
As mentioned earlier, every application has its 
own characteristics and requirements for ADCS. 
Therefore more application specific studies must be 
made with each area of intended use in mind. In 
supply chain management the supply chain must be 
accurately studied, because even supply chains for 
different products may have very different needs. In 
AMR systems the metering environment and needs 
must be strictly surveyed to achieve an optimal 
outcome. Therefore this study will be continued with 
a more accurate definition of the supply chain in the 
paper reel industry and implementation of an RFID-
based ADCS in the paper industry environment. 
Also the security issues such as user authentication 
methods will be studied more deeply to determine 
the procedure options and requirements for adding 
new parts and partners to ADCS. 
REFERENCES 
Allman, M., et. al. (1999).  IETF Standards Track, RFC 
2581, “TCP Congestion Control”. 
<http://www.ietf.org/rfc/rfc2581.txt>.  The Internet 
Engineering Task Force. Accessed 7 Aug. 2007. 
Bodrozic, L., Stipanicev, D., Stula, M. (2006). “Agent 
based data collecting in forest fire monitoring system”. 
International Conference on Software in 
Telecommunications and Computer Networks, 2006. 
SoftCOM 2006. Sept. 29 – Oct. 1 2006. IEEE. 
Page(s): 326 – 330. 
Jie, W., Hung, T., Turner, S. J., Cai, W. (2006). 
“Architecture Model for Information Service in Large 
Scale Grid Environments”. Proceedings of the Sixth 
IEEE International Symposium, on Cluster Computing 
and the Grid 2006. CCGRID ’06. Volume 1, 16-19 
May 2006, IEEE. Pages: 107-114. 
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D. 
(2002).  “SPINS: Security Protocols for Sensor 
Networks”. Wireless Networks Journal, Volume 8, 
Issue 5 (Sept. 2002). Pages: 521-534. Springer 
Netherlands. 
Sikkilä, H., Soini, M., Oksa, P., Sydänheimo, L., 
Kivikoski, M. (2006). ”KILAVI Wireless 
Communication Protocol for the Building 
Environment – Security Issues”. IEEE Tenth 
International Symposium on Consumer Electronics, 
2006. ISCE ’06. IEEE. 
Soini, M., Sikkilä, H., Oksa, P., Sydänheimo, L., 
Kivikoski, M. (2006). ”KILAVI Wireless 
Communication Protocol for the Building 
Environment – Networking Issues”. IEEE Tenth 
International Symposium on Consumer Electronics, 
2006. ISCE ’06. IEEE. 
Transmission Control Protocol (1981). IETF Standards 
Track, RFC 793. “Transmission Control Protocol”. 
<http://tools.ietf.org/rfc/rfc793.txt>. The Internet 
Engineering Task Force, September 1981. Accessed 
20 Aug. 2007. 
Wang, K., Su, R., Li, Z., Cai, Z., Zhou, L. (2005). “Study 
of Secure Complicated Information System 
Architecture Model”. Proceedings of the First IEEE 
International Conference on Semantics, Knowledge 
and Grid, 2005. SKG’05. IEEE, Nov 2005. Page(s): 
101-101.  
Wang, S. Y., Chou, C. L., Huang, C. H., Hwang, C. C., 
Yang, Z. M., Chiou, C. C., Lin, C. C. (2003). “The 
Design and Implementation of the NCTUns 1.0 
Network Simulator”. Computer Networks, Vol. 42, 
Issue 2, June 2003, Page(s): 175-197 
Wikipedia, The Free Encyclopedia (Updated 24.7.2007). 
“TCP Congestion Avoidance Algorithm”. [Online], 
Available: 
http://en.wikipedia.org/wiki/TCP_congestion_avoidan
ce_algorithm. Accessed 13 Aug. 2007. 
Yu, L., Wang, N., Meng, X. (2005). “Real-time Forest 
Fire Detection with Wireless Sensor Networks”. 
Proceedings on IEEE International Conference on 
Wireless Communication, Networking and Mobile 
Computing, 2005. IEEE, Volume 2, 23-26 Sept. 2005 
Page(s): 1214 – 1217. 
COMPARISON OF DIFFERENT INFORMATION FLOW ARCHITECTURES IN AUTOMATED DATA
COLLECTION SYSTEMS
61