model is then hand-tested for protocol behavior using so...

Citations

... The objective of the simulation was to determine the time needed for the initial stabilization of a given peer-group, as a function of the number of ATM switches, when a new member is added to the group. The results were obtained using a modified version of APRoPS [10]. The mean input time values per packet use in the simulation were the simulator default values, that is: ...
... All the data traffic of the MN passes through the LMA and a bi-directional tunnel is established between the LMA and the MAG that serves the MN [19]. An advancement of PMIPv6 is the Proxy-Based Fast Mobile IPv6 Protocol (PFMIPv6) by IETF [22], where an additional bidirectional tunnel is established between the previous and new MAG to tunnel packets meant for the MN during handover as shown in Figure 2. There are two modes of operation in PFMIPv6: (a) a predictive mode where the tunnel between the serving and the target MAG is established prior to the MN's attachment to the New MAG, and (b) a reactive mode where tunnel establishment takes place after the MN attaches to the New MAG [23]. ...
... The responsibility of the smart communication system is connectivity and transmission of information between the devices, applications, and systems of the smart grid infrastructure. Considering the different types of network integration, establishing a communication network that comprises the utility, wide area network, distinct field, and local interconnection is still not clear [53]. However, based on the vision of the future smart grid the communication system should at least have the following characteristics: ...
... Several studies have been conducted to determine the impact of various system parameters on the overall WSN/WBSN performance gains. Golmie et al. have studied the performance of IEEE 802.15.4 in the presence of internal and external interference [41]. According to the obtained results, although the end to end delay of high data load (1500 bytes) decreased significantly, the "goodput" dropped dramatically as the number of transmitters became larger. ...
... An ATM network is an implementation of fast packet switching using fixed-length packets, called cells (53 bytes) [1] [4] [13] [16]. ATM network protocols use a layered structure that roughly corresponds to the OSI model's physical layer and a portion of the data link layer. ...
... Among several public domain tools, NS [1] provides a modeling and simulation environment for protocol development with substantial support for simulation of Transmission Control Protocol (TCP), routing, and multicast protocols. National Institute of Standards and Technology (NIST) Asynchronous Transfer Mode (ATM) simulator [2] is particularly suitable for performing research in ATM network. CSIM [3,4] is a flexible and generalpurpose discrete-event simulation language for developing process-oriented simulation models. ...
... As with the existing handover technologies, underwater handover is also broadly categorized into horizontal and vertical handovers [28,29]. However, underwater communication candidates other than acoustic communication (e.g., RF and optical communications) pose challenges in AUV-based networks characterized by relatively high mobility, attributable to severe communication losses and distance constraints. ...
... Kumar and Tyagi (2010), implemented the media-independent handover between WLAN and UMTS using IEEE 802.21 events. Yoo et al. (2008) proposed a handover prediction method by estimating the required time of the VHO in heterogeneous networks. This proposal produces link triggers to finish the VHO before the running link goes down using the neighbouring network information. ...
... The handover network statistics of a single node is analysed to show details captured by the simulator during the handover process. The statistics of the mobile node Consider two base transmission stations BTS1 and BTS2 at a distance D meters; a mobile node moving away from BTS1 towards BTS2 at a certain speed will receive signal levels from the two BTS's according to (13) and (14) ( ) ( ) ( ) ( ) ...
... We advanced and evaluated a multimodal approach to find natural head nods in face-to-face interactions. [20] We superior and evaluated a multimodal method to hit upon natural head nods in face-to-face interactions. Rather than the use of self-evaluations on social media, the new high-end radio with the RFID badge is usually worn as part of the name tag, while on social media. ...