To see the other types of publications on this topic, follow the link: Data Transmission Standards And Protocols.

Journal articles on the topic 'Data Transmission Standards And Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data Transmission Standards And Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhao, Ding Yuan, and Hong Yang. "Data Acquisition and Transmission in Tracking Control System." Advanced Materials Research 433-440 (January 2012): 7079–82. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.7079.

Full text
Abstract:
In tracking control system, control precision is influenced by the generation of control signals and precision of control is affected by data acquisition. Signals are easily interfered by environment after data acquisition.Therefore transmission standards and communication protocols are crucial links.Related links of this system was analyzed and discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Gavrilov, Andrei, Marlen Bergaliyev, Sergey Tinyakov, Kirill Krinkin, and Pavel Popov. "Using IoT Protocols in Real-Time Systems: Protocol Analysis and Evaluation of Data Transmission Characteristics." Journal of Computer Networks and Communications 2022 (August 16, 2022): 1–18. http://dx.doi.org/10.1155/2022/7368691.

Full text
Abstract:
In the Internet of things, many data transfer protocols are used for various tasks. In this article, we consider the application layer protocols that are the main ones for transmitting messages in the IoT. The main problems are unpredictability, lack of stability of data transmission delays, and non-determinism, which are also important for real-time systems. The purpose of this study is to determine the most appropriate middleware and data transfer protocol for systems with high data transfer requirements, including real-time systems. Therefore, MQTT, RTPS, JMS, and AMQP protocols were analyzed in order to find out what tasks these protocols should be used for and whether they can be used in robotic and autonomous systems where high data transmission requirements are imposed. To evaluate the protocols, the standards were analyzed to determine the pros and cons, and the software implementations of each of them were selected. To assess the characteristics of data transmission, we have developed our own test scenarios that simulate complex situations. The behavior of software solutions is analyzed and a comparative analysis is made based on the obtained data. Together, the theoretical analysis of protocols and the study of software solutions allow us to conclude on the applicability of a particular protocol in real-time systems. As a result of the study, we can conclude that RTPS is the best solution for real-time systems with different traffic and MQTT performs well when transmitting short messages. But none of the protocols under consideration guarantees the determinism of data transmission, so it is better to use specialized link-layer protocols to obtain guarantees.
APA, Harvard, Vancouver, ISO, and other styles
3

Likhttsinder, Boris Y., and Yulia O. Bakai. "Wireless sensor network technologies." Vestnik of Samara State Technical University. Technical Sciences Series 29, no. 1 (April 23, 2021): 92–103. http://dx.doi.org/10.14498/tech.2021.1.7.

Full text
Abstract:
The content of this paper is determined by the relevance of wireless sensor network standards. The paper discusses the diversity of wireless networks. Personal wireless network standards are presented. In particular, a detailed analysis of GPRS technology is presented. Various data transmission protocols are presented. Data transmission speeds are briefly reviewed. The evolution of Bluetooth standards is presented. Data transmission rates are described. Standards for Bluetooth technology are discussed in detail, an overview of the advantages and disadvantages of these standards is given, and the variety of applications for wireless sensor networks is presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Funk, G. "Standard data transmission protocols in process control applications." European Transactions on Electrical Power 2, no. 5 (September 7, 2007): 295–302. http://dx.doi.org/10.1002/etep.4450020506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Seungmin, and JeongGil Ko. "IB-MAC: Transmission Latency-Aware MAC for Electro-Magnetic Intra-Body Communications." Sensors 19, no. 2 (January 16, 2019): 341. http://dx.doi.org/10.3390/s19020341.

Full text
Abstract:
Intra-body Communication (IBC) is a communication method using the human body as a communication medium, in which body-attached devices exchange electro-magnetic (EM) wave signals with each other. The fact that our human body consists of water and electrolytes allows such communication methods to be possible. Such a communication technology can be used to design novel body area networks that are secure and resilient towards external radio interference. While being an attractive technology for enabling new applications for human body-centered ubiquitous applications, network protocols for IBC systems is yet under-explored. The IEEE 802.15.6 standards present physical and medium access control (MAC) layer protocols for IBC, but, due to many simplifications, we find that its MAC protocol is limited in providing an environment to enable high data rate applications. This work, based on empirical EM wave propagation measurements made for the human body communication channel, presents IB-MAC, a centralized Time-division multiple access (TDMA) protocol that takes in consideration the transmission latency the body channel induces. Our results, in which we use an event-based simulator to compare the performance of IB-MAC with two different IEEE 802.15.6 standard-compliant MAC protocols and a state-of-the art TDMA-based MAC protocol for IBC, suggest that IB-MAC is suitable for supporting high data rate applications with comparable radio duty cycle and latency performance.
APA, Harvard, Vancouver, ISO, and other styles
6

Bakhtiar, Handar Subhandi. "MEDICOLEGAL SERVICE PROCEDURE (VISUM ET REPERTUM) DURING THE COVID-19 PANDEMIC." Journal of Medical pharmaceutical and allied sciences 10, no. 5 (September 15, 2021): 3713–17. http://dx.doi.org/10.22270/jmpas.v10i5.1602.

Full text
Abstract:
During the COVID-19 pandemic, the crime rate, especially against the human body, has increased. For the sake of law enforcement, one of the services needed to obtain evidence is medicolegal services (visum et repertum). This study uses a qualitative approach, type of research is descriptive, namely research that describes information data based on facts obtained in the field. This study was conducted at the Bhayangkara Raden Said Sukanto Hospital, Jakarta. This study indicates that medicolegal service procedures have changed during the pandemic to adapt to the implementation of health protocols to prevent the transmission of COVID-19. The procedure emphasizes arrangements related to the implementation of services with strict health protocol standards from both doctors and patients to prevent the transmission of COVID-19. The application of medicolegal services (visum et repertum) from the aspect of service procedures during the pandemic changed procedure. Service procedures continue to follow the procedures before the pandemic through Standard Operating Procedures Number B/46-52/V-VIII/2017/VISUM regarding Standard Operating Procedures, but during the current pandemic, service procedures adjust to the implementation of health protocols to prevent transmission of covid-19 during the pandemic with the issuance of Standard Operating Procedures through letter Number B/01/XI/2020 concerning Medicolegal Examinations in the Era of the Covid-19 Pandemic. The procedure emphasizes arrangements related to the implementation of services with strict health protocol standards from both doctors and patients to prevent the transmission of COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
7

Serheiev-Horchynskyi, Oleksii. "Modern information and telecommunication systems for medical purposes." E3S Web of Conferences 170 (2020): 02008. http://dx.doi.org/10.1051/e3sconf/202017002008.

Full text
Abstract:
The analysis and classification of modern information and telecommunication systems (ITS) for medical purposes were carried out. Historically established areas of application of medical telecommunication systems were distinguished. Classes of communication and data related to modern medical telecommunication systems were analysed. The role of standards and protocols for data transmission in the process of interaction between the hardware and software components of medical ITSs was defined. Standards for transmitting various types of information were listed; the exploration of the standards for telemedicine information transmission was carried out. Various structural-logical schemes of medical ITSs implementation were illustrated; components of the schemes were reviewed. The importance of development and implementation of a unified interaction model for various medical ITS components, that will allow adapting to extreme characteristics of data transmission physical environment, was figured out.
APA, Harvard, Vancouver, ISO, and other styles
8

Goyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.

Full text
Abstract:
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength, Energy Efficiency and Communication Overhead. The comparative study examines the ACDH protocol in relation to three well-established lightweight cryptographic protocols like Lightweight IPSec, BLAKE2, and Simon. We analyze and highlight the differences between these protocols. These protocols function as standards for evaluating the efficiency of ACDH in a practical WSN setting. The evaluation unequivocally showcases the supremacy of the proposed ACDH model across various crucial aspects. ACDH demonstrates exceptional Security Strength, guaranteeing strong resilience against established cryptographic attacks and providing a high degree of data safeguarding. It demonstrates exceptional Energy Efficiency, enabling sensor nodes to preserve energy resources while upholding a high standard of security ACDH reduces Resource Utilization, optimizing the utilization of memory and processing power. The protocol’s Communication Overhead is significantly minimal, guaranteeing the most efficient utilization of restricted bandwidth. The ACDH hybrid model consistently surpasses its counterparts in performance, making it the optimal selection for securing WSNs while adhering to the resource limitations of sensor nodes. The results of our research highlight the capability of ACDH as an innovative solution for developing lightweight cryptographic protocols that can improve the security and efficiency of Wireless Sensor Networks in the growing IoT environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Bintoro, Ketut Bayu Yogha, and David Geraldo. "Evaluating the Performance of ETSI-ITS Multi-Stack Protocols for V2V Communication in VANETs: A Simulation Study." JISA(Jurnal Informatika dan Sains) 7, no. 1 (June 27, 2024): 59–65. http://dx.doi.org/10.31326/jisa.v7i1.2010.

Full text
Abstract:
The research evaluates various multi-stack protocols for Vehicular Ad-hoc Networks (VANETs), focusing on Vehicle-to-Vehicle (V2V) communication scenarios with Emergency Vehicle (EV) simulations. The study uses the ns-3 network and SUMO (Simulation of Urban MObility) traffic simulators to test these protocols in diverse scenarios, including fluctuating data rates and dense network conditions. By implementing the IEEE 802.11p protocol alongside vehicular message dissemination stacks compliant with ETSI (European Telecommunications Standards Institute) ITS (Intelligent Transport Systems) standards, the study performs simulation experiments with varying vehicle counts, ranging from 20 to 35. It employs two distinct data rate configurations while maintaining a constant transmission power of 23 dBm. The results indicate a decline in the average Packet Reception Ratio (PRR) as vehicle density increases, indicating heightened contention and interference. At the same time, there is an observed increase in average latency, contributing to increased message transmission and reception delays. The quantitative analysis demonstrates an inverse relationship between the average PRR and the total vehicle count when the SEND_CAM message is enabled. On the other hand, disabling SEND_CAM maintains a relatively consistent average PRR across scenarios. Additionally, a positive correlation between vehicle count and average latency underlines the impact of network congestion and interference on communication efficacy within VANETs. Despite suboptimal PRR values falling between 41% and 47%, latency performance remains satisfactory, with average latency durations ranging from 0.154 s to 0.187 s. Notably, the SEND_CAM parameter status shows negligible impact on protocol performance, suggesting that network density plays a more pivotal role. Finally, this study offers valuable insights into the trade-offs and challenges of multi-stack protocols in V2V communication within VANETs. Further optimization efforts are recommended to improve packet reception ratios, especially in high-vehicle-density environments, while maintaining acceptable latency levels. These findings contribute to the ongoing efforts to enhance the reliability and efficiency of communication protocols in VANETs, thus advancing the development of intelligent transportation systems. The study's quantitative protocol performance analysis under varying network conditions provides valuable guidance for optimizing V2V communication deployments in VANETs.
APA, Harvard, Vancouver, ISO, and other styles
10

Anh, Doan Huynh Mai. "Mesh Network Based on MQTT Broker for Smart Home and IIoT Factory." ASEAN Journal of Science and Engineering 2, no. 2 (August 19, 2021): 173–80. http://dx.doi.org/10.17509/ajse.v2i2.39080.

Full text
Abstract:
The Industrial Internet of Things (IIoT) provides connection among devices with the ability to monitor and exchange sensor data through the Internet. The need for reliability and high-quality data, as soon as possible that data monitoring able to afford the requirements from the IoT industrial standards. Recently, researchers have created more suitable communication protocols for IIoT devices, of which each has advantages such as XMPP, MQTT, AMQP in which MQTT is most widely used. This study proposes the utilization of MQTT as a communication protocol, which is one of the data communication protocols for IIoT. This work used temperature and humidity sensors, accelerometer sensors, current and voltage sensors because the digital and analog parameters are often needed as parameters of IIoT conditions. Data were scaled in real-time and stored in MySQL database. This study is also completed by mesh networks to deliver data from source to destination efficiently, these nodes using MQTT-based publish and subscribe. The result of this work demonstrates the transmission of data quality and reliability using MQTT protocol and the efficient power saving in mesh networks.
APA, Harvard, Vancouver, ISO, and other styles
11

Abdullah, Israa, and Wrya Monnet. "Emulation Framework for Haptic Data Transmission Using Real-Time Transport Protocol." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 07 (June 13, 2023): 142–59. http://dx.doi.org/10.3991/ijoe.v19i07.39187.

Full text
Abstract:
The Tactile Internet (TI) can be regarded as the next evolution in the world of communication. With its envisioned purpose and potential in shaping up the economy, industry and society, this paradigm aims to bring a new dimension to life by enabling humans to interact with machines remotely and in real-time with haptic and kinesthetic feedback. However, to translate this into reality, Tactile Internet will need to meet the stringent requirements of extremely low latency in conjunction with ultra-high reliability, availability, and security. This poses a challenge on the available communication systems to achieve a round-trip delay within 1 to 10 milliseconds time bound that enables the timely delivery of critical tactile and haptic sensations. This paper aims to evaluate the Real-Time Transport Protocol (RTP) through an emulation framework. It integrates containerization using Linux-based Docker Containers with NS-3 Network Simulator to conceptualize a haptic teleoperation system. The framework is then used to test the protocol’s feasibility for delivering texture haptic data between master and slave domains in accordance with the end-to-end delay requirements specified by IEEE 1918.1 standards. The results have shown that the timely provision of haptic data is achievable by obtaining an average round-trip delay of 17.8493 ms from the emulation experiment. As such, the results satisfy the expected IEEE 1918.1 standards constraints for medium-dynamic environment use cases.
APA, Harvard, Vancouver, ISO, and other styles
12

Kim, Hyeong-Jun, Min-Hee Choi, Mah-Ho Kim, and Suk Lee. "Development of an Ethernet-Based Heuristic Time-Sensitive Networking Scheduling Algorithm for Real-Time In-Vehicle Data Transmission." Electronics 10, no. 2 (January 13, 2021): 157. http://dx.doi.org/10.3390/electronics10020157.

Full text
Abstract:
The rapid development and adaptation of advanced driver assistance systems (ADAS) and autonomous driving increases the burden of in-vehicle networks. In-vehicle networks are now required to provide a fast data rate and bounded delay for real-time operation, while conventional protocols such as controller area networks, local interconnected networks, and FlexRay begin to show limitations. Ethernet-based time-sensitive network (TSN) technology has been proposed as an alternative. TSN is a set of Ethernet standards being developed by the IEEE TSN task group, which aims to satisfy requirements such as real-time operation, stability, and low and bounded latency, and it can be used in automotive, industrial, and aerospace applications. This study introduces several standards for Ethernet traffic scheduling based on TSN technology and proposes a heuristic-based scheduling algorithm for Ethernet scheduling. In addition, three network configurations are simulated using OMNeT++ to show the applicability. The heuristic TSN scheduling algorithm is a straightforward and systematic procedure for practical network designers.
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Yanli, and Jinhui Huang. "A Survey on Time-Sensitive Networking Standards and Applications for Intelligent Driving." Processes 11, no. 7 (July 22, 2023): 2211. http://dx.doi.org/10.3390/pr11072211.

Full text
Abstract:
Stimulated by the increase in user demands and the development of intelligent driving, the automotive industry is pursuing high-bandwidth techniques, low-cost network deployment and deterministic data transmission. Time-sensitive networking (TSN) based on Ethernet provides a possible solution to these targets, which is arousing extensive attention from both academia and industry. We review TSN-related academic research papers published by major academic publishers and analyze research trends in TSN. This paper provides an up-to-date comprehensive survey of TSN-related standards, from the perspective of the physical layer, data link layer, network layer and protocol test. Then we classify intelligent driving products with TSN characteristics. With the consideration of more of the latest specified TSN protocols, we further analyze the minimum complete set of specifications and give the corresponding demo setup for the realization of TSN on automobiles. Open issues to be solved and trends of TSN are identified and analyzed, followed by possible solutions. Therefore, this paper can be an investigating basis and reference of TSN, especially for the TSN on automotive applications.
APA, Harvard, Vancouver, ISO, and other styles
14

Adjardjah, Winfred, Franklin Kummasah, Dawood Mohammed Abdallah, and John Awuah Addor. "Performance Evaluation of VoIP Analysis and Simulation." Journal of Engineering Research and Reports 25, no. 7 (August 21, 2023): 176–91. http://dx.doi.org/10.9734/jerr/2023/v25i7951.

Full text
Abstract:
The use of technology has impacted on communication in so many ways. The advent of voice over internet protocols (VoIP) has made the world a global village where one can reach out to any part of the universe. But a challenge exists as to how to make communication and data transmission faster, the volume of traffic, bandwidth and latency in networks, that has to be transmitted between the sender and the receiver. The overall customer experience can be improved by the use of technology, which also makes it simpler to collect client information. Data packets are addressed and routed by the Internet Protocol (IP). This research aimed at deploying jitter, throughput, network traffic delay and bandwidth (JiTTraB) as a performance metrics to measure voice over internet protocols (VoIP) to measure the Quality of Service (QoS) of networks. This method prioritizes network traffic going through a router and providing acceptable service to most users in a quest to address VoIP concerns. In comparison to an existing university campus network (UCN), JiTTraB has a higher throughput, more data transmission at a given time with a minimal delay of about 0.001 seconds. However, UCN queues data with a high rate of delay before transmission. Data seem to crash considerably on the UCN due to network overload above its throughput margin and growth capacity. Thus, the proposed network design based on JiTTraB outperforms UCN in terms of transmission rate, throughput, bandwidth, delay and jitter. In addition, the JiTTraB communication network enhances QoS by performing better in close-quarters conversations than in far-quarters conversations. With an expansion reserve of 30%, the JiTTraB can handle up to 350 conversations securely while maintaining VoIP QoS standards without degrading the functionality of other network services or applications.
APA, Harvard, Vancouver, ISO, and other styles
15

Cui, Xue-Rong, Juan Li, Hao Zhang, T. Aaron Gulliver, and Chunlei Wu. "Improving Ultra-Wideband Positioning Security Using a Pseudo-Random Turnaround Delay Protocol." Journal of Circuits, Systems and Computers 24, no. 10 (October 25, 2015): 1550149. http://dx.doi.org/10.1142/s0218126615501492.

Full text
Abstract:
Ultra-wideband (UWB) technology is very suitable for indoor wireless localization and ranging. IEEE 802.15.4a is the first physical layer standard specifically developed for wireless ranging and positioning. While malicious devices are not typically present, snoopers, impostors and jammers can exist. The data link and network layers in standards such as Wi-Fi, IEEE 802.15.4 and 802.11 mainly provide authentication and encryption support, but security about ranging or location is rarely considered. Ranging can be achieved using just the preamble and start of frame delimiter (SFD), so in this case malicious devices can easily obtain position information. Therefore, the security of ranging or positioning protocols is very important, which differs from the case with data exchange protocols. To provide secure location services, a protocol is presented which is based on a pseudo-random turnaround delay. In this protocol, devices use different turnaround times so that it is difficult for a snooper to figure out the location of sensor devices in protected areas. At the same time, in the period of Hello frame transmission, together with the authentication mechanism of IEEE 802.15.4, an impostor cannot easily engages its deception attack.
APA, Harvard, Vancouver, ISO, and other styles
16

Mishra, Amitabh, and Dharma P. Agrawal. "Evaluation of Suitability of Current Industrial Standards in Designing Control Applications for Internet of Things Healthcare Sensor Networks." Journal of Sensor and Actuator Networks 8, no. 4 (November 28, 2019): 54. http://dx.doi.org/10.3390/jsan8040054.

Full text
Abstract:
Internet of Things (IoT) holds great promises for industrial, commercial, and consumer applications. While wireless techniques have matured with time and have gained the users’ confidence in relaying data containing qualitative as well as quantitative information, cynicism still exists on trusting them for applications involving control. The wireless protocols and techniques used for industrial control have proved their robustness. In this work we have attempted to test some aspects of feasibility on the use of wireless control involving such protocols for IoT healthcare sensor networks (IoT-HSNs). We conceptualized and simulated a 24-channel IoT-HSN model that includes biosensors as well as bioactuators. Currently, no protocol supporting control in such networks has been standardized. We tried to fit in the widely used WirelessHART (Highway Addressable Remote Transducer) industrial protocol for sensing as well as control in the model to test if it would work for a healthcare sensor network. We probed the performance of the model with respect to network parameters such as channels, bandwidth, Quality of Service (QoS) requirements, payload, transmission delays, and allowable errors. For the parameters considered, the results obtained from the model were encouraging, suggesting that WirelessHART fits the IoT-HSN control requirements according to this initial probe. The findings could provide useful insights for researchers working in the field of control in IoT-HSNs and for designers and manufacturers of IoT-HSN equipment.
APA, Harvard, Vancouver, ISO, and other styles
17

Xia, Zhenchang, Jia Wu, Libing Wu, Yanjiao Chen, Jian Yang, and Philip S. Yu. "A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks." ACM Transactions on Intelligent Systems and Technology 12, no. 4 (June 6, 2021): 1–30. http://dx.doi.org/10.1145/3451984.

Full text
Abstract:
Vehicular ad hoc networks ( VANETs ) and the services they support are an essential part of intelligent transportation. Through physical technologies, applications, protocols, and standards, they help to ensure traffic moves efficiently and vehicles operate safely. This article surveys the current state of play in VANETs development. The summarized and classified include the key technologies critical to the field, the resource-management and safety applications needed for smooth operations, the communications and data transmission protocols that support networking, and the theoretical and environmental constructs underpinning research and development, such as graph neural networks and the Internet of Things. Additionally, we identify and discuss several challenges facing VANETs, including poor safety, poor reliability, non-uniform standards, and low intelligence levels. Finally, we touch on hot technologies and techniques, such as reinforcement learning and 5G communications, to provide an outlook for the future of intelligent transportation systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Andras, Cristina Maria, Gordana Barb, Florin Alexa, and Cornel Balint. "Congestion Analysis of Transport Layer in a Multicell 5G DL Communication System." Sensors 23, no. 13 (July 3, 2023): 6111. http://dx.doi.org/10.3390/s23136111.

Full text
Abstract:
The fifth generation (5G) marks an important advance in mobile network capabilities. When it comes to high data rates, capacity, spectrum efficiency, and availability, 5G mobile broadband goes above and beyond what was previously possible with standard mobile broadband. The construction of 5G networks is still in the planning stages. These 5G networks will create intelligent networked communication environments by connecting people, things, data, applications, and transport networks. Mobile networks have made it possible for customers’ mobile devices (such as smartphones, tablets, laptops, and so on) to connect to the internet. A variety of distinct protocols will be required to take into consideration the various aspects that 5G possess. One of these is the transport protocol, which is intended to deliver extremely high data transfer rates up to 400 Gbps. The transmission control protocol (TCP) is one of the numerous protocols that are necessary for supporting 5G’s many capabilities. Our work focuses on the detection and analysis, on the downlink (DL) side, of the congestion of the transport layer in single- and multicell environments. For the purpose of the analysis, the following metrics were analyzed: physical resource blocks (PRBs), user throughput, cell throughput, cell edge user throughput, and delay. The work emphasizes the activation of the TCP slow-start algorithm using file transfer protocol (FTP) model two according to 3GPP standards.
APA, Harvard, Vancouver, ISO, and other styles
19

Albattah, Waleed, Shabana Habib, Mohammed F. Alsharekh, Muhammad Islam, Saleh Albahli, and Deshinta Arrova Dewi. "An Overview of the Current Challenges, Trends, and Protocols in the Field of Vehicular Communication." Electronics 11, no. 21 (November 2, 2022): 3581. http://dx.doi.org/10.3390/electronics11213581.

Full text
Abstract:
Intelligent transportation systems (ITS) provides a safe and reliable means of transferring data between vehicles. The document describes the transmission systems, protocols, networks, taxonomy, and applications of Intelligent Systems. Detailed analysis of the existing transmission flow systems is required, including classification, standards, coverage, applications, as well as their advantages and disadvantages. The adaptability of transmission networks, such as ad hoc, hybrid, mobile ad hoc networks (MANET), and Vehicular ad hoc networks (VANETs), has a significant advantage. Described protocols for a variety of communication types, including routing techniques, platforms, structures, and the use of information areas as well. The use of intelligent technology can determine reliable, comfortable, safe, and trustworthy vehicular communication. This paper analyzes the current vehicular communication (VC) research flow and their deployments with indicated areas where further development is necessary. This paper examines how emerging technologies in the upcoming markets will enable the development of high-featured VC technologies. The challenges of improving upon existing VC systems in the development of future systems are discussed in this paper, including medium selection, link and service quality, security, channel characteristics, and mobility. The purpose of this study is to identify the need for the development of improved VC technologies, networks, and protocols for a wide range of applications in the future.
APA, Harvard, Vancouver, ISO, and other styles
20

Ahmad Mir, Itfaq, and Anwaar Ahmad Wani. "A Novel Protocol for Data Transmission Between Device-ToDevice Communications In Ieee 802.11 Standards." Oriental journal of computer science and technology 14, no. 010203 (February 28, 2022): 11–16. http://dx.doi.org/10.13005/ojcst14.010203.02.

Full text
Abstract:
Designed for multiple device-to-device clusters (D2DC) multicast communications is proposed in this research which is an efficient resource allocation scheme. To maximize the sum effective throughput the transmit power and the channel are apportioned to D2DC. Given that the nature of administration is rationed for cellular communications at a specific degree. Our examination details a channel assignment conspire utilizing fractional data of gadget areas. For this situation, we acquire the disturbance likelihood and viable throughput of D2DC communications incomparative outline. This process is carried by increasing the cluster size, code words and subcarriers. we proposed the algorithm here is a sensible channel allocation (CA) conspire utilizing partial information of device locations (CA-PIL). Consequently planned methodology can naturally lessen the measure of required framework overhead contrasted and the Channel Allocation (CA) conspire utilizing full information of device locations (CA-FIL).The forthcoming CA-PIL strategy accomplishes the close ideal aggregate Effective Throughput got by CA-FIL when an enormous number of D2D devices work in the clusters.
APA, Harvard, Vancouver, ISO, and other styles
21

PETIJA, Rastislav, František JAKAB, Peter FECIĽAK, and Miroslav MICHALKO. "OPTIMIZATION OF DATA TRANSFER IN THE INTERNET OF THINGS ENVIRONMENT." Acta Electrotechnica et Informatica 21, no. 2 (October 11, 2021): 13–16. http://dx.doi.org/10.15546/aeei-2021-0009.

Full text
Abstract:
This article deals with the implementation and experimental verification of the suitability of the TinyIPFIX protocol for data transmission in the Internet of Things environment. The work was devoted to the creation of three main components, namely TinyIPFIX exporter, collector, and mediator. The implementation of these tools made it possible to extend the possibility of monitoring a common network with an IoT environment. The experiments confirmed the success of the implementation of the protocol based on standards and pointed out the suitability of the implementation of the TinyIPFIX protocol mainly due to its optimized processes, which save up to 72% of bandwidth consumption compared to the IPFIX protocol when transmitting one data unit. Thanks to the modular approach during implementation, it is possible to deploy the protocol in the environment regardless of the transport technology. The created solution can therefore also be used in UAV sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
22

Khairi, Mutaz Hamed Hussien, Sharifah H. S. Ariffin, N. M. Abdul Latiff, and Kamaludin Mohamad Yusof. "Generation and collection of data for normal and conflicting flows in software defined network flow table." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 307. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp307-314.

Full text
Abstract:
<a name="_Hlk31039004"></a><span lang="EN-US">In terms of network simplification and regulation, Software Defined Networking (SDN) is a new form of infrastructure that offers greater adaptability and flexibility. SDN, however, is an invention that is logically centralized. </span><span>In addition, the optimization of the control plane and data plane in SDN has become an area deserving of more attention. The flow in OpenFlow has been one of the essential parameters in the SDN standards, in which every individual flow includes packet matching fields, flow priority, separate counters, instructions for packet forwarding, flow timeouts and a cookie. This research work is conducted in order to produce and collect flows from the OpenFlow switch in two scenarios; in normal flows and when conflict policy rules are enforced in the network. In this article, the throughput is required to review and evaluate the conflict impact on two protocols as a performance metric; the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) that flows via a forwarded plane. During the simulation of the SDN OpenFlow network, the metrics are tested using MININET. The results demonstrate that the existence of SDN conflict rules allows TCP and UDP to have a significant average change in bandwidth that eventually affects the network and operations performance.</span>
APA, Harvard, Vancouver, ISO, and other styles
23

Akbar, Muhammad Sajjad, Hongnian Yu, and Shuang Cang. "Delay, Reliability, and Throughput Based QoS Profile: A MAC Layer Performance Optimization Mechanism for Biomedical Applications in Wireless Body Area Sensor Networks." Journal of Sensors 2016 (2016): 1–17. http://dx.doi.org/10.1155/2016/7170943.

Full text
Abstract:
Recently, increasing demand for remote healthcare monitoring systems poses a specific set of Quality of Services (QoS) requirements to the MAC layer protocols and standards (IEEE 802.15.6, IEEE 802.15.4, etc.) of Wireless Body Area Sensor Networks (WBASNs). They mainly include time bounded services (latency), reliable data transmission, fair channel distribution, and specified data rates. The existing MAC protocols of WBASNs are lack of a specific set of QoS. To address this, the paper proposes a QoS profile named delay, reliability, and throughput (DRT). The QoS values computed through DRT profile provide maximum reliability of data transmission within an acceptable latency and data rates. The DRT is based on the carrier sense multiple access with collision avoidance (CSMA/CA) channel access mechanism and considers IEEE 802.15.4 (low-rate WPAN) and IEEE 802.15.6 (WBASN). Further, a detailed performance analysis of different frequency bands is done which are standardized for WBASNs, that is, 420 MHz, 868 MHz, 2.4 GHz, and so forth. Finally, a series of experiments are conducted to produce statistical results for DRT profile with respect to delay, reliability, and packet delivery ratio (PDR). The calculated results are verified through extensive simulations in the CASTALIA 3.2 framework using the OMNET++ network simulator.
APA, Harvard, Vancouver, ISO, and other styles
24

Atmaka, Ekky Widha, and Adhitya Wisnu Hartoko. "Multicast Radar Data Transmission Using the Tunnel in Tunnel Method and IGMP (Internet Group Management Protocol) Filtering by Utilizing the Internet Network." Indonesian Journal of Interdisciplinary Research in Science and Technology 2, no. 4 (April 26, 2024): 415–36. http://dx.doi.org/10.55927/marcopolo.v2i4.8836.

Full text
Abstract:
This research proposes the implementation of multicast radar data transmission using the tunnel in tunnel method by utilizing the installed IP VPN network. The background of this study is the failure in radar data transmission resulting in a change of service from surveillance to procedural service, as well as the impact of the Covid-19 pandemic on aviation organizations. The purpose of this implementation is to enhance flight safety while achieving cost efficiency for the company. Objectives include changing transmission methods, budget efficiency, improving operational safety, compliance with international standards, and support for the concept of flight information management. Advantages of multicast radar data transmission include centralized IP base, ease of monitoring, and the use of FO converters for surge protection. Implementation is based on aviation regulations, international standards, and partnership contracts. Contingency plans cover network and device failure scenarios. Cost benefit analysis shows significant financial gains from this implementation. It is hoped that this research will make a positive contribution to improving efficiency and operational safety in aviation.
APA, Harvard, Vancouver, ISO, and other styles
25

Adekar, R. H., and A. K. Kureshi. "Performance Analysis of Heterogeneous Systems Ieee 802.11 and Ieee 802.16 Using Spectrum Sharing Mechanism." Advanced Engineering Forum 44 (January 17, 2022): 127–35. http://dx.doi.org/10.4028/www.scientific.net/aef.44.127.

Full text
Abstract:
After the advent of cellular standards for mobile wireless voice telephony and data transfer, IEEE 802.11 and IEEE 802.16 standards evolved for wireless broadband data transfer. The IEEE 802.11 replaced the wired LAN and IEEE 802.16 was to wireless point-to-point provide broadband data transfer. IEEE 802.11 operates in 2.4 GHz and 5 GHz bands whereas IEEE 802.11, which was initially designed to operate on a licensed band, later switched to a 2-11 GHz band. However, both these standards used a 5 GHz unlicensed band for transmission causing the possible overlap of channels. The designed protocols fairly allow the sharing on an ad-hoc basis. IEEE 802.11 operated in distributed coordination mode using Distributed Coordination Function (DCF) and point coordinated mode using a dedicated coordinator node called Point Coordination Function (PCF). However, DCF mode allows spectrum sharing for multiple users. Both standards were not designed for coexistence and thereby they may cause interference to each other, degrading their performance. Mechanisms can be designed at various layers such as MAC or PHY to enable the coexistence with desired QoS. In this paper, a performance analysis of the impact of possible interference between IEEE 802.11 and IEEE 802.16 devices is presented. Therefore, this paper presents the approaches for allowing a reliable operation between IEEE 802.16 and IEEE 802.11 when both are sharing unlicensed spectrum 5GHz. In this paper, we propose advancements to the MAC of IEEE 802.16 Base Station (BS) where IEEE 802.11 frame transmissions are not required by an IEEE 802.16 system. Here, Co-existence between IEEE 802.11 and IEEE 802.16 is permitted without any exchange of data between both standards, and also it provides quality of service for both systems operating at unlicensed spectrum 5GHz.
APA, Harvard, Vancouver, ISO, and other styles
26

Park, Jun-Hong, Hyeong-Su Kim, and Won-Tae Kim. "DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications." Sensors 18, no. 9 (September 12, 2018): 3071. http://dx.doi.org/10.3390/s18093071.

Full text
Abstract:
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices for analyzing IoT data are distributed to the edge networks. The MQTT (Message Queuing Telemetry Transport) protocol, as a data distribution protocol widely adopted in many international IoT standards, is suitable for cloud computing because it uses a centralized broker to effectively collect and transmit data. However, the standard MQTT may suffer from serious traffic congestion problem on the broker, causing long transfer delays if there are massive IoT devices connected to the broker. In addition, the big data exchange between the IoT devices and the broker decreases network capability of the edge networks. The authors in this paper propose a novel MQTT with a multicast mechanism to minimize data transfer delay and network usage for the massive IoT communications. The proposed MQTT reduces data transfer delays by establishing bidirectional SDN (Software Defined Networking) multicast trees between the publishers and the subscribers by means of bypassing the centralized broker. As a result, it can reduce transmission delay by 65% and network usage by 58% compared with the standard MQTT.
APA, Harvard, Vancouver, ISO, and other styles
27

QasMarrogy, Ghassan A., and Areen J. Fadhil. "FANET Drone’s Data Applications, Mobility Models and Wi-Fi IEEE 802.11n Standards for Real and Non-Real Time Traffic." Cihan University-Erbil Scientific Journal 6, no. 2 (August 22, 2022): 76–80. http://dx.doi.org/10.24086/cuesj.v6n2y2022.pp76-80.

Full text
Abstract:
Data traffic is the most important data transmission between users inside every network, these data traffic can be videos, files, voice, pictures, and many more, that divided into two types, real-time and non-real-time traffic. Most real-time traffic data has a low tolerance for the delay during transmission as they need to be fast received between communication devices. In this paper, a comprehensive analysis will be made to evaluate the two types of data transmitted through FANET drones, with different mobility models and two types of IEEE 802.11 2.4 GHz and 5 GHz by using OLSR routing protocol. Metrics such as delay and throughput will be measured. This paper gives an important overview of how real and non-real-time traffic will be handled during data transmission in FANET networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Ling. "Computer Hardware and Network Data Transmission based on Internet of Things Communication Technology." Scalable Computing: Practice and Experience 24, no. 2 (July 30, 2023): 127–37. http://dx.doi.org/10.12694/scpe.v24i2.2146.

Full text
Abstract:
In order to meet the requirements of computer hardware and network data transmission security, a research based on Internet of Things communication technology is proposed. The main content of this research is the research based on the communication technology of the Internet of Things, through the description of the communication protocol of the Internet of Things, the system hardware design and implementation methods are used, and finally the research method based on the communication technology of the Internet of Things is constructed through experiments and analysis. The core technologies of 5G connectivity are being used to construct the IOT. As a result, the IOT might gain momentum. The experimental findings demonstrate that the delays are all within 200 Ms. When the message size is short (within 1KB), the transmission of diverse hardware is average, and the transmission quality standards of QoS1 are fulfilled. The transmission quality standards of QoS1 can match the communication reliability and security needs of the Internet of Things. This article evaluates the performance of data transfers with lengths of 20 byte, 30 byte, 50 byte, and 70 byte, respectively. This paper evaluates the efficiency of Wi-Fi access configuration by sending data packets of varying sizes i.e., 10 bytes, 30 bytes, 50 bytes, and 70 bytes over a distribution network. The results show that, on average, the network takes 0.6692s, 1.3546s, 2.8600s, and 4.7319s to deliver each packet, with success rates of 100% in each case. The system's increased network distribution efficiency is observed from the experimentation. The research based on the Internet of Things communication technology can meet the needs of computer hardware and network data transmission security.
APA, Harvard, Vancouver, ISO, and other styles
29

Peeck, Jonas, and Rolf Ernst. "Improving Worst-case TSN Communication Times of Large Sensor Data Samples by Exploiting Synchronization." ACM Transactions on Embedded Computing Systems 22, no. 5s (September 11, 2023): 1–25. http://dx.doi.org/10.1145/3609120.

Full text
Abstract:
Higher levels of automated driving also require a more sophisticated environmental perception. Therefore, an increasing number of sensors transmit their data samples as frame bursts to other applications for further processing. As a vehicle has to react to its environment in time, such data is subject to safety-critical latency constraints. To keep up with the resulting data rates, there is an ongoing transition to a Time-Sensitive Networking (TSN)-based communication backbone. However, the use of TSN-related industry standards does not match the automotive requirements of large timely sensor data transmission, nor it offers benefits on time-critical transmissions of single control data packets. By using the full data rate of prioritized IEEE 802.1Q Ethernet, giving time guarantees on large data samples is possible, but with strongly degraded results due to data collision. Resolving such collisions with time-aware shaping comes with significant overhead. Hence, rather than optimizing the parameters of the existing protocol, we propose a system design that synchronizes the transmission times of sensor data samples. This limits network protocol complexity and hardware requirements by avoiding tight time synchronization and time-aware shaping. We demonstrate that individual sensor data samples are transmitted without significant interference, exclusively at full Ethernet data rate. We provide a synchronous event model together with a straightforward response time analysis for synchronous multi-frame sample transmissions. The results show that worst-case latencies of such sample communication, in contrast to non-synchronized approaches, are close to their theoretical minimum as well as to simulative results while keeping the overall network utilization high.
APA, Harvard, Vancouver, ISO, and other styles
30

Legkov, K. E. "DEVELOPMENT OF A SIMULATION MODEL OF AN 802.16 WIRELESS BROADBAND ACCESS NETWORK USING NETWORK SIMULATION 2 (NS-2)." H&ES Research 14, no. 6 (2022): 40–52. http://dx.doi.org/10.36724/2409-5419-2021-14-6-40-52.

Full text
Abstract:
Introduction: the paper considers the process of developing a simulation model of wireless broadband access of the 802.16 standard using Network Simulation 2. This approach allows you to quickly build the required network model using the OTcl scripting language without having to delve into the structure of the compiled part of ns-2. If modification or addition of the compiled part is necessary, this can be done by adding (or changing) the C++ code and recompiling the system. The only drawback of this approach is the difficulties in studying the system and debugging programs (models) arising from the use of two languages. The purpose of the study: In the work using the NS-2 simulator, it was necessary to identify the capabilities of various wireless broadband access standards, to conduct both analysis and comparison. Results: In order to realize the purpose of the study, a simulation modeling process was carried out. Based on the experiment, a decrease in packet loss and delay time was revealed when using the 802.16 standard. compared to other wireless broadband access standards. Practical significance: the use of this model in the design of wireless networks makes it possible to increase the efficiency of data transmission. Discussion: As a further study, a detailed consideration of the impact of modern data transmission protocols using a simulation model is required.
APA, Harvard, Vancouver, ISO, and other styles
31

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
32

Agarwal, Arnav, Shannon M. Fernando, Kimia Honarmand, Layla Bakaa, Sonia Brar, David Granton, Dipayan Chaudhuri, et al. "Risk of dispersion or aerosol generation and infection transmission with nasopharyngeal and oropharyngeal swabs for detection of COVID-19: a systematic review." BMJ Open 11, no. 3 (March 2021): e040616. http://dx.doi.org/10.1136/bmjopen-2020-040616.

Full text
Abstract:
ObjectivesSARS-CoV-2-related disease, referred to as COVID-19, has emerged as a global pandemic since December 2019. While there is growing recognition regarding possible airborne transmission, particularly in the setting of aerosol-generating procedures and treatments, whether nasopharyngeal and oropharyngeal swabs for SARS-CoV-2 generate aerosols remains unclear.DesignSystematic review.Data sourcesWe searched Ovid MEDLINE and EMBASE up to 3 November 2020. We also searched the China National Knowledge Infrastructure, Chinese Medical Journal Network, medRxiv and ClinicalTrials.gov up to 29 March 2020.Eligibility criteriaAll comparative and non-comparative studies that evaluated dispersion or aerosolisation of viable airborne organisms, or transmission of infection associated with nasopharyngeal or oropharyngeal swab testing.ResultsOf 7702 citations, only one study was deemed eligible. Using a dedicated sampling room with negative pressure isolation room, personal protective equipment including N95 or higher masks, strict sterilisation protocols, structured training with standardised collection methods and a structured collection and delivery system, a tertiary care hospital proved a 0% healthcare worker infection rate among eight nurses conducting over 11 000 nasopharyngeal swabs. No studies examining transmissibility with other safety protocols, nor any studies quantifying the risk of aerosol generation with nasopharyngeal or oropharyngeal swabs for detection of SARS-CoV-2, were identified.ConclusionsThere is limited to no published data regarding aerosol generation and risk of transmission with nasopharyngeal and oropharyngeal swabs for the detection of SARS-CoV-2. Field experiments to quantify this risk are warranted. Vigilance in adhering to current standards for infection control is suggested.
APA, Harvard, Vancouver, ISO, and other styles
33

Hesham ElBakoury, Martin Reisslein, Akhilesh S. Thyagaturu, Venkatraman Balasubramanian, and Ahmed Nasrallah. "Reconfiguration algorithms for high precision communications in time sensitive networks: Time-aware shaper configuration with IEEE 802.1Qcc." ITU Journal on Future and Evolving Technologies 2, no. 1 (March 15, 2021): 13–34. http://dx.doi.org/10.52953/sivv2522.

Full text
Abstract:
As new networking paradigms emerge for different networking applications, e.g., cyber-physical systems, and different services are handled under a converged data link technology, e.g., Ethernet, certain applications with mission critical traffic cannot coexist on the same physical networking infrastructure using traditional Ethernet packet-switched networking protocols. The IEEE 802.1Q Time Sensitive Networking (TSN) Task Group is developing protocol standards to provide deterministic properties, i.e., eliminates non-deterministic delays, on Ethernet based packet-switched networks. In particular, the IEEE 802.1Qcc, centralized management and control, and the IEEE 802.1Qbv, Time-Aware Shaper (TAS), can be used to manage and control Scheduled Traffic (ST) streams with periodic properties along with Best-Effort (BE) traffic on the same network infrastructure. We investigate the effects of using the IEEE 802.1Qcc management protocol to accurately and precisely configure TAS enabled switches (with transmission windows governed by Gate Control Lists (GCLs) with Gate Control Entries (GCEs)) ensuring ultra-low bounded latency, zero packet loss, and minimal jitter for ST TSN traffic. We examine both a centralized network/distributed user model (hybrid model) and a fully-distributed (decentralized) 802.1Qcc model on a typical industrial control network with the goal of maximizing the number of ST streams.
APA, Harvard, Vancouver, ISO, and other styles
34

Huang, Zhi Yong, Yujie Wang, and Linling Wang. "ISO/IEEE 11073 Treadmill Interoperability Framework and its Test Method: Design and Implementation." JMIR Medical Informatics 8, no. 12 (December 9, 2020): e22000. http://dx.doi.org/10.2196/22000.

Full text
Abstract:
Background Regular physical activity is proven to help prevent and treat noncommunicable diseases such as heart disease, stroke, diabetes, and breast and colon cancer. The exercise data generated by health and fitness devices (eg, treadmill, exercise bike) are very important for health management service providers to develop personalized training programs. However, at present, there is little research on a unified interoperability framework in the health and fitness domain, and there are not many solutions; besides, the privatized treadmill data transmission scheme is not conducive to data integration and analysis. Objective This article will expand the IEEE 11073-PHD standard protocol family, develop standards for health and fitness device (using treadmill as an example) based on the latest version of the 11073-20601 optimized exchange protocol, and design protocol standards compliance testing process and inspection software, which can automatically detect whether the instantiated object of the treadmill meets the standard. Methods The study includes the following steps: (1) Map the data transmitted by the treadmill to the 11073-PHD objects; (2) Construct a programming language structure corresponding to the 11073-PHD application protocol data unit (APDU) to complete the coding and decoding part of the test software; and (3) Transmit the instantiated simulated treadmill data to the gateway test software through transmission control protocol for standard compliance testing. Results According to the characteristics of the treadmill, a data exchange framework conforming to 11073-PHD is constructed, and a corresponding testing framework is developed; a treadmill agent simulation is implemented, and the interoperability test is performed. Through the designed testing process, the corresponding testing software was developed to complete the standard compliance testing of the treadmill. Conclusions The extended research of IEEE 11073-PHD in the field of health and fitness provides a potential new idea for the data transmission framework of sports equipment such as treadmills, which may also provide some help for the development of sports health equipment interoperability standards.
APA, Harvard, Vancouver, ISO, and other styles
35

VAHSCHYSHCHAK, S., A. BOICHUK, T. STYSLO, S. MELNYCHUK, and I. MANULIAK. "BEAM ANTENNA FOR CONTROLLING WIRELESS 5 GHZ DATA TRANSMISSION NETWORKS." Herald of Khmelnytskyi National University 301, no. 5 (October 2021): 119–26. http://dx.doi.org/10.31891/2307-5732-2021-301-5-119-126.

Full text
Abstract:
Recently, there has been an intensive development of wireless data networks in the 2.4 and 5 GHz ranges, or Wi-Fi. The popularity of these networks is mainly due to the transmission of multimedia information. Existing standards and data protocols for these networks ensure their smooth and high-performance operation in «ideal conditions». In fact, in cities and densely populated centers with a significant amount of such equipment as well as lack of backup channels, there is radio frequency interference. These interferences are caused by the impact of one piece of equipment on another when it is impossible to adjust by switching to backup channels. Due to the interference, the data transmission speed is reduced, and in some complex cases, the data transmission is stopped completely. This negative phenomenon especially affects the 5 GHz range, in which the signal range is less than that for the 2 GHz range. To assess the quality of wireless data transmission networks, the following characteristics are monitored: the average emission frequency and the emission bandwidth. When these characteristics go beyond the standard values, there are interferences detected by the radio frequency monitoring bodies. Monitoring is carried out monthly throughout the year by specialized measuring systems, which include spectrum analyzers and antennas. Existing antennas have the following disadvantages: instability of the amplification gain, significant noise radiation, low reliability of pushbutton switches and significant weight. To eliminate these shortcomings, the design of an active antenna with a conical horn, which has the ability to change the parameters of the antenna within the entire range of 5 GHz. The optimal parameters of the horn are calculated as well. To obtain high values of the amplification gain of the horn antenna and maintain them with high stability at temperatures from -20 to +45оС used a signal amplification unit on a high-frequency operational amplifier SZA5044Z with a thermostat on a powerful transistor. Additional stability of the electrical characteristics of the amplifier is provided by double stabilization of the supply voltage. Electronic antenna control increases the reliability of the antenna by using electronic switching instead of push-button. Electronic control also protects the antenna amplifier from overheating, changing the polarity of the battery and electromagnetic interference. Laboratory and field studies of the directional horn antenna showed high stability of its parameters, reliability and ergonomics. Additional stability of the electrical characteristics of the amplifier is provided by double stabilization of the supply voltage. Electronic antenna control increases the reliability of the antenna by using electronic switching instead of push-button one. Electronic control also protects the antenna amplifier from overheating, change of the battery polarity and electromagnetic interference. Laboratory and field studies of the beam horn antenna showed high stability of its parameters, reliability and ergonomics.
APA, Harvard, Vancouver, ISO, and other styles
36

Vorobyov, Oleg V., and Alexey I. Rybakov. "Selection and Application of the Data Transfer Operating Protocol Software Architecture for the Software-Defined Radio." Journal of the Russian Universities. Radioelectronics 22, no. 4 (October 1, 2019): 18–30. http://dx.doi.org/10.32603/1993-8985-2019-22-4-18-30.

Full text
Abstract:
Introduction. The demodulator structure is described and decoding algorithm for signal-code constructions development is presented. The structure and functional description of the developed software (SW), which is designed for the installation of the software-defined radio in the radio stations layout, are presented. The frame structures of the broadcast and half-duplex protocols, modulation/demodulation and subsequent digital signal processing in existing and prospect radio communication systems are considered.Objective. Investigation of modulation/demodulation methods and subsequent digital signal processing along with requirements imposed by them on the network stations equipment and system operation algorithms.Materials and methods. The software for the software-defined radio system layout is developed to demonstrate the reliability and operability of the proposed algorithm and transmission protocol. It can be used to receive and transmit information by using ionospheric reflections. Present design takes into account existing standards and amateur systems such as WinLink and information systems (digital and analog) for the "physical" and "channel" levels.Results. The structure and functional description of the developed software for the software-defined radio system layout are given. The possible realization of the software-defined radio channel for data receiving and transfer by using ionospheric reflections is presented. The results of technical solutions experimental testing are shown. The software can use hardware and software to control the transceiver module, which includes the SunSDR2 transceiver and antenna amplifier.Conclusion. The structure and functional description of the developed software are presented as a result of the software architecture selection and its application investigation. It is concluded that the reliability and operability justification of the proposed algorithm and transmission protocol is relevant in a field of the digital receivers development for communication systems of various purposes. The presented experimental studies data on verification of the proposed algorithm show the feasibility of present solutions on the qualitative utilization of the channel resource by using the described code structure. The present results allow to determine the most appropriate and efficient way of the software development allowing to create a technique that can meet the maximum number of possible assignments of radio access channels.
APA, Harvard, Vancouver, ISO, and other styles
37

Danmanee, Tanapoom, Kulit Na Nakorn, and Kultida Rojviboonchai. "CU-MAC: A Duty-Cycle MAC Protocol for Internet of Things in Wireless Sensor Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 16, no. 2 (April 9, 2018): 30–43. http://dx.doi.org/10.37936/ecti-eec.2018162.171332.

Full text
Abstract:
Nowadays “Internet of Things” or IoT becomes the most popular technology in the Internet system. Types of devices and sensors have been connected as a network of devices and sensors. While a wireless sensor network is a traditional network of sensors that can be considered as a beginning point of IoT systems. Currently, these sensor data are not only exchanged within a local network but also are delivered to other devices in the Internet. Consequently, well-known organizations such as IEEE, IETF, ITU-T and ISO/IET are trying to set standards for wireless sensor devices in IoT systems. The recommended standard utilizes many of internet stack standards such as CoAP, UDP and IP. However, the traditional design of WSNs is to avoid using internet protocol in the system to reduce transmission overhead and power consumption due to resource limitation. Fortunately, the current technology in both hardware and software allow the internet standard to sufficiently operate in a small sensor. In this paper, we propose a MAC protocol named CU-MAC to efficiently support IoT standard that need request-respond communication or bi-direction communication. CU-MAC uses multi-channel communication to perform continuous and bi-directional data transfer at low duty-cycle. It also has a mechanism to overcome the hidden terminal problem. We evaluated the performance of CU-MAC on both simulation and real testbed based on Contiki OS. The result shows that CU-MAC outperforms other existing MAC protocols in term of packet delivery ratio at 98.7% and requires lower duty-cycle than others to operate in the high traffic environment.
APA, Harvard, Vancouver, ISO, and other styles
38

Mathur, Mala, S. B. Vinay Kumar, Rakhi Gupta, and Intekhab Alam. "Line to Ground Faults Protection and Control method in Active Distribution Network using IEC 61850." E3S Web of Conferences 540 (2024): 09007. http://dx.doi.org/10.1051/e3sconf/202454009007.

Full text
Abstract:
Protection and control automation messages transfer between devices and the control center (CC) over IEC 61850 standard protocols in active distribution network (ADN) using Ethernet. Wireless communication network provides real-time monitoring and control of ADN. The proposed novel approach framework presentsline to ground (LG) faults protection and control method utilizing IEC 61850 standards at bay level between intelligent protection devices for fast and reliable protection. Moreover, this bay level peer to peer communication utilizes IEEE 802.11 wireless local area network (WLAN)to reduce the fault protection time and other messages transferring time instead of Ethernet communication by GOOSE multicast communication services. End to end time delay and throughput of data transmission between the coordination nodes are illustrated using NS2 simulation.
APA, Harvard, Vancouver, ISO, and other styles
39

Afifah, Putri Afifah, and Fajar Junaedi Fajar Junaedi. "Digital production management of the pagelaran Ketoprak Mataram program in RRI Yogyakarta during Covid-19 pandemic." COMMICAST 3, no. 2 (July 27, 2022): 168–80. http://dx.doi.org/10.12928/commicast.v3i2.5952.

Full text
Abstract:
This research was motivated by the important role of digital content production management at the Ketoprak Mataram RRI Programa 4 Yogyakarta event and how to implement health protocols during the pandemic. This paper aims to find out how to manage digital content production for the Mataram Ketoprak Show program and the application of health protocols during the production of the RRI Program 4 Yogyakarta Ketoprak Mataram Show program during the pandemic. The method used is a case study method while data collection techniques are carried out by in-depth interviews, observation, documentation, and archival recordings. The results showed that during the production process due to the pandemic, RRI Programa 4 Yogyakarta employees had succeeded in designing new strategies and concepts to continue to hold the Mataram Ketoprak Performance. They use the media in the form of Live Streaming via the YouTube platform @RRIJOGJAOFFICIAL. The production management model that is applied to the intended digital content can go through several stages, namely pre-production, production, and post-production. In addition, good health protocols have also been implemented properly to minimize the spread of COVID-19 virus transmission at all stages carried out during the production process. at the Ketoprak Mataram Program RRI Program 4 Yogyakarta has been implemented and implemented well, as well as the implementation of health protocols according to the standards that have been set during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
40

Suwira, I. Wayan, and Ida Ayu Oka Martini. "MENELISIK KESIAPAN SUMBER DAYA MANUSIA NON KESEHATAN DALAM MENDUKUNG PELAYANAN RUMAH SAKIT DI ERA NEW NORMAL." Jurnal Ilmiah PANNMED (Pharmacist, Analyst, Nurse, Nutrition, Midwivery, Environment, Dentist) 16, no. 2 (August 31, 2021): 331–36. http://dx.doi.org/10.36911/pannmed.v16i2.1121.

Full text
Abstract:
The readiness of Human Resources is an important element of the success of the Hospital organization in providing good health services to Covid-19 patients. Non-Health Workers are competent workers who must be ready to face the Services in the New Era. The purpose of this study is to see how the readiness of non-health human resources in supporting hospital services in the New Era is normal. The type of research used is a case study using a qualitative descriptive research approach with data collection techniques: in-depth interviews and documentation. Data processing in this study uses thematic analysis. The results of the study indicate that socialization or fair information about the Covid-19 disease intensively, carrying out continuous evaluations and ensuring the implementation of the Director's policy regarding the application of health protocols at work and the budgeting policy for the provision of Personal Protective Equipment greatly affect the Readiness of Non-Health Human Resources in supporting services. Hospitals in the New Era are normal. This is in accordance with the technical guidelines for hospital services during the adaptation period of new habits issued by the Indonesian Ministry of Health in 2020 that hospital administrators prepare service management according to national health protocol standards by prioritizing health and safety by preventing and controlling the transmission of COVID-19 so that can provide protection for human resources in hospitals. It is recommended that regularly socialize the application of health protocols on an ongoing basis, carry out monitoring and evaluation in stages.
APA, Harvard, Vancouver, ISO, and other styles
41

Han, Li, Hong Yang, Lan Zhuo, and Chi Zhang. "Research on distributed real-time synchronous motion control based on time-sensitive networking." MATEC Web of Conferences 336 (2021): 04015. http://dx.doi.org/10.1051/matecconf/202133604015.

Full text
Abstract:
As a set of protocol standards defining time sensitive mechanism of Ethernet data transmission, Time sensitive network (TSN) can support transmission of isochronous data and non-periodic data in the same network . Distributed synchronous control plays an important role in large precision manufacturing scene. In this paper, a distributed real-time synchronous motion control scheme of two motors based on TSN is proposed, and the experiment shows that the two motors moving at high speed can still maintain phase synchronization under the scheduling mechanism of IEEE Std 802.1Qbv even if there is a large traffic load in the network.
APA, Harvard, Vancouver, ISO, and other styles
42

Lenin, Dr J., Dr S. Hasan Hussain, P. J. Arul Leena Rose, and Sahana Roshan. "A Survey on Blockchain Technology in Communication Protocols." International Journal of Computational Mathematics and computer Science 01, no. 01 (2024): 1–7. http://dx.doi.org/10.69942/20240101/01.

Full text
Abstract:
Offering decentralized and secure solutions to age-old problems. In the realm of communication protocols,where Blockchain technology has emerged as a disruptive force across various industries, trust, security, and transparency are paramount, blockchain holds immense promise. This paper delves into the integration of blockchain technology into communication protocols, exploring its potential impact, challenges, and future directions. The paper begins by elucidating the fundamental concepts of blockchain technology, emphasizing its decentralized nature,cryptographic security, and immutable ledger. It then delineates the significance of communication protocols in facilitating data exchange, highlighting the need for robust mechanisms to ensure confidentiality, integrity, and authenticity. Subsequently, the paper examines how blockchain technology can augment existing communication protocols by introducing decentralized consensus mechanisms, enhancing data integrity through cryptographic hashing,and fortifying security through encryption techniques. It elucidates how blockchain-enabled communication protocols can mitigate single points of failure, resist tampering, and provide transparent audit trails, thereby fostering trust in communication networks. Furthermore, the paper discusses various applications of blockchain technology in communication protocols, ranging from secure messaging platforms and decentralized social networks to verifiable data transmission and digital identity management. It explores the potential of blockchain to revolutionize peer-to-peer communication, enabling direct interaction without intermediaries while preserving privacy and security. Moreover, the paper addresses the challenges and limitations associated with integrating blockchain into communication protocols,including scalability concerns, latency issues, and regulatory hurdles. It underscores the need for ongoing research and development to overcome these obstacles and realize the full potential of blockchain technology in communication networks. Finally, the paper concludes by envisioning future trends and advancements in blockchain-enabled communication protocols, such as the integration of artificial intelligence for dynamic routing and optimization, the emergence of interoperable blockchain standards for seamless intefgration across diverse networks, and the proliferation of decentralized autonomous communication systems. In summary, this paper provides a comprehensive overview of the integration of blockchain technology into communication protocols, highlighting its transformative potential, challenges,and future prospects. It underscores the importance of continued innovation and collaboration to harness the full benefits of blockchain in shaping the future of communication networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Haitao, Lina Tan, Yang Zhang, Qiwen Gong, Shan Zhang, Yanan Ren, and Tao He. "A Management Specification for Data Sharing Security in the System Construction of Smart Mine." Security and Communication Networks 2023 (June 29, 2023): 1–13. http://dx.doi.org/10.1155/2023/1414530.

Full text
Abstract:
With the development of Internet of Things technology and the informatization of the coal industry, various intelligent applications have emerged in the process of the system construction of the smart mine. During this process, data sharing is essential to the effective use of data resources in the smart mine. In order to improve the protection of coal mine data, this study proposes a set of management specifications for data sharing applied to the system construction of a smart mine to unify security standards in data storage and sharing. It standardizes the processes of data collection, transmission, and storage. We design three subspecifications for these processes, namely, data source specification, data quality specification, and data storage specification. The data source specification specifies the data collection and transmission standards to improve the security and timeliness of data sharing. The data quality specification sets three evaluation criteria of integrity, accuracy, and timeliness according to the characteristics of each business system and data. The system ensures data quality during data sharing by governing and recording the data failing to meet the criteria. The data storage specification specifies the data storage protocol, data label, and data set restrictions. Only authorized platforms and users can share data and make use of data labels to search data efficiently. Finally, we constructed a coal mine data collection and analysis system. It can collect, manage, store, and safely share the real measured data from a certain colliery according to the specifications.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, De Ming, Hai Tao Guo, and Li Zhang. "The Analysis and Realization of PDCP AM Transmission Mode in LTE System." Applied Mechanics and Materials 513-517 (February 2014): 2526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2526.

Full text
Abstract:
According to 3GPP latest standards, we give specific analysis of the AM (confirmed) mode data transmission process and the process of the function in this article, then we focusing on how to design and achieve PDCP(Packet Data Convergence Protocol ) confirmation mode based on the practical application . Including system design, primitive design and memory management, as well as what need to do during the boot. Confirmation mode is truly play its role in the reconstruction process, we elaborate the reconstruction process details of the reconstruction process from the point of view of RRC (Radio Resource Control) global angle and the the PDCP local angle . The program was fully proven to meet the requirements of the LTE system.
APA, Harvard, Vancouver, ISO, and other styles
45

Chernenko, Roman, Olena Riabchun, Maksym Vorokhob, Andriy Anosov, and Valerii Kozachok. "INCREASING THE LEVEL OF SECURITY OF INTERNET THINGS NETWORK SYSTEMS DUE TO ENCRYPTION OF DATA ON DEVICES WITH LIMITED COMPUTER SYSTEMS." Cybersecurity: Education, Science, Technique 3, no. 11 (2021): 124–35. http://dx.doi.org/10.28925/2663-4023.2021.11.124135.

Full text
Abstract:
Because IoT devices work with data that may be confidential or confidential, that data must be protected. Due to the peculiarities of platforms and the implementation of such systems, namely: first, the use of devices with limited computing characteristics, which makes it impossible to use traditional means of information protection and data transmission protocols, and secondly. systems, and provide them with sufficient computing resources due to the impossibility of laying power lines, thirdly, the lack of standards for the implementation of these devices in the existing infrastructure, there are serious threats to the confidentiality, integrity and availability of information. The article considers the model of the IoT system, oneM2M standard presented by the European Institute of Communication Standards. IoT devices are designed with the necessary network connectivity, but often do not provide reliable network security. Network security is a critical factor in the deployment of IoT devices. The situation is complicated by the fact that IoT largely consists of limited devices. A limited device usually has a very limited cycle of power, memory, and processing. IoT devices are particularly vulnerable to threats because many of the current IoT devices do not support encryption. Several known encryption algorithms were selected for analysis: RSA, Vernam cipher, El Gamal scheme. After analyzing the above algorithms, a prototype of the IoT system was developed using limited devices, which provides absolute cryptographic stability. The prototype consists of a gateway in the role of a Raspberry pi 3 B + microcomputer, a limited Arduino Nano device with a connected sensor and a software implementation of the above-mentioned Vernam cipher with all the tasks.
APA, Harvard, Vancouver, ISO, and other styles
46

QasMarrogy, Ghassan. "Evaluation of Flying Ad Hoc Network Topologies, Mobility Models, and IEEE Standards for Different Video Applications." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 9, no. 1 (May 8, 2021): 77–88. http://dx.doi.org/10.14500/aro.10764.

Full text
Abstract:
Nowadays, drones became very popular with the enhancement of the technological progress of moving devices with a connection to each other, known as Flying Ad Hoc Network (FANET). It is used in most worldwide necessary life scenarios such as video recording, search and rescue, military missions, moving items between different areas, and many more. This leads to the necessity to evaluate different network strategies between these flying drones, which are essential to improve their quality of performance in the field. Several challenges must be addressed to effectively use FANET, to provide stable and reliable transmission for different types of data during vast changing topologies, such as different video sizes, different types of mobility models, recent Wireless Fidelity standards, types of routing protocols used, security problems, and many more. In this paper, a fully comprehensive analysis of FANET will be done to evaluate and enhance these challenges that concern different video types, mobility models, and IEEE 802.11n standards for best performance, by measuring throughput, retransmission attempt, and delay metrics. The result shows that Gauss–Markov mobility model gives the highest result using Ad Hoc On-Demand Vector and lowest delay, whereas for retransmission attempts, 2.4 GHz frequency has the lowest as it can reach more coverage area than 5 GHz.
APA, Harvard, Vancouver, ISO, and other styles
47

Свиридова, И. В., М. В. Хорошайлова, and Д. В. Лялин. "ANALYSIS OF SIGNAL TRANSMISSION ALGORITHMS AND SPEED ADAPTATION IN IEEE 802.11 NETWORKS." ВЕСТНИК ВОРОНЕЖСКОГО ГОСУДАРСТВЕННОГО ТЕХНИЧЕСКОГО УНИВЕРСИТЕТА, no. 1 (March 10, 2023): 69–75. http://dx.doi.org/10.36622/vstu.2023.19.1.011.

Full text
Abstract:
проведен анализ схем с адаптированными скоростями и обобщенными их характеристиками. Устройства разделяются на различные категории в соответствии с их схемным моделированием и функциональными возможностями с точки зрения стратегий, которые используются для оценки состояния канала и принятия решений. Реализованы некоторые алгоритмы из разных категорий в сетевом симуляторе NS-3, чтобы оценить их производительность в различных протоколах и режимах. Представлены данные для будущих исследований, которые помогут улучшить существующие подходы адаптации скорости. Беспроводные технологии используются в различных современных устройствах благодаря простоте их использования и присущей им мобильности. Большинство беспроводных стандартов поддерживает несколько параметров скорости передачи данных, которые могут варьироваться от нескольких Мбит/с до нескольких Гбит/с. Достижение максимальной поддерживаемой скорости передачи данных - это то, к чему стремится большинство современных устройств. Стандарт IEEE 802.11 ввел многоскоростную передачу данных, с тех пор было проведено много исследований по адаптации скорости, рассматриваются различные параметры, которые приводят к оценке качества и правильности работы алгоритма адаптации the article analyzes schemes with adapted speeds and their generalized characteristics. Devices are divided into different categories according to their circuit modeling and functional capabilities in terms of strategies that are used to assess the state of the channel and make decisions. Some algorithms from different categories are implemented in the NS-3 network simulator to evaluate their performance in various protocols and modes. The article presents data for future research that will help improve existing approaches to speed adaptation. Wireless technologies are used in various modern devices due to their ease of use and inherent mobility. Most wireless standards support several data transfer rate parameters that can range from several Mbit/s to several Gbit/s. Achieving the maximum supported data transfer rate is what most modern devices strive for. The IEEE 802.11 standard introduced multi-speed data transmission, since then a lot of research has been conducted on speed adaptation, various parameters are considered that lead to an assessment of the quality and correctness of the adaptation algorithm
APA, Harvard, Vancouver, ISO, and other styles
48

Anirudh Reddy, R., and Dr N.Venkat Ram. "Innovative Data Transmission and Routing Strategies of Wireless Body Area Sensor Networks: Taxonomy, Review, Issues and Constraints of State of the Art Contributions in Recent Literature." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 696. http://dx.doi.org/10.14419/ijet.v7i2.7.10925.

Full text
Abstract:
Wireless body area sensor networks (WBASN) is an effective solution that has proposed in terms of improving the solutions and their varied benefits that have been achieved from the usage of WBASN solutions in communication, healthcare domain. From the review of stats on rising number of wireless devices and solutions that are coming up which is embraced by the people as wearable devices, implants for medical diagnostic solutions, etc. reflect the growing demand for effective models. However, the challenge is about the effective performance of such solutions with optimal efficiency. Due to certain intrinsic factors like numerous standards that are available, and due to the necessity for identifying the best solutions that are based on application requirements. Some of the key issues that have to be considered in the process of WBASN are about the impacts that are taking place from the wireless medium, the lifetime of batteries in the WBASN devices and the other significant condition like the coexistence of the systems among varied other wireless networks that are constituted in the proximity. In this study, scores of models that have propose pertaining to MAC protocols for WBASN solutions have reviewed to understand the efficacy of the existing systems, and a scope for process improvement has explored for conducting in detail research and developing a solution.
APA, Harvard, Vancouver, ISO, and other styles
49

Michalski, Wojciech. "Testing of interworking between network terminals with FSK receivers and public exchanges providing display and related services." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2004): 66–72. http://dx.doi.org/10.26636/jtit.2004.2.238.

Full text
Abstract:
Implementation of new services in the network requires appropriate methods and tools for checking correctness of interworking between terminals and exchanges. In this article the methodology and test procedures prepared for testing terminals handling FSK protocol transmitted over the local loop for display and related services was described. Methodology presented here is based on ETSI standards. Test procedures were developed for services offered in Polish network. Tests cover all levels of FSK protocol. For two lower layers, separate procedures for ``on-hook`` and ``off-hook`` loop states were prepared. The procedure for ``on-hook`` state contains tests related to data transmission ``associated`` and ``not associated with ringing``. These procedures cover normal cases with parameter values and sequence elements complying with standards and exceptional procedures with the extreme values of the parameters and with modified elements of the sequences.
APA, Harvard, Vancouver, ISO, and other styles
50

Boeding, Matthew, Paul Scalise, Michael Hempel, Hamid Sharif, and Juan Lopez. "Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed." Energies 17, no. 2 (January 11, 2024): 373. http://dx.doi.org/10.3390/en17020373.

Full text
Abstract:
Fifth-generation networks promise wide availability of wireless communication with inherent security features. The 5G standards also outline access for different applications requiring low latency, machine-to-machine communication, or mobile broadband. These networks can be advantageous to numerous applications that require widespread and diverse communications. One such application is found in smart grids. Smart grid networks, and Operational Technology (OT) networks in general, utilize a variety of communication protocols for low-latency control, data monitoring, and reporting at every level. Transitioning these network communications from wired Wide Area Networks (WANs) to wireless communication through 5G can provide additional benefits to their security and network configurability. However, introducing these wireless capabilities may also result in a degradation of network latency. In this paper, we propose utilizing 5G for smart grid communications, and we evaluate the latency impacts of encapsulating GOOSE, Modbus, and DNP3 for transmission over a 5G network. The OpenAirInterface open-source library is utilized to deploy an in-lab 5G Core Network and gNB for testing with off-the-shelf User Equipment (UE). This creates an effective 5G test platform for experimenting with different OT protocols such as GOOSE. The results are validated by measuring two different Intelligent Electronic Devices’ contact closure times for each network configuration. These tests are also conducted for varying packet sizes in order to isolate different sources of network latency. Our study outlines the latency impact of communication over 5G for time-critical and non-critical applications regarding their transition toward private 5G-based OT network implementations. The conducted experiments illustrate that in the case of GOOSE packets, simple encapsulation may exceed the protocol’s time-critical nature, and, therefore, additional measures must be taken to ensure a viable transition of GOOSE to 5G services. However, non-critical applications are shown to be viable for migration to 5G.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography