22 results on '"NACK"'
Search Results
2. NACK and INTEGRATOR act coordinately to activate Notch-mediated transcription in tumorigenesis
- Author
-
Elena Shersher, Mohini Lahiry, Annamil Alvarez-Trotta, Giulia Diluvio, David J. Robbins, Ramin Shiekhattar, and Anthony J. Capobianco
- Subjects
Notch signaling ,NACK ,Integrator ,Esophageal adenocarcinoma ,Tumorigenesis ,Transcriptional activation ,Medicine ,Cytology ,QH573-671 - Abstract
Abstract Background Notch signaling drives many aspects of neoplastic phenotype. Here, we report that the Integrator complex (INT) is a new component of the Notch transcriptional supercomplex. Together with Notch Activation Complex Kinase (NACK), INT activates Notch1 target genes by driving RNA polymerase II (RNAPII)-dependent transcription, leading to tumorigenesis. Methods Size exclusion chromatography and CBF-1/RBPJ/Suppressor of Hairless/Lag-1 (CSL)-DNA affinity fast protein liquid chromatography (FPLC) was used to purify Notch/CSL-dependent complexes for liquid chromatography-tandem mass spectrometry (LC-MS/MS) analysis. Chromatin immunoprecipitation (ChIP) and quantitative polymerase chain reaction (qPCR) were performed to investigate transcriptional regulation of Notch target genes. Transfection of Notch Ternary Complex components into HEK293T cells was used as a recapitulation assay to study Notch-mediated transcriptional mechanisms. Gene knockdown was achieved via RNA interference and the effects of protein depletion on esophageal adenocarcinoma (EAC) proliferation were determined via a colony formation assay and murine xenografts. Western blotting was used to examine expression of INT subunits in EAC cells and evaluate apoptotic proteins upon INT subunit 11 knockdown (INTS11 KD). Gene KD effects were further explored via flow cytometry. Results We identified the INT complex as part of the Notch transcriptional supercomplex. INT, together with NACK, activates Notch-mediated transcription. While NACK is required for the recruitment of RNAPII to a Notch-dependent promoter, the INT complex is essential for RNAPII phosphorylated at serine 5 (RNAPII-S5P), leading to transcriptional activation. Furthermore, INT subunits are overexpressed in EAC cells and INTS11 KD results in G2/M cell cycle arrest, apoptosis, and cell growth arrest in EAC. Conclusions This study identifies the INT complex as a novel co-factor in Notch-mediated transcription that together with NACK activates Notch target genes and leads to cancer cell proliferation. Video abstract
- Published
- 2021
- Full Text
- View/download PDF
3. BER Minimization by User Pairing in Downlink NOMA Using Laser Chaos Decision-Maker.
- Author
-
Sugiyama, Masaki, Li, Aohan, Duan, Zengchao, Naruse, Makoto, and Hasegawa, Mikio
- Subjects
OPTICAL communications ,BIT error rate ,WIRELESS communications ,LASERS ,TELECOMMUNICATION systems - Abstract
In next-generation wireless communication systems, non-orthogonal multiple access (NOMA) has been recognized as essential technology for improving the spectrum efficiency. NOMA allows multiple users transmit data using the same resource block simultaneously with proper user pairing. Most of the pairing schemes, however, require prior information, such as location information of the users, leading to difficulties in realizing prompt user pairing. To realize real-time operations without prior information in NOMA, a bandit algorithm using chaotically oscillating time series, which we refer to as the laser chaos decision-maker, was demonstrated. However, this scheme did not consider the detailed communication processes, e.g., modulation, error correction code, etc. In this study, in order to adapt the laser chaos decision-maker to real communication systems, we propose a user pairing scheme based on acknowledgment (ACK) and negative acknowledgment (NACK) information considering detailed communication channels. Furthermore, based on the insights gained by the analysis of parameter dependencies, we introduce an adaptive pairing method to minimize the bit error rate of the NOMA system under study. The numerical results show that the proposed method achieves superior performances than the traditional using pairing schemes, i.e., Conventional-NOMA pairing scheme (C-NOMA) and Unified Channel Gain Difference pairing scheme (UCGD-NOMA), and ϵ -greedy-based user pairing scheme. As the cell radius of the NOMA system gets smaller, the superior on the BER of our proposed scheme gets bigger. Specifically, our proposed scheme can decrease the BER from 10 − 1 to 10 − 5 compared to the conventional schemes when the cell radius is 400 m. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. NACK and INTEGRATOR act coordinately to activate Notch-mediated transcription in tumorigenesis.
- Author
-
Shersher, Elena, Lahiry, Mohini, Alvarez-Trotta, Annamil, Diluvio, Giulia, Robbins, David J., Shiekhattar, Ramin, and Capobianco, Anthony J.
- Subjects
LIQUID chromatography-mass spectrometry ,NOTCH genes ,RNA polymerase II ,GEL permeation chromatography ,CANCER cell proliferation - Abstract
Background: Notch signaling drives many aspects of neoplastic phenotype. Here, we report that the Integrator complex (INT) is a new component of the Notch transcriptional supercomplex. Together with Notch Activation Complex Kinase (NACK), INT activates Notch1 target genes by driving RNA polymerase II (RNAPII)-dependent transcription, leading to tumorigenesis. Methods: Size exclusion chromatography and CBF-1/RBPJ/Suppressor of Hairless/Lag-1 (CSL)-DNA affinity fast protein liquid chromatography (FPLC) was used to purify Notch/CSL-dependent complexes for liquid chromatography-tandem mass spectrometry (LC-MS/MS) analysis. Chromatin immunoprecipitation (ChIP) and quantitative polymerase chain reaction (qPCR) were performed to investigate transcriptional regulation of Notch target genes. Transfection of Notch Ternary Complex components into HEK293T cells was used as a recapitulation assay to study Notch-mediated transcriptional mechanisms. Gene knockdown was achieved via RNA interference and the effects of protein depletion on esophageal adenocarcinoma (EAC) proliferation were determined via a colony formation assay and murine xenografts. Western blotting was used to examine expression of INT subunits in EAC cells and evaluate apoptotic proteins upon INT subunit 11 knockdown (INTS11 KD). Gene KD effects were further explored via flow cytometry. Results: We identified the INT complex as part of the Notch transcriptional supercomplex. INT, together with NACK, activates Notch-mediated transcription. While NACK is required for the recruitment of RNAPII to a Notch-dependent promoter, the INT complex is essential for RNAPII phosphorylated at serine 5 (RNAPII-S5P), leading to transcriptional activation. Furthermore, INT subunits are overexpressed in EAC cells and INTS11 KD results in G2/M cell cycle arrest, apoptosis, and cell growth arrest in EAC. Conclusions: This study identifies the INT complex as a novel co-factor in Notch-mediated transcription that together with NACK activates Notch target genes and leads to cancer cell proliferation. DmMSvvPJYVoBWTrbTitSG7 Video abstract [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
5. Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks
- Author
-
Gonzalo Olmedo, Román Lara-Cueva, Diego Martínez, and Celso de Almeida
- Subjects
CWDN ,NACK ,Linux kernel ,wireless TCP ,Information technology ,T58.5-58.64 - Abstract
As telecommunication systems evolve towards new-generation architectures, likewise, new protocols are created in order to improve efficiency. One of these protocols is Transmission Control Protocol (TCP), which controls the transmission bit rate in function of network congestion. Nevertheless, in wireless communications, there appear problems such as noise and interference, for which TCP was not designed. Based on these problems, there exist some methods trying to mitigate congestion, such as explicit loss notifications and the use of end-to-end codification. The aim of this work was to propose a wireless TCP protocol improvement, considering a negative acknowledgment (NACK), which allows to differentiate between losses due to congestion and losses due to wireless channel issues. NACK employs a small protocol packet and produces improvement in the quality of service metrics. The experiments were carried out in in-door and out-door environments, over an online video game scenario, and over a long-distance wireless link between two islands. The average results show a 25-percent delay improvement and a 5-percent jitter improvement when compared to the original TCP Reno protocol, while for throughput a 90-percent improvement was achieved for distances between 100 and 414 m.
- Published
- 2020
- Full Text
- View/download PDF
6. Security Enhancements over AODV Using Multi-hop Acknowledgment
- Author
-
Arjun Pant, A. Jeyasekar, and Aditya Saravanan
- Subjects
Grayhole Attack ,TERP ,Multihop Acknowledgement ,NACK ,business.industry ,Computer science ,Ad hoc On-Demand Distance Vector Routing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,AoDV ,Blackhole Attack ,business ,Computer network ,Hop (networking) - Abstract
In most applications of Mobile Ad-hoc Networking and Wireless Sensor networks (WSNs), security and power consumption is a recurring problem which is very difficult to solve due to unpredictable behaviour, environmental changes and mobility of nodes. TERP is a Trust based Energy Routing Protocol that considers the energy conservation and security aspects of WSNs. It is an improved version of AODV and ensures low power consumption while adding a trust based system to the reactive nature of AODV. It also provides the solutions for the most basic attacks like node selfishness, spoofing, misbehaviour and packet sniffing. But black-hole attack, gray-hole attack, Sybil and wormhole attacks are yet to be addressed in the TERP. This paper provides a solution to detect and prevent the node misbehaviour and gray-hole attack. TERP identifies the node misbehaviour using direct and indirect trust recommendations received from neighbour nodes. The detection rate of misbehaving nodes is less during the initial life of the network. Therefore we propose a method that detects the node misbehaviour during the initial life by using a multi-hop acknowledgement system. The simulation results show that the proposed method performs well in detecting the gray-hole and node misbehaviour.
- Published
- 2020
- Full Text
- View/download PDF
7. Performance Analysis and Optimization of TCP Protocol New Algorithm using Dedicated Hardware.
- Author
-
Aguilar Salazar, Darwin, Lara Cueva, Roman, Leon Perez, Rita Paola, and Santos Logrono, Gustavo
- Abstract
This work evaluates the performance of TCP Protocol new algorithm on a wide-area wireless link in order to optimize it and compare the results. To this purpose, is proposed an optimization and QoS solution in order to improve the TCP new algorithm performance. Also a WWAN point to point link was designed and implemented and the optimization solution was configured on it using dedicated hardware. Finally, performance tests using injection of TCP traffic were performed using a real operation environment. Using the obtained results we concluded that the proposed optimization solution improves the performance parameters of the WWAN link using the new algortihm. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
8. DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network.
- Author
-
Abarghouei, Babak, Farokhtala, Ali, and Alizadeh, Mojtaba
- Subjects
DIGITAL signatures ,AD hoc computer networks ,INTRUSION detection systems (Computer security) ,DATA packeting ,CYBERTERRORISM ,ROUTING (Computer network management) - Abstract
Mobile ad-hoc network is an interesting network, which is classified as an autonomous system. These types of networks are constructed based on low capacity wireless links, without having a centralized infrastructure system. Lack of central monitoring system makes it so vulnerable to an insider attack. These attacks consist of two main categories; false data and false route attack. An efficient intrusion detection system (IDS) should have a good understanding about the categories. It can be defined by comparison between (true positive network throughput/false throughput) and the packet delivery ratio. This paper, DNACK is proposed based on Digital Signature and standard method of Negative Acknowledgment, which is a new method of false data detection in case of en-route filtering IDS. DNACK members can detect both kinds of insider attacks, a false data (false data injected and false modified messages) and false route attacks (packet dropping and flooding attack), regards to DNACK characteristic. The false data will be detected based on source digital signature by upcoming member and the routing attacks, will be monitored by the last member. The network efficiency shall be guaranteed by using of DNACK because of the high percentage of Packet delivery and the minimum of false throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
9. NACK and INTEGRATOR act coordinately to activate Notch-mediated transcription in tumorigenesis
- Author
-
Annamil Alvarez-Trotta, Elena Shersher, Mohini Lahiry, David J. Robbins, Anthony J. Capobianco, Giulia Diluvio, and Ramin Shiekhattar
- Subjects
Integrator complex ,Carcinogenesis ,Notch signaling pathway ,RNA polymerase II ,Apoptosis ,Biochemistry ,NACK ,Transcriptional activation ,Transcription (biology) ,Neoplasms ,Endoribonucleases ,Transcriptional regulation ,Humans ,Receptor, Notch1 ,Molecular Biology ,Notch signaling ,Cell Proliferation ,SGK223 ,QH573-671 ,biology ,Chemistry ,RBPJ ,Research ,Integrator ,Cell Biology ,Cell Cycle Checkpoints ,Hairless ,Cell biology ,HEK293 Cells ,Gene Knockdown Techniques ,Immunoglobulin J Recombination Signal Sequence-Binding Protein ,Multiprotein Complexes ,Tumorigenesis ,biology.protein ,Medicine ,RNA Interference ,Esophageal adenocarcinoma ,RNA Polymerase II ,Cytology ,Chromatin immunoprecipitation - Abstract
Background Notch signaling drives many aspects of neoplastic phenotype. Here, we report that the Integrator complex (INT) is a new component of the Notch transcriptional supercomplex. Together with Notch Activation Complex Kinase (NACK), INT activates Notch1 target genes by driving RNA polymerase II (RNAPII)-dependent transcription, leading to tumorigenesis. Methods Size exclusion chromatography and CBF-1/RBPJ/Suppressor of Hairless/Lag-1 (CSL)-DNA affinity fast protein liquid chromatography (FPLC) was used to purify Notch/CSL-dependent complexes for liquid chromatography-tandem mass spectrometry (LC-MS/MS) analysis. Chromatin immunoprecipitation (ChIP) and quantitative polymerase chain reaction (qPCR) were performed to investigate transcriptional regulation of Notch target genes. Transfection of Notch Ternary Complex components into HEK293T cells was used as a recapitulation assay to study Notch-mediated transcriptional mechanisms. Gene knockdown was achieved via RNA interference and the effects of protein depletion on esophageal adenocarcinoma (EAC) proliferation were determined via a colony formation assay and murine xenografts. Western blotting was used to examine expression of INT subunits in EAC cells and evaluate apoptotic proteins upon INT subunit 11 knockdown (INTS11 KD). Gene KD effects were further explored via flow cytometry. Results We identified the INT complex as part of the Notch transcriptional supercomplex. INT, together with NACK, activates Notch-mediated transcription. While NACK is required for the recruitment of RNAPII to a Notch-dependent promoter, the INT complex is essential for RNAPII phosphorylated at serine 5 (RNAPII-S5P), leading to transcriptional activation. Furthermore, INT subunits are overexpressed in EAC cells and INTS11 KD results in G2/M cell cycle arrest, apoptosis, and cell growth arrest in EAC. Conclusions This study identifies the INT complex as a novel co-factor in Notch-mediated transcription that together with NACK activates Notch target genes and leads to cancer cell proliferation.
- Published
- 2021
10. Towards guaranteed delivery of safety messages in VANETs.
- Author
-
Khan, Faisal, Chang, Yusun, Park, SungJin, and Copeland, John
- Abstract
Reliability is a critical concern in disseminating safety messages in vehicular ad-hoc-networks (VANETs). Thus far, redundant broadcast (or next relay broadcast) has been used to ensure reliable transfer of safety messages. However, redundant broadcast fails to meet high-reliability requirement owing to lack of a feedback or acknowledgment (ACK) mechanism. In this work, a power controlled negative-acknowledgment (NACK) mechanism is introduced as a feedback technique to ensure reliable reception of safety messages. Significantly, this work also attempts to cover vehicles present in transmission holes in the broadcast region. Vehicles in the immediate neighborhood detect and recover safety message for a vehicle present in the transmission hole by estimating propagation loss for the vehicle. NACK together with hole detection and recovery mechanism nearly guarantees safety-message delivery in VANETs. Reliability of the proposed technique is formulated mathematically with packet reception ratio (PRR) as the reliability metric. Using theoretical analysis and simulation evaluation in ns-3 we establish that the proposed technique guarantees safety-message reception by mitigating packet loss caused by interference from hidden nodes, and at instances where vehicles are located in the transmission holes. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
11. NACK-based retransmission schemes for MBMS over single frequency network in LTE.
- Author
-
Cheng-Chung Lu, Wen-Ching Chung, Chung-Ju Chang, and Fang-Ching Ren
- Abstract
In this paper, we propose NACK-based retransmission schemes for multimedia broadcast and multicast service over single frequency network (MBSFN) in LTE systems to enhance goodput and reduce retransmission rate. It is known that more retransmissions in MBSFN will reduce the spectrum efficiency. Hence, to provide a reliable broadcast/multicast service in LTE systems is an important issue. We first group mobile users into three sets according to their SNRs. Each set can report NACK messages on dedicated or shared feedback channel. The retransmission is triggered by pre-defined probability or pre-defined threshold. By applying different retransmission trigger schemes on different feedback channels, we have four kinds of NACK-based retransmission schemes. Simulation results show that, the proposed retransmission schemes can enhance the goodput by up to 28.3% and reduce the retransmission rate by up to 37.8% compared to the conditional HARQ scheme [12]. [ABSTRACT FROM PUBLISHER]
- Published
- 2011
- Full Text
- View/download PDF
12. Study of Reliable Data Communication in Wireless Sensor Networks.
- Author
-
Purushotham, B. V., Prakasha, S., and Ganesan, K.
- Subjects
DATA transmission systems ,WIRELESS sensor networks ,RADIO frequency identification systems ,DATA packeting ,COMPUTER software - Abstract
the technology of wireless sensor networks (WSNs) is in the vanguard of the investigation of the computer networks and could be the next technologic market of a huge sum of money. An advance in mote technology is "mesh of network" special software that lets each device wake up during a fraction of a second when events occur and data has to be sent and forwarded to neighbors. Sensor networks are designed to carry out a group of tasks about information processing like detection, search or classification. Applications of these networks have a wide range. An example of such an application is sensors with RFID readers mounted on them to read tag information from the objects in a factory warehouse. Here, the tag information recorded by the RFID reader is a critical piece of information, which may not be available at a later point of time and hence has to be reliably transported to the sink. We study the various issues and analyze the design choices proposed in literature in addressing the challenge of sensors-to-sink reliable data communication in such applications. A cross layer based protocol with MAC layer retransmissions and NACK (Negative Acknowledgment) based rerouting of data packets is developed to overcome link failures and provide reliability. The protocol is implemented on TinyOS and the performance of NACK based rerouting protocol in terms of percentage successful message reception is compared with NACK based retransmission protocol by running simulations on TOSSIM. The NACK based rerouting protocol provides greater reliability under different metrics like varying network size, network traffic and percentage of failed links in the network. [ABSTRACT FROM AUTHOR]
- Published
- 2008
13. BER Minimization by User Pairing in Downlink NOMA Using Laser Chaos Decision-Maker
- Author
-
Masaki Sugiyama, Aohan Li, Zengchao Duan, Makoto Naruse, and Mikio Hasegawa
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,non-orthogonal multiple access (NOMA) ,user pairing ,laser choas decision-maker ,bandit algorithm ,system optimization ,adaptive control ,bit error ,ACK ,NACK ,Electrical and Electronic Engineering - Abstract
In next-generation wireless communication systems, non-orthogonal multiple access (NOMA) has been recognized as essential technology for improving the spectrum efficiency. NOMA allows multiple users transmit data using the same resource block simultaneously with proper user pairing. Most of the pairing schemes, however, require prior information, such as location information of the users, leading to difficulties in realizing prompt user pairing. To realize real-time operations without prior information in NOMA, a bandit algorithm using chaotically oscillating time series, which we refer to as the laser chaos decision-maker, was demonstrated. However, this scheme did not consider the detailed communication processes, e.g., modulation, error correction code, etc. In this study, in order to adapt the laser chaos decision-maker to real communication systems, we propose a user pairing scheme based on acknowledgment (ACK) and negative acknowledgment (NACK) information considering detailed communication channels. Furthermore, based on the insights gained by the analysis of parameter dependencies, we introduce an adaptive pairing method to minimize the bit error rate of the NOMA system under study. The numerical results show that the proposed method achieves superior performances than the traditional using pairing schemes, i.e., Conventional-NOMA pairing scheme (C-NOMA) and Unified Channel Gain Difference pairing scheme (UCGD-NOMA), and ϵ-greedy-based user pairing scheme. As the cell radius of the NOMA system gets smaller, the superior on the BER of our proposed scheme gets bigger. Specifically, our proposed scheme can decrease the BER from 10−1 to 10−5 compared to the conventional schemes when the cell radius is 400 m.
- Published
- 2022
- Full Text
- View/download PDF
14. ERCTP: END-TO-END RELIABLE AND CONGESTION AWARE TRANSPORT LAYER PROTOCOL FOR HETEROGENEOUS WSN.
- Author
-
Sharif, Atif, Potdar, Vidyasagar M., and Rathnayaka, A. J. D.
- Subjects
WIRELESS sensor networks ,HETEROGENEOUS computing ,PROGRAM transformation ,COMPUTER network protocols ,END-to-end delay ,WIRELESS communications - Abstract
Other than hardware optimization, the communication protocols for heterogeneous Wireless Sensor Network (WSN) are currently playing an important role for achieving the longevity of the network. Among other layers of heterogeneous WSN communication protocol stack, researchers are putting efforts in developing transport layer protocols in order to avoid congestion in WSN and provide data or application level reliability support thereby ensuring the QoS objectives of the heterogeneous WSN application. In this paper we have envisaged a light weight transport protocol design, End-to-End Reliable and Congestion Aware Transport Layer Protocol (ERCTP), which achieves high data reliability by the introduction of distributed memory concept within network and minimum packet drop due to congestion by the effective implementation of congestion detection and rate adjustment scheme that uses stochastic control framework. The proposed scheme is evaluated extensively against the TCP-Westwood+ (TCPWW+), TCP-Westwood (TCP-WW), TCPNewReno(TCP-NR), and TCPReno(TCP-R). The ERCTP has been tested for 24 mote topology and results reveal that the ERCTP effectively controls congestion and exhibits highest good throughput of 0.2941 Mbps, ≤100 msec average End-to-End (E-2-E) data packet latency for heterogeneous packet information, > 99% data packet reliability and overall energy efficient behavior (lowest per packet communication cost) in comparison to TCP-WW+, TCP-WW, TCP-NR and TCP-R. [ABSTRACT FROM AUTHOR]
- Published
- 2010
15. Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks.
- Author
-
Olmedo, Gonzalo, Lara-Cueva, Román, Martínez, Diego, and de Almeida, Celso
- Subjects
TCP/IP ,ALGORITHMS ,WIRELESS channels ,VIDEO games ,STREAMING video & television ,WIRELESS communications ,TELECOMMUNICATION systems ,COMPUTER network protocols - Abstract
As telecommunication systems evolve towards new-generation architectures, likewise, new protocols are created in order to improve efficiency. One of these protocols is Transmission Control Protocol (TCP), which controls the transmission bit rate in function of network congestion. Nevertheless, in wireless communications, there appear problems such as noise and interference, for which TCP was not designed. Based on these problems, there exist some methods trying to mitigate congestion, such as explicit loss notifications and the use of end-to-end codification. The aim of this work was to propose a wireless TCP protocol improvement, considering a negative acknowledgment (NACK), which allows to differentiate between losses due to congestion and losses due to wireless channel issues. NACK employs a small protocol packet and produces improvement in the quality of service metrics. The experiments were carried out in in-door and out-door environments, over an online video game scenario, and over a long-distance wireless link between two islands. The average results show a 25-percent delay improvement and a 5-percent jitter improvement when compared to the original TCP Reno protocol, while for throughput a 90-percent improvement was achieved for distances between 100 and 414 m. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
16. A streaming-protocol retransmission scheme without client-server clock synchronization.
- Author
-
Liew, S.C. and Wu, P.C.K.
- Abstract
This letter considers an Internet streaming protocol (SP) for the transport of real time continuous data stream. SP makes use of measured network delay to optimally set retransmission time-outs and scale reliability. The sender streams out packets in a periodic manner, and a NACK is issued by the receiver if it does not receive an expected packet by a certain time. Although it may appear at first glance that the sender's and receiver's clocks must be synchronized, we prove that that the SP would work even if the clocks were not synchronized, a situation not uncommon in the Internet [ABSTRACT FROM PUBLISHER]
- Published
- 1999
- Full Text
- View/download PDF
17. To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
- Author
-
Cesar Ghali, Mauro Conti, Gene Tsudik, and Alberto Compagno
- Subjects
FOS: Computer and information sciences ,Computer science ,Computer security ,computer.software_genre ,Public-key cryptography ,Computer Science - Networking and Internet Architecture ,NACK ,Information-centric networking ,content-centric networking ,information-centric networking ,named-data networking ,negative acknowledgement ,security considerations ,computer networks and communications ,hardware and architecture ,software ,Networking and Internet Architecture (cs.NI) ,business.industry ,Network layer ,Flooding (computer networking) ,The Internet ,business ,Internetworking ,computer ,Computer network ,NAK - Abstract
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture. ICN's most distinguishing feature is its emphasis on information (content) instead of communication endpoints. One important open issue in ICN is whether negative acknowledgments (NACKs) at the network layer are useful for notifying downstream nodes about forwarding failures, or requests for incorrect or non-existent information. In benign settings, NACKs are beneficial for ICN architectures, such as CCNx and NDN, since they flush state in routers and notify consumers. In terms of security, NACKs seem useful as they can help mitigating so-called Interest Flooding attacks. However, as we show in this paper, network-layer NACKs also have some unpleasant security implications. We consider several types of NACKs and discuss their security design requirements and implications. We also demonstrate that providing secure NACKs triggers the threat of producer-bound flooding attacks. Although we discuss some potential countermeasures to these attacks, the main conclusion of this paper is that network-layer NACKs are best avoided, at least for security reasons., 10 pages, 7 figures
- Published
- 2015
18. Artículo Científico - Evaluación del desempeño del protocolo TCP para un enlace inalámbrico de larga distancia INTER-ISLAS en la región insular
- Author
-
Acosta Morales, Andrea Mishel and Sandoval Reyes, Vicente Javier
- Subjects
NACK ,TCP INALÁMBRICO ,REGIÓN INSULAR ,ACK TIME OUT - Abstract
Este estudio cumple con el objeto de evaluar el desempeño del nuevo algoritmo del protocolo TCP para un enlace inalámbrico de larga distancia inter-islas en la Región Insular. En tal virtud, se partió de un estudio de diferentes tecnologías WiLD, WiMAX y equipos propietarios. La simulación del enlace se realizó mediante SIRENET que facilita la planificación y gestión de redes permitiendo trabajar con diferentes tecnologías y que utiliza una cartografía digital con algoritmos de cálculo avanzados para obtener mayor precisión. También se utilizó el software de simulación para equipos propietarios Motorola, PTP LINKPlanner. Los equipos seleccionados fueron Motorola PTP 58600, seleccionados por las características de potencia, umbral de recepción, además de las regulaciones y facilidades tanto para la instalación de equipos, como para la obtención de los permisos necesarios...
- Published
- 2014
19. Hästen med de många namnen : En studie om den nordiska bäckahästens paralleller till andra kulturer samt de äldre inhemska traditionerna
- Author
-
KRU Sundqvist, olika titel_Lundgren, Veronika
- Subjects
Humaniora ,Humanities ,Bäckahäst ,Kelpie ,Philosophy, Ethics and Religion ,Filosofi, etik och religion ,Brook horse ,Näck ,Keltisk historia - Abstract
Bäckahästen är inom nordisk folktro ett vattenväsen i hästgestalt med stor förvandlingsförmåga. Då han visar sig i mänsklig gestalt, kallas han Näcken. Karakteristiska sägner berätta, hur han lockar barn att rida på hans rygg för att sedan störta i vattnet med dem. Likartade föreställningar och sägner om vattenhästar påträffas hos alla indoeuropeiska folk redan i gammal tid. Så visar bland annat den forngrekiska myten om Poseidon, som visar ett tydlig släktskap med våra bäckahästsägner, och den forniriska traditionen. Bäckahästen har många släktingar runt om i Europa med identiska egenskaper och attribut. Vattenväsen som den keltiska Kelpie, Tyska Nixe och isländska Nykurinn är bara några få av dessa väsen som har en slående likhet med den nordiska bäckahästen. Genom att gå tillbaka till de gamla skrifterna som Havamal, Landnamabok och Vatzdoela saga kan man se hur bäckahästtraditionen har utvecklats genom årens lopp till vad den är idag. Våra äldre inhemska traditioner har legat som en mall för bäckahästsägnen, enligt min personliga åsikt, och man kan se många paralleller till andra länders folklore. Tack vare kelternas framfart genom Europa har de fört med sig kulturella strukturer, som i sin tur har lämnat avtryck hos de länder de bebott. Och tack vare de nordiska vikingatågen har vi i norden kommit i kontakt med dessa kulturella strukturer.
- Published
- 2012
20. Nanotechnology and economic resiliency.
- Author
-
Fonash, Stephen J.
- Subjects
NANOTECHNOLOGY ,OCCUPATIONAL mobility ,LABOR supply ,MICROFABRICATION ,TECHNICAL education ,TECHNICAL institutes ,MANUFACTURING processes ,ECONOMICS - Abstract
Abstract: Today a country''s economic viability and its citizens’ job mobility require that its workforce have a strong micro- and nanotechnology education providing a skill set covering synthesis, fabrication, and characterization. An international model is offered for creating such a skilled workforce which is based on a resource sharing approach between research universities and technical colleges. For the good of a country and its citizens, workers must have the educational background that allows them to move from job to job as sectors wax and wane. This broad twenty-first century education that is proposed provides the infrastructure that is needed to accomplish this and to thereby give a country the intellectual capital to be a competitive force on the rapidly changing world manufacturing scene. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
21. The pseudokinases SgK269 and SgK223: A novel oncogenic alliance in human cancer.
- Author
-
O'Rourke RL and Daly RJ
- Subjects
- Carcinogenesis genetics, Carrier Proteins metabolism, Cell Movement genetics, Humans, Intracellular Signaling Peptides and Proteins, Carcinogenesis pathology, Carrier Proteins genetics, Protein-Tyrosine Kinases genetics
- Abstract
Sugen kinases (SgK)269 (also known as PEAK1), and SgK223, an orthologue of rat pragmin and mouse NACK, are human pseudokinases that are implicated in the progression of several cancers. Both are scaffolding proteins that recruit distinct repertoires of signalling proteins and regulate a variety of biological endpoints including cell migration and invasion. To date, SgK269 and SgK223 have been largely studied as separate signalling entities. However, recent work has demonstrated that SgK269 and SgK223 undergo homo- and heterotypic association that determines signal output and biological response. Further characterization of the mechanism of action of these two pseudokinases will provide novel insights into how they promote cancer progression and may reveal novel therapeutic strategies. Here we review their structure, mechanism and function and roles they play in cancer pathogenesis.
- Published
- 2018
- Full Text
- View/download PDF
22. Hybrid ARQ Protocol for Multi-Antenna Multicasting Using a Common Feedback Channel.
- Author
-
Park, Seung Young and Love, David J.
- Subjects
- *
DATA transmission systems , *TELECOMMUNICATION , *WIRELESS communications , *MULTICASTING (Computer networks) , *CODING theory , *ANTENNAS (Electronics) , *FEEDBACK control systems , *SIGNAL-to-noise ratio - Abstract
Wireless multicasting (also called common information broadcasting) is a technique where a common information message is transmitted to multiple users. This is typically accomplished by having the basestation broadcast out a signal representing this message. In this paper, we consider a multicasting scheme where the basestation transmits the multicasting signal without any a-priori knowledge of the users' channel state information. In this set-up, a hybrid automatic repeat request (ARQ) control is employed to improve the reliability of multicasting communication. In most hybrid ARQ set-ups, each user is usually allocated a dedicated feedback channel to tell the basestation if the previously transmitted signal was correctly decoded. However, dedicated feedback channels waste significant uplink resources, especially when the number of users is large. To mitigate this problem, we consider a negative acknowledgement (NACK) based hybrid ARQ control where the failed users are allowed to transmit the NACK signal (which is assumed to be the same for all users) through a common channel while the other users remain silent. We consider the effect of feedback error and multicasting signal decoding error on our hybrid ARQ system performance as the number of users grows large. Specifically, it is shown that the throughput performance of the proposed hybrid ARQ scheme using repetition retransmission is not severely degraded relative to the throughput performance of the noiseless feedback case. In addition, we show that the performance improvement obtained by replacing repetition encoding with incremental redundancy becomes insignificant for the large number of users asymptote. On the other hand, it is shown that the improvement provided by incremental redundancy is significant when some of the users are allowed to fail to decode the message. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.