Repository
Business logic A
A
x
x
y
p
Network Monitoring
Library
Pipeline
h1 h2 h3
Protocol Negotiation
Network Monitoring
Library
Pipeline
h3
h2 h1
Protocol Negotiation
B
h4 h5 h6 h7
h1
h2
h3
h4 h4
Business logic B
Figure 10: Schematic overview of the reference implementation and its use by two applications.
ACKNOWLEDGEMENTS
This project is partially funded by the Austrian Fed-
eral Ministry of Transport, Innovation and Technol-
ogy (BMVIT) under the program ”ICT of the Future”
(https://iktderzukunft.at/en/).
REFERENCES
Atchley, S., Dillow, D., Shipman, G., Geoffray, P., Squyres,
J. M., Bosilca, G., and Minnich, R. (2011). The com-
mon communication interface (cci). In 2011 IEEE
19th Annual Symposium on High Performance Inter-
connects, pages 51–60. IEEE.
Du, J. L., Linecker, S., Dorfinger, P., and Mayr, R. (2019).
Triceps: Self-optimizing communication for cyber-
physical systems. In Proceedings of the 4th Interna-
tional Conference on Internet of Things, Big Data and
Security (IoTBDS 2019), volume 1, pages 241–247.
Ekudden, E., Hagen, R., Johansson, I., and Svedberg, J.
(1999). The adaptive multi-rate speech coder. In
Speech Coding Proceedings, 1999 IEEE Workshop
on, pages 117–119. IEEE.
Friedl, S., Popov, A., Langley, A., and Stephan, E. (2014).
Transport layer security (tls) application-layer proto-
col negotiation extension. RFC 7301, RFC Editor.
Grinnemo, K.-J., Brunstrom, A., Jones, T. H., Fairhurst, G.,
Hurtig, P., and Ros, D. (2016). Neat-a new, evolutive
api and transport-layer architecture for the internet.
Grothoff, C. (2017). The gnunet system. PhD thesis.
G
¨
urgen, L., Munilla, C., Druilhe, R., Gandrille, E., and
Botelho do Nascimento, J. (2016). sensinact iot plat-
form as a service. Enablers for Smart Cities, pages
127–147.
Maurer, N. and Wolfthal, M. (2016). Netty in Action. Man-
ning Publications New York.
Minerva, R., Biru, A., and Rotondi, D. (2015). Towards a
definition of the internet of things (iot). IEEE Internet
Initiative, 1:1–86.
Oh, S., Hoogs, A., Perera, A., Cuntoor, N., Chen, C.-C.,
Lee, J. T., Mukherjee, S., Aggarwal, J., Lee, H., Davis,
L., et al. (2011). A large-scale benchmark dataset
for event recognition in surveillance video. In CVPR
2011, pages 3153–3160. IEEE.
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and Schooler, E.
(2002). Session initiation protocol. RFC 3261, RFC
Editor.
Sieber, C., Heegaard, P., Hoßfeld, T., and Kellerer, W.
(2016). Sacrificing efficiency for quality of experi-
ence: Youtube’s redundant traffic behavior. In IFIP
Networking 2016.
Trammell, B. and Kuehlewind, M. (2019). The Wire Image
of a Network Protocol. RFC 8546, RFC Editor.
Xia, F., Yang, L. T., Wang, L., and Vinel, A. (2012). Internet
of things. International Journal of Communication
Systems, 25(9):1101–1102.
Zhang, M., Dong, J., and Chen, M. (2015). Gears: Generic
and extensible architecture for protocols. Draft IETF.
Zhu, X., Pan, R., Ramalho, M., Mena, S., Jones, P., Fu, J.,
and D’Aronco, S. (2013). Nada: A unified congestion
control scheme for real-time media. Draft IETF.
ICINCO 2020 - 17th International Conference on Informatics in Control, Automation and Robotics
780