To see the other types of publications on this topic, follow the link: IP (Computer network protocol) Data transmission systems.

Journal articles on the topic 'IP (Computer network protocol) Data transmission systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IP (Computer network protocol) Data transmission systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Weingart, Troy, Douglas C. Sicker, and Dirk Grunwald. "Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/49604.

Full text
Abstract:
The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability). This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP), instant messaging (IM), and file transfer applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Zheng, Yani, Gaurav Dhiman, Ashutosh Sharma, Amit Sharma, and Mohd Asif Shah. "An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor." Security and Communication Networks 2021 (August 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/4229013.

Full text
Abstract:
The usage of wireless sensors has become widespread for the collection of data for various Internet of Things (IoT) products. Specific wireless sensors use optical fiber technology as transmission media and lightwave signals as carriers, showing the advantages of antielectromagnetic interference, high sensitivity, and strong reliability. Hence, their application in IoT systems becomes a research hotspot. In this article, multiple optical fiber sensors are constructed as an IoT detection system, and a Transmission Control Protocol (TCP)/Internet Protocol (IP) communication stack is used for the sensor module. Furthermore, design of gateway module, data server, and monitoring module is established in order to run the data server in the Windows system and communicate across the network segments. Furthermore, the optical fiber sensor is connected to the development board with WiFi, meanwhile considering the optical fiber wireless network’s congestion problem. The fuzzy logic concept is introduced from the perspective of cache occupancy, and a fiber sensor’s network congestion control algorithm is proposed. In the experiment, the IoT detection system with multiple optical fiber sensors is used for water level detection, and the sensor’s real-time data detected by the User Interface (UI) are consistent with the feedback results. The proposed method is also compared with the SenTCP algorithm and the CODA algorithm, and it was observed that the proposed network congestion control algorithm based on the fuzzy logic can improve network throughput and reduce the network data packet loss.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, D. Joseph Sunder, and Mrs L. Padmalatha. "Development of HTTP Server for Remote Data Monitoring and Recording System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 4 (October 10, 2013): 2440–45. http://dx.doi.org/10.24297/ijct.v11i4.3127.

Full text
Abstract:
This paper focuses on development of remote data monitoring and recording system in industries. Now a days we are using many Networked embedded systems for monitoring and control the home or industrial devices.These low cost devices are capable of reporting and receiving information in just the same way that computers on a network. The advent of Internet communication standard, TCP/IP, offers significant potential in terms of remote monitoring and management of construction sites using embedded systems. In this paper the design method of low cost system of remote data monitoring, and recording is designed based on ARM. For this a small HTTP SERVER is built in LPC2148 and it is connected with the remote monitoring terminal through Ethernet. The data can be stored in the SD Card via SPI interface. At the same time, for the sake of the versatility, the FAT file system is built in the SD Card. So, an Ethernet-enabled remote data monitoring system with the ability of data recording is built. This design is having advantage of cost-effective, easily realized, stable and reliable transmission. It can be connected to the INTERNET or LAN through TCP/IP protocol. FreeRTOS is used as an operating system running on ARM processor, an industrial grade RTOS for hard time applications. By this design the data is sent without a PC and system favour’s large scale data acquisition system.
APA, Harvard, Vancouver, ISO, and other styles
5

Danmanee, Tanapoom, Kulit Na Nakorn, and Kultida Rojviboonchai. "CU-MAC: A Duty-Cycle MAC Protocol for Internet of Things in Wireless Sensor Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 16, no. 2 (April 9, 2018): 30–43. http://dx.doi.org/10.37936/ecti-eec.2018162.171332.

Full text
Abstract:
Nowadays “Internet of Things” or IoT becomes the most popular technology in the Internet system. Types of devices and sensors have been connected as a network of devices and sensors. While a wireless sensor network is a traditional network of sensors that can be considered as a beginning point of IoT systems. Currently, these sensor data are not only exchanged within a local network but also are delivered to other devices in the Internet. Consequently, well-known organizations such as IEEE, IETF, ITU-T and ISO/IET are trying to set standards for wireless sensor devices in IoT systems. The recommended standard utilizes many of internet stack standards such as CoAP, UDP and IP. However, the traditional design of WSNs is to avoid using internet protocol in the system to reduce transmission overhead and power consumption due to resource limitation. Fortunately, the current technology in both hardware and software allow the internet standard to sufficiently operate in a small sensor. In this paper, we propose a MAC protocol named CU-MAC to efficiently support IoT standard that need request-respond communication or bi-direction communication. CU-MAC uses multi-channel communication to perform continuous and bi-directional data transfer at low duty-cycle. It also has a mechanism to overcome the hidden terminal problem. We evaluated the performance of CU-MAC on both simulation and real testbed based on Contiki OS. The result shows that CU-MAC outperforms other existing MAC protocols in term of packet delivery ratio at 98.7% and requires lower duty-cycle than others to operate in the high traffic environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Mudassir, Mumajjed Ul, and M. Iram Baig. "MFVL HCCA: A Modified Fast-Vegas-LIA Hybrid Congestion Control Algorithm for MPTCP Traffic Flows in Multihomed Smart Gas IoT Networks." Electronics 10, no. 6 (March 18, 2021): 711. http://dx.doi.org/10.3390/electronics10060711.

Full text
Abstract:
Multihomed smart gas meters are Internet of Things (IoT) devices that transmit information wirelessly to a cloud or remote database via multiple network paths. The information is utilized by the smart gas grid for accurate load forecasting and several other important tasks. With the rapid growth in such smart IoT networks and data rates, reliable transport layer protocols with efficient congestion control algorithms are required. The small Transmission Control Protocol/Internet Protocol (TCP/IP) stacks designed for IoT devices still lack efficient congestion control schemes. Multipath transmission control protocol (MPTCP) based congestion control algorithms are among the recent research topics. Many coupled and uncoupled congestion control algorithms have been proposed by researchers. The default congestion control algorithm for MPTCP is coupled congestion control by using the linked-increases algorithm (LIA). In battery powered smart meters, packet retransmissions consume extra power and low goodput results in poor system performance. In this study, we propose a modified Fast-Vegas-LIA hybrid congestion control algorithm (MFVL HCCA) for MPTCP by considering the requirements of a smart gas grid. Our novel algorithm operates in uncoupled congestion control mode as long as there is no shared bottleneck and switches to coupled congestion control mode otherwise. We have presented the details of our proposed model and compared the simulation results with the default coupled congestion control for MPTCP. Our proposed algorithm in uncoupled mode shows a decrease in packet loss up to 50% and increase in average goodput up to 30%.
APA, Harvard, Vancouver, ISO, and other styles
7

Ermakov, A. V., and L. I. Suchkova. "Development of algorithms of self-organizing network for reliable data exchange between autonomous robots." Dependability 20, no. 2 (June 8, 2020): 35–42. http://dx.doi.org/10.21683/1729-2646-2020-20-2-35-42.

Full text
Abstract:
Factors affecting the reliability of data transmission in networks with nodes with periodic availability were considered. The principles of data transfer between robots are described; the need for global connectivity of communications within an autonomous system is shown, since the non-availability of information on the intentions of other robots reduces the effectiveness of the robotics system as a whole and affects the fault tolerance of a team of independent actors performing distributed activities. It is shown that the existing solutions to the problem of data exchange based on general-purpose IP networks have drawbacks; therefore, as the basis for organizing autonomous robot networks, we used developments in the domain of topological models of communication systems allowing us to build self-organizing computer networks. The requirements for the designed network for reliable message transfer between autonomous robots are listed, the option of organizing reliable message delivery using overlay networks, which expand the functionality of underlying networks, is selected. An overview of existing popular controlled and non-controlled overlay networks is given; their applicability for communication within a team of autonomous robots is evaluated. The features and specifics of data transfer in a team of autonomous robots are listed. The algorithms and architecture of the overlay self-organizing network were described by means of generally accepted methods of constructing decentralized networks with zero configurations. As a result of the work, general principles of operation of the designed network were proposed, the message structure for the delivery algorithm was described; two independent data streams were created, i.e. service and payload; an algorithm for sending messages between network nodes and an algorithm for collecting and synchronizing the global network status were developed. In order to increase the dependability and fault tolerance of the network, it is proposed to store the global network status at each node. The principles of operation of a distributed storage are described. For the purpose of notification on changes in the global status of the network, it is proposed to use an additional data stream for intra-network service messages. A flood routing algorithm was developed to reduce delays and speed up the synchronization of the global status of a network and consistency maintenance. It is proposed to provide network connectivity using the HELLO protocol to establish and maintain adjacency relations between network nodes. The paper provides examples of adding and removing network nodes, examines possible scalability problems of the developed overlay network and methods for solving them. It confirms the criteria and indicators for achieving the effect of self-organization of nodes in the network. The designed network is compared with existing alternatives. For the developed algorithms, examples of latency estimates in message delivery are given. The theoretical limitations of the overlay network in the presence of intentional and unintentional defects are indicated; an example of restoring the network after a failure is set forth.
APA, Harvard, Vancouver, ISO, and other styles
8

Pucher, Krzysztof, and Dariusz Polok. "Analysis of Timings in Networks that Use TCP/IP or UDP/IP Protocols for Communication with Industrial Controllers in Mechatronic Systems." Solid State Phenomena 144 (September 2008): 94–99. http://dx.doi.org/10.4028/www.scientific.net/ssp.144.94.

Full text
Abstract:
In pace with the technical progress in controllability of mechatronic systems including machines and industrial equipment, the systems of industrial controllers (both PLC and microprocessor ones) more and more frequently use Ethernet-based networks for communication with supervising centres and surveillance systems. The Internet offers unsurpassed opportunities of remote programming as well as remote development, debugging and tuning the existing control software. Nowadays, supporting the remote tools and facilities is the essential requirement that is mandatory when decisions on purchase and implementation of industrial controllers are made. It is the underlying reason to launch more extensive research in that field. The presented paper describes dedicated software that has been developed to enable communication over the Internet within dispersed control systems. The system makes it possible to transmit and to receive short messages to and from the controlled actuators as well as to perform basic tasks related to management of data flow in networks that use TCD and UDP protocols. The special attention was paid to dynamic phenomena of the data exchange process. It is an issue of crucial importance within dispersed systems of industrial controllers and it assures efficient operation of the entire system owing to timely and quick respond to fast-changing control signals. Data exchange was carried out with the use of so-called primitives for Berkeley sockets that serve as primary structures within the network and are capable to perform basic operation such as creation and destruction, assigning network addresses to the sockets, establishing connections, transmission (broadcasting), receiving, etc. To measure time intervals of communication sessions the authors took advantage of functional features of contemporary motherboards of PC computers. In particular, the function of the API counter was used as it allows to readout the fast internal 64-bit counter which, in consequence, enabled measurement of time gaps with accuracy up to single microseconds. The described software performs tests of communication facilities in terms of their applicability to fast data exchange between field control modules of the control system and the CPU, whereas the entire communication is performed via Internet. Therefore the reaction time of a hypothetical field controller in respond to switchovers of the input signals or interrupt events can be measured. The communication and measurements were performed over local and national internet networks as well as for GPRS networks. Measurement results are presented in a compact form of tables that is suitable for further analysis. The presented system is able to transmit diagnostic information therefore it can be also used for integrated diagnostics of mechatronic systems as well as for location and analysis of possible failures within the in-field systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, G. Vijay, and Y. Anjani. "Application of Error-resilient Transmission of Sleep Apnea Patient Video with Sound over Mobile Network." International Journal of Emerging Research in Management and Technology 6, no. 11 (June 13, 2018): 81. http://dx.doi.org/10.23956/ijermt.v6i11.50.

Full text
Abstract:
Mobile video-audio transmission systems have delivered patient video with relevant snoring sound to quantify the severity of the sleep apnea patient over wireless networks, but few have optimized video-audio transmission in combination with transmission protocol over error-prone environments using wireless links. In this paper, the performance of the MPEG (Motion Picture Expert Group)-4 error resilient tools with UDP(User Datagram Protocol) protocol were evaluated over a wireless network to suggest the optimum combination of MPEG-4 error resilient tools and UDP packet size suitable for real-time transmission of video-audio transmission over error-prone mobile networks. Through experimentation, it was found that the packet size should correspond to IP(Internet Protocol) datagram size minus UDP and IP header for optimal video-audio quality. Also, for error resilient tool selection, the combination of resynchronization marker and data partitioning showed the best performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Cui-Min, Chun-Ying Li, and Lei Wang. "Reliable data transmission method based on 6LoWPAN for building energy systems." Building Services Engineering Research and Technology 41, no. 5 (November 26, 2019): 623–33. http://dx.doi.org/10.1177/0143624419891521.

Full text
Abstract:
The building energy internet of things is based on radio frequency technology and a wireless sensor network that can collect building energy consumption data in real time. However, with the increasing complexity of wireless sensor network topology, there is a problem of insufficient IP address space relying on IPv4 protocol. In this paper, a design scheme of a building energy system based on 6LoWPAN network is proposed. IPv4/IPv6 address conversion is used to realise the access of IP addresses to each other, so as to monitor building energy consumption information anytime and anywhere. In view of the shortcomings of existing wireless network data transmission methods in low energy consumption and high reliability in building energy monitoring applications, a reliable data transmission method based on multipath routing coding algorithm is proposed. This strategy improves the transmission reliability of the network by increasing the number of redundant packets, and reduces the energy consumption of the network by reducing the number of transmission paths. The simulation results show that the proposed method can effectively improve the success rate of data packet transmission, reduce the standard energy consumption of sensor networks, and provide an effective method for the application of wireless sensor networks in building energy monitoring systems. Practical application: This paper studies how to improve transmission reliability and energy efficiency in cluster-based WSN and proposes a multi-path transmission strategy for selective coding of intermediate cluster head nodes. The strategy improves the transmission reliability of the network by increasing the number of transmissions of redundant packets and reduces the network energy consumption by reducing the number of transmission paths. It has good use value for the actual development and application of the building energy consumption monitoring system.
APA, Harvard, Vancouver, ISO, and other styles
11

Cui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software." Applied Mechanics and Materials 686 (October 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.

Full text
Abstract:
This paper mainly studies the key technologies of network real-time monitoring system based on Client/Server, and implementation of a real-time monitoring system based on CS/ mode. Using the network communication technology, Winsock technology, TCP/IP protocol, image compression and transmission technology, the process of communication technology and object oriented software technology to realize the main frame module, the system include network monitoring data initialization module, data transmission module, image coding and decoding module, its advantage is to make full use of the existing network resources, the highest price, with real-time information control and real-time control as the center, timely delivery and management of information.
APA, Harvard, Vancouver, ISO, and other styles
12

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
13

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Yong, Hong Ni, and Xiaoyong Zhu. "An Effective Transmission Scheme Based on Early Congestion Detection for Information-Centric Network." Electronics 10, no. 18 (September 9, 2021): 2205. http://dx.doi.org/10.3390/electronics10182205.

Full text
Abstract:
As one of the candidates for future network architecture, Information-Centric Networking (ICN) has revolutionized the manner of content retrieval by transforming the communication mode from host-centric to information-centric. Unlike a traditional TCP/IP network, ICN uses a location-independent name to identify content and takes a receiver-driven model to retrieve the content. Moreover, ICN routers not only perform a forwarding function but also act as content providers due to pervasive in-network caching. The network traffic is more complicated and routers are more prone to congestion. These distinguished characteristics pose new challenges to ICN transmission control mechanism. In this paper, we propose an effective transmission scheme by combining the receiver-driven transport protocol and the router-driven congestion detection mechanism. We first outline the process of content retrieval and transmission in an IP-compatible ICN architecture and propose a practical receiver-driven transport protocol. Then, we present an early congestion detection mechanism applied on ICN routers based on an improved Active Queue Management (AQM) algorithm and design a receiver-driven congestion control algorithm. Finally, experiment results show that the proposed transmission scheme can maintain high bandwidth utilization and significantly reduce transmission delay and packet loss rate.
APA, Harvard, Vancouver, ISO, and other styles
15

Obukhov, A. D., and M. N. Krasnyansky. "Neural network method of data processing and transmission in adaptive information systems." Vestnik Udmurtskogo Universiteta. Matematika. Mekhanika. Komp'yuternye Nauki 31, no. 1 (March 2021): 149–64. http://dx.doi.org/10.35634/vm210111.

Full text
Abstract:
The problem of automation of the processes of information transmission and processing in adaptive information systems is considered. An analysis of existing approaches to solving this problem showed the prospects of using neural network technologies. A neural network method for processing and transmitting information in adaptive information systems is formulated. The method includes a formalized description of a neural network data channel - a software tool for analysis, data processing and selection of data transfer protocol. The main stages of the proposed method are outlined: classification of the structures of the source data, their transformation, data processing, selection of the necessary protocol for transmitting information. Each of the stages is implemented through neural networks of various architectures. The theoretical rationale of the possibility of using the neural network method is given, obtained on the basis of the proof of a number of theorems. The novelty of the proposed method consists in the transition from an analytical solution of the problems of classification, processing and data transfer to an automated approach using machine learning technologies. The practical significance of the neural network method is to reduce the complexity of the implementation of information processing and transmission processes, to increase the level of automation in the organization of intermodular interaction. The implementation of the neural network method has been assessed using a number of software complexity assessment metrics. The application, virtues and failings of the developed method are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
16

Knieps, Günter. "Internet of Things, future networks, and the economics of virtual networks." Competition and Regulation in Network Industries 18, no. 3-4 (September 2017): 240–55. http://dx.doi.org/10.1177/1783591718784398.

Full text
Abstract:
The Internet of Things (IoT) gains momentum. Developments regarding smart grids, intelligent transportation systems, and low-power networks for smart cities constitute significant drivers in the evolution of network industries. IoT creates an array of new requirements for information and communications technology (ICT) data transmission: In addition to real-time and data geopositioning, new service characteristics result from the change of the traditional sender–receiver perspective of Transmission Control Protocol/Internet Protocol (TCP/IP) to content relevancy for many users (e.g. cloud computing) and dynamic changes of the state of devices. The future development and success of IoT hinges critically on the provision of heterogeneous quality of service (QoS) requirements which cannot be provided by best-effort TCP/IP Internet. It is thus not surprising that both in the US and the EU network neutrality regulations are currently being reconsidered. Alternative network logistics (virtual networks) dealing with heterogeneous QoS requirements of network traffic may require fundamental deviations from traditional Internet architectures. Corresponding logistics operating over joint physical infrastructures gain increasing attention under the heading of future networks (FNs). The goal of this article is to focus on the economic mechanisms of how the potentials of QoS differentiation in the context of FNs can be fully exploited and incentivized within innovative all-IP-based QoS traffic architectures.
APA, Harvard, Vancouver, ISO, and other styles
17

Alejandrino, Jonnel D., Ronnie S. Concepcion II, Vincent Jan D. Almero, Maria Gemel Palconit, Ryan Rhay P. Vicerra, Argel Bandala, Edwin Sybingco, and Elmer P. Dadios. "Protocol-Independent Data Acquisition for Precision Farming." Journal of Advanced Computational Intelligence and Intelligent Informatics 25, no. 4 (July 20, 2021): 397–403. http://dx.doi.org/10.20965/jaciii.2021.p0397.

Full text
Abstract:
This paper proposes an optimal design of network and a routing mechanism that is independent from fixed protocols. It provides an optimized route for diversified mesh network, which can support interorganizational communication in a large-scale operation. Decentralization of the system ensures that every protocol acts independently and selects the best optimal path during transmission of data without modifying their architecture and technology. Incorporation of definite source configuration improves the mobility of the systems. Each sensor is individually processed to balance the data load and prevent congestion. Simple transmit-receive test is performed by circulating messages of increasing size between end sensors and network destination. The proposed technique is considered to be effective in terms of interoperability speed, data accuracy and bit error rate (BER) with an increment of 27.13%, 99.98%, and 15.12%, respectively. Finally, the test demonstrates its expediency in terms of adaptability and scalability.
APA, Harvard, Vancouver, ISO, and other styles
18

Zelensky, A. A. "HIGH-SPEED INDUSTRIAL REAL-TIME NETWORK OF CYBERPHYSICAL SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 185 (November 2019): 46–52. http://dx.doi.org/10.14489/vkit.2019.11.pp.046-052.

Full text
Abstract:
The construction of a high-speed industrial real-time network based on FPGA (Field-Programmable Gate Array) for the control of machines and industrial robots is considered. A brief comparative analysis of the performance of the implemented Ethernet-based Protocol with industrial protocols of other leading manufacturers is made. The aim of the research and development of its own industrial automation Protocol was to reduce the dependence on third-party real-time protocols based on Ethernet for controlling robots, machines and technological equipment. In the course of the study, the requirements for the network of the motion control system of industrial equipment were analyzed. In order to synchronize different network nodes and provide short exchange cycle time, an industrial managed switch was developed, as well as a specialized hardware controller for processing Ethernet packets for end devices, presented as a IP-core. A key feature of the developed industrial network is that the data transmission in it is completely determined, and the exchange cycle time for each of the network devices can be configured individually. High efficiency and performance of implemented network devices became possible due to the use of hardware solutions based on FPGAs. All solutions described in the article as part of a modular digital system have been successfully tested in the control of machines and industrial robot. The results of field tests show that the use of FPGAs and soft processors with specialized peripheral IP-blocks can significantly reduce the tact of managing industrial equipment through the use of hardware computing structures, which indicates the promise of the proposed approach for solving industrial automation tasks.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhen, Xiao Qiong, Zhen Dong Yao, and Wen Bin Wang. "Scheme Design for Communication between Network Port and Serial Port Based on ARM." Advanced Engineering Forum 6-7 (September 2012): 941–47. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.941.

Full text
Abstract:
The data transmission scheme between a transmission control protocol/internet protocol (TCP/IP) network port and a serial port based on an ARM embedded system is introduced in the paper. The data transmission between a personal computer (PC) and remote equipment through an Internet is realized. The structure of a hardware platform is simply introduced, the cutting and transplant of operating system, the communication program design of the network port and the serial port and the cross compiling between the two ports are introduced in detail. The AT91SAM9261 chip of ATMEL Corporation is employed as the embedded board of a kernel processor. The Redhat9 Linux operating system is employed as a software development platform, an ARM-Linux operating system is employed as a program operation platform and the kernel version is Linux-2.6.2. The C program is used and an ARM-Linux-GNU tool chain is used for the cross compiling. The experimental result proves that the real-time, parallel full duplex data transmission between the network port and the serial port is realized by the scheme provided in the paper.
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, J. Y. "A TCP/IP-based remote control system for yard cranes in a port container terminal." Robotica 24, no. 5 (February 17, 2006): 613–20. http://dx.doi.org/10.1017/s0263574706002694.

Full text
Abstract:
If one operator in a remote operating room can operate 4 ∼ 5 cranes remotely, which are yard cranes for container loading/unloading in a port container terminal, the port loading/unloading efficiency will dramatically be improved through productivity increase, cost reduction, and so on. This study presents a remote crane control system for container loading/unloading yard cranes of port container terminals. First, a wireless web-based video and audio transmission system to transmit the images and the sounds of a craneyard is designed by using 3 web cameras and a microphone. Next, a TCP/IP-based remote crane control system is presented on the basis of the delay performance simulations of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) for real-time remote control. The simulation results show that TCP is more advantageous for remote crane control on a local network.
APA, Harvard, Vancouver, ISO, and other styles
21

Hosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.

Full text
Abstract:
IP Multicasting has been a crucial requirement of many scalable networked virtual environments by providing an efficient network mechanism through which a sender can transmit its information to a large number of receivers without having to send multiple copies of the same data over a physical link. The widespread deployment of IP Multicast has been slow due to some yet unresolved issues, prompting recent efforts in the development of multicasting protocols at the application layer instead of at the network layer. Most of these protocols address the case of a single source streaming media to a large number of receivers in applications such as video-on-demand or live broadcast. Collaborative and distributed virtual environments exhibit different characteristics that in turn necessitate a different set of requirements for application layer multicast protocols. This paper presents an introduction to application layer multicasting as it relates to distributed and collaborative virtual environments and the development of our own end system multicast protocol for multi-sender virtual teleconference applications.
APA, Harvard, Vancouver, ISO, and other styles
22

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
23

Choi, Dongmin, Sangman Moh, and Ilyong Chung. "ARCS: An Energy-Efficient Clustering Scheme for Sensor Network Monitoring Systems." ISRN Communications and Networking 2011 (September 19, 2011): 1–10. http://dx.doi.org/10.5402/2011/572572.

Full text
Abstract:
To achieve efficiency in prolonging the lifetime of sensor networks many schemes have been proposed. Among these schemes, a clustering protocol is an efficient method that prolongs the lifetime of a network. However, in applying this method, some nodes consume energy unnecessarily because of an environment in which the collected data of the sensor nodes easily overlap. In this paper we propose a clustering method which reduces unnecessary data transmission among nodes by excluding the duplication of data. Our method alleviates the problem where nearby nodes collect the same data from adjacent areas by electing all nodes that form a cluster in consideration of the sensing coverage of the nodes. Also, it introduces relay nodes, also called repeaters, which help to hop the data transmission along to cluster head nodes in order to cope with energy-hole and link failure problems. This method prevents data loss caused by link failure problem and thus the data is collected reliably. According to the results of the performance analysis, our method reduces the energy consumption, increases the transmission efficiency, and prolongs network lifetime when compared to the existing clustering methods.
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Zhihua, Minda Xu, Tingxu Liu, and Lei Yu. "A Network Coding-Based Braided Multipath Routing Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2019 (December 5, 2019): 1–25. http://dx.doi.org/10.1155/2019/2757601.

Full text
Abstract:
In wireless sensor networks (WSNs), energy efficiency can simultaneously guarantee robustness to link loss and node failure and is a key design goal of routing protocols because WSNs are strongly constrained in terms of transmission reliability, transmission delay, and energy consumption. Braided multipath routing has become a powerful tool for tolerating node failures and link losses, with high reliability and efficient data transmission rates. In this paper, we propose a novel network coding-based braided multipath routing called NC-BMR protocol. It integrates a data compression-based network coding method with the construction of hierarchical multiparent nodes (HMPNs) topology for the routing with coordinated data forwarding manner and a multipackets-based time scheduler strategy (MTSS). Its perfect transmission efficiency is achieved by only attaching a little control information with data packets. We validated NC-BMR based on the TOSSIM platform and compared it to several previous methods. Theoretical analysis and simulation results demonstrate its performance improvement in terms of the transmission reliability, delay, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
25

Oh, Hyung Rai, and Hwangjun Song. "Energy efficient MAC protocol for delay-sensitive data transmission over wireless sensor network." Wireless Communications and Mobile Computing 12, no. 9 (November 17, 2010): 755–66. http://dx.doi.org/10.1002/wcm.1009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Begum, Seema, Yao Nianmin, Syed Bilal Hussain Shah, Asrin Abdollahi, Inam Ullah Khan, and Liqaa Nawaf. "Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT)." Wireless Communications and Mobile Computing 2021 (July 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/5129396.

Full text
Abstract:
Dynamic opportunistic channel access with software-defined radio at a network layer in distributed cognitive IoT introduces a concurrent channel selection along with end-to-end route selection for application data transmission. State-of-the-art cognitive IoT big data-based routing protocols are not explored in terms of how the spectrum management is being coordinated with the network layer for concurrent channel route selection during end-to-end channel route discovery for data transmission of IoT and big data applications. In this paper, a reactive big data-based “cognitive dynamic source routing protocol” is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination. Experimental results show that the proposed protocol cognitive DSR with concurrent channel route selection criteria is outperformed. This will happen when it is compared with the existing distributed cognitive DSR with independent channel route application data transmission.
APA, Harvard, Vancouver, ISO, and other styles
27

Baigorria, Luis A., José F. Postigo, Vicente A. Mut, and Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol." Robotica 21, no. 3 (May 13, 2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.

Full text
Abstract:
In this paper, development and implementation are presented of a client software package for remote process control. The proposed software is based on a client-server model under an Intranet architecture. The architecture is proposed for a telecontrol system of a real process, which includes the possibility of integrating I/O devices with data networks based on open protocols such as TCP/IP. This protocol allows the implementation of control systems using a low-cost alternative. Also, the Smith predictor is revised for remote control applications over an Ethernet network. Some experiences on a laboratory pasteurization plant are addressed to show both developed controllers and architecture performance.
APA, Harvard, Vancouver, ISO, and other styles
28

Balan, T., D. Robu, and F. Sandu. "LISP Optimisation of Mobile Data Streaming in Connected Societies." Mobile Information Systems 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9597579.

Full text
Abstract:
Mobility mechanisms are key elements of “always connected” smart environments. Since the first mobile IPv4 protocols, the IP mobility solutions have evolved from host mobility to network mobility and migration to IPv6, but there are still use-cases to be covered, especially for redundant multihomed scenarios. Also mobility does not refer only to hosts or individuals, but also to code/applications and to virtual machines. LISP (Locator/Identifier Separation Protocol) can contribute to new solutions for both host mobility and virtual machine mobility (e.g., inside enterprise data centers) by the separation of the identifier and location of a network endpoint. The aim of this paper is to propose a LISP based multihome and load-balanced network architecture for urban environments. Validation is done in an emulated environment for the case of an enterprise with distributed locations, but, furthermore, we extrapolate to other mobile urban scenarios, like the case of providing reliable load-balanced and secured Internet in Public Transportation Systems, with a proposal for an open-source implementation.
APA, Harvard, Vancouver, ISO, and other styles
29

Khan, Muhammad, Ankita Chaturvedi, Dheerendra Mishra, and Saru Kumari. "On the security enhancement of integrated electronic patient records information systems." Computer Science and Information Systems 12, no. 2 (2015): 857–72. http://dx.doi.org/10.2298/csis141029030k.

Full text
Abstract:
Electronic patient records (EPR) information systems maintain the patients? medical information on the web servers, and remain available to the medical institutions, practitioners, and the academia. The transmission of data is being done over the public network, which increases the privacy and security risk. However, authentication mechanism tries to ensure secure and authorized communication over insecure public network. In recent years, several authentication protocols have been proposed, but most of them fail to satisfy desirable security attributes. In this paper, we discuss the failure of two authentication protocols for EPR information systems. To overcome the flows, we present improved scheme for the integrated EPR information systems. The correctness of proposed protocol is proved using BAN logic. Moreover, the protocol performs is comparable and security is efficient than the existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhou, Xiabing, Bin Li, Yanrong Qi, and Wanying Dong. "Mimic Encryption Box for Network Multimedia Data Security." Security and Communication Networks 2020 (October 28, 2020): 1–24. http://dx.doi.org/10.1155/2020/8868672.

Full text
Abstract:
With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve “one packet, one key.” Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to “clean” the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.
APA, Harvard, Vancouver, ISO, and other styles
31

Ji, Xiang, Huiqun Yu, Guisheng Fan, Huaiying Sun, and Liqiong Chen. "Efficient and Reliable Cluster-Based Data Transmission for Vehicular Ad Hoc Networks." Mobile Information Systems 2018 (July 30, 2018): 1–15. http://dx.doi.org/10.1155/2018/9826782.

Full text
Abstract:
Vehicular ad hoc network (VANET) is an emerging technology for the future intelligent transportation systems (ITSs). The current researches are intensely focusing on the problems of routing protocol reliability and scalability across the urban VANETs. Vehicle clustering is testified to be a promising approach to improve routing reliability and scalability by grouping vehicles together to serve as the foundation for ITS applications. However, some prominent characteristics, like high mobility and uneven spatial distribution of vehicles, may affect the clustering performance. Therefore, how to establish and maintain stable clusters has become a challenging problem in VANETs. This paper proposes a link reliability-based clustering algorithm (LRCA) to provide efficient and reliable data transmission in VANETs. Before clustering, a novel link lifetime-based (LLT-based) neighbor sampling strategy is put forward to filter out the redundant unstable neighbors. The proposed clustering scheme mainly composes of three parts: cluster head selection, cluster formation, and cluster maintenance. Furthermore, we propose a routing protocol of LRCA to serve the infotainment applications in VANET. To make routing decisions appropriate, we nominate special nodes at intersections to evaluate the network condition by assigning weights to the road segments. Routes with the lowest weights are then selected as the optimal data forwarding paths. We evaluate clustering stability and routing performance of the proposed approach by comparing with some existing schemes. The extensive simulation results show that our approach outperforms in both cluster stability and data transmission.
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Jia, Wei Ping Fu, Lei Zhou, Na Qie, and Wen Yun Wang. "Design and Application of a Communication System Based on Codesys." Advanced Materials Research 1044-1045 (October 2014): 1113–17. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1113.

Full text
Abstract:
A model of wireless network data interchange was built to solve cross-platform exchange data in intelligent robot. In the framework of embedded Soft-PLC - Codesys real-time operating system, we apply Socket network programming technology based on TCP/IP communication protocol to set up a physical channel between VC++ platform and the Codesys platform. It realizes the real-time data exchange between host-computer and slave-computer uploaded embedded operation system of robot. A special multi-threaded processing class was developed to enhance the multi-tasking allocation ability of the system. Exchanged data was packaged and analyzed to ensure the accuracy of transmitted data. The experiment shows built communication system platform is justifiable, and data transmission speed is less than 10ms. It is able to meet the needs of real-time control in intelligent robot.
APA, Harvard, Vancouver, ISO, and other styles
33

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet networks, Wide Area Networks (WAN), and Local Area Networks (LAN). However, the VoIP cannot fully replace PSTN due to several weaknesses, such as delay, jitter, packet loss, as well as security and echo. Telephones calls using VoIP technology are executed using terminals in the form of computer devices or existing analogue telephones. The benefit of VoIP is that it can be set in all ethernet and IP addresses. Prefixes can be applied for inter-server placements as inter-building telephone networks without the addition of inefficient new cables on single board computers with Elastix installed. Prefix and non-prefix analysis on servers from single board computers can be tested using QoS for bandwidth, jitter, and packet loss codec. The installation of 6 clients, or 3 simultaneous calls resulted in a packet loss value in the prefix Speex codex of 2.34%. The bandwidth in the prefix PCMU codec has an average value of 82.3Kbps, and a non-prefix value of 79.3Kbps, in accordance to the codec standards in the VoIP. The lowest jitter was found in the non-prefix PCMU codec with an average of 51.05ms, with the highest jitter for the prefix Speex codec being 314.65ms.
APA, Harvard, Vancouver, ISO, and other styles
34

Vinayakumar R, Soman KP, and Prabaharan Poornachandran. "A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)." International Journal of Digital Crime and Forensics 11, no. 3 (July 2019): 65–89. http://dx.doi.org/10.4018/ijdcf.2019070104.

Full text
Abstract:
Recently, due to the advance and impressive results of deep learning techniques in the fields of image recognition, natural language processing and speech recognition for various long-standing artificial intelligence (AI) tasks, there has been a great interest in applying towards security tasks too. This article focuses on applying these deep taxonomy techniques to network intrusion detection system (N-IDS) with the aim to enhance the performance in classifying the network connections as either good or bad. To substantiate this to NIDS, this article models network traffic as a time series data, specifically transmission control protocol / internet protocol (TCP/IP) packets in a predefined time-window with a supervised deep learning methods such as recurrent neural network (RNN), identity matrix of initialized values typically termed as identity recurrent neural network (IRNN), long short-term memory (LSTM), clock-work RNN (CWRNN) and gated recurrent unit (GRU), utilizing connection records of KDDCup-99 challenge data set. The main interest is given to evaluate the performance of RNN over newly introduced method such as LSTM and IRNN to alleviate the vanishing and exploding gradient problem in memorizing the long-term dependencies. The efficient network architecture for all deep models is chosen based on comparing the performance of various network topologies and network parameters. The experiments of such chosen efficient configurations of deep models were run up to 1,000 epochs by varying learning-rates between 0.01-05. The observed results of IRNN are relatively close to the performance of LSTM on KDDCup-99 NIDS data set. In addition to KDDCup-99, the effectiveness of deep model architectures are evaluated on refined version of KDDCup-99: NSL-KDD and most recent one, UNSW-NB15 NIDS datasets.
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, Junjie, Liang Tan, Sun Mao, and Keping Yu. "Blockchain Network Propagation Mechanism Based on P4P Architecture." Security and Communication Networks 2021 (August 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/8363131.

Full text
Abstract:
Blockchain is a mainstream technology in which many untrustworthy nodes work together to maintain a distributed ledger with advantages such as decentralization, traceability, and tamper-proof. The network layer communication mechanism in its architecture is the core of the networking method, message propagation, and data verification among blockchain nodes, which is the basis to ensure blockchain’s performance and key features. When blocks are propagated in peer-to-peer (P2P) networks with gossip protocol, the high propagation delay of the protocol itself reduces the propagation speed of the blocks, which is prone to the chain forking phenomenon and causes double payment attacks. To accelerate the propagation speed and reduce the fork probability, this paper proposes a blockchain network propagation mechanism based on proactive network provider participation for P2P (P4P) architecture. This mechanism first obtains the information of network topology and link status in a region based on the internet service provider (ISP), then it calculates the shortest path and link overhead of peer nodes using P4P technology, prioritizes the nodes with good local bandwidth conditions for transmission, realizes the optimization of node connections, improves the quality of service (QoS) and quality of experience (QoE) of blockchain networks, and enables blockchain nodes to exchange blocks and transactions through the secure propagation path. Simulation experiments show that the proposed propagation mechanism outperforms the original propagation mechanism of the blockchain network in terms of system overhead, rate of data success transmission, routing hops, and propagation delay.
APA, Harvard, Vancouver, ISO, and other styles
36

Hou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.

Full text
Abstract:
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.
APA, Harvard, Vancouver, ISO, and other styles
37

Azhar, Raesul. "Analisa Perbandingan Penerapan PBR Dan Non PBR Pada Protocol OSPF Untuk Koneksi Internet." Jurnal Matrik 15, no. 1 (July 26, 2017): 29. http://dx.doi.org/10.30812/matrik.v15i1.26.

Full text
Abstract:
The implementation of quota policies to limit the use of the Internet, such as limiting the use of streaming media applications, download and upload activity has a purpose in order to maintain the performance of computer networks, especially companies / organizations that have low Internet bandwidth capacity. Implementation of Policy Based Routing (PBR) means choosing a path or a different route from the routing table to reach the destination address of data packets transmitted. Router device without applying the PBR will choose a path based on the IP address of the destination.This research was conducted by adopting the method NDLC in comparing the routing policy. Thestages through which the problem analysis, design and simulation prototype network topology. At this stage of prototype Simulation is done by confiuring and testing the Quality of Service (QoS) for network design. Results achieved in the form of comparisons PBR application on the router and use of NON PBR for the implementation of a policy to optimize traffi transmission of data packets or internet traffi usage by users.
APA, Harvard, Vancouver, ISO, and other styles
38

Nabavi, Seyed Reza, Nafiseh Osati Eraghi, and Javad Akbari Torkestani. "WSN Routing Protocol Using a Multiobjective Greedy Approach." Wireless Communications and Mobile Computing 2021 (April 13, 2021): 1–12. http://dx.doi.org/10.1155/2021/6664669.

Full text
Abstract:
Due to the widespread use of communication networks and the ease of transmitting and gathering information through these networks, wireless sensor networks (WSN) have become increasingly popular. Usability in any environment without the need for environmental monitoring and engineering of these networks has led to their increasing usage in various fields. Routing information from the sensor node to sink, so that node energy is consumed uniformly and network life is not reduced, is one of the most important challenges in wireless sensor networks. Most wireless networks have no infrastructure, and embedded sensor nodes have limited power. Thus, the early termination of the wireless node’s energy based on the transmission of messages over the network can disrupt the entire network process. In this paper, the object is designed to find the optimal path in WSN based on the multiobjective greedy approach to the near optimal path. The proposed model is presented in this method to transfer sensed data of the sensor network to the base station for the desired applications. In this method, the sensor nodes are identified as adjacent nodes based on their distance. The energy of all nodes initially is approximately equal, which decreases with the transfer of information between the nodes. In this way, when a node senses a message, it checks several factors for transmitting information to its adjacent nodes and selects the node with the largest amount of factors as the next hop. The simulation results show that the energy consumption in the network grids is almost symmetrically presented, and the network lifetime is reduced with a gentle slope that provides optimum energy consumption in the networks. Also, the packet transmission delay in the network reaches 450 milliseconds for the transmission of information between 15 nodes and 650 connections. Besides, network throughput increases by approximately 97%. It also shows better performance compared to other previous methods in terms of evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
39

Chaaf, Amir, Mohammed Saleh Ali Muthanna, Ammar Muthanna, Soha Alhelaly, Ibrahim A. Elgendy, Abdullah M. Iliyasu, and Ahmed A. Abd El-Latif. "Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network." Security and Communication Networks 2021 (June 30, 2021): 1–20. http://dx.doi.org/10.1155/2021/9969605.

Full text
Abstract:
Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require effective packet transmission. In this case, sparse node distribution, imbalance in terms of overall energy consumption between the different sensor nodes, dynamic network topology, and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a relay-based void hole prevention and repair (ReVOHPR) protocol by multiple autonomous underwater vehicles (AUVs) for UWSN. ReVOHPR is a global solution that implements different phases of operations that act mutually in order to efficiently reduce and identify void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as ocean depth (levels)-based equal cluster formation, dynamic sleep scheduling, virtual graph-based routing, and relay-assisted void hole repair. For energy-efficient cluster forming, entropy-based eligibility ranking (E2R) is presented, which elects stable cluster heads (CHs). Then, dynamic sleep scheduling is implemented by the dynamic kernel Kalman filter (DK2F) algorithm in which sleep and active modes are based on the node’s current status. Intercluster routing is performed by maximum matching nodes that are selected by dual criteria, and also the data are transmitted to AUV. Finally, void holes are detected and repaired by the bicriteria mayfly optimization (BiCMO) algorithm. The BiCMO focuses on reducing the number of holes and data packet loss and maximizes the quality of service (QoS) and energy efficiency of the network. This protocol is timely dealing with node failures in packet transmission via multihop routing. Simulation is implemented by the NS3 (AquaSim module) simulator that evaluates the performance in the network according to the following metrics: average energy consumption, delay, packet delivery rate, and throughput. The simulation results of the proposed REVOHPR protocol comparing to the previous protocols allowed to conclude that the REVOHPR has considerable advantages. Due to the development of a new protocol with a set of phases for data transmission, energy consumption minimization, and void hole avoidance and mitigation in UWSN, the number of active nodes rate increases with the improvement in overall QoS.
APA, Harvard, Vancouver, ISO, and other styles
40

Alsufyani, Azhar Abbad, and Khaled H. Almotairi. "An Adaptive Common Control Channel MAC with Transmission Opportunity in IEEE 802.11ac." Journal of ICT Research and Applications 14, no. 3 (February 23, 2021): 240–56. http://dx.doi.org/10.5614/itbj.ict.res.appl.2021.14.3.3.

Full text
Abstract:
Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.
APA, Harvard, Vancouver, ISO, and other styles
41

Papan, Jozef, Pavel Segec, and Michal Kvet. "Enhanced Bit Repair IP Fast Reroute Mechanism for Rapid Network Recovery." Applied Sciences 11, no. 7 (April 1, 2021): 3133. http://dx.doi.org/10.3390/app11073133.

Full text
Abstract:
The massive development of virtualized infrastructures, Internet of Things (IoT), and Wireless Sensor Network (WSN) in recent years has led to an increase in quality requirements for the management and reliability of underlay communication networks. Existing converged networks must therefore guarantee specific quantitative and qualitative parameters of different network communication services to meet customer requirements. However, the quality of the services operated is very negatively affected by an unpredictable failure of a communication link or a network node. In such situations, communication is typically interrupted for a period that is difficult to predict, and which can lead to significant financial losses and other negative effects. Internet Protocol Fast Reroute (IP FRR) technology was developed for these reasons. The paper presents the proposal of the new Enhanced Bit Repair (EB-REP) IP FRR mechanism, which offers significant improvements over its predecessor, the B-REP mechanism. The B-REP offers protection against a single failure and only for selected critical IP flows. The EB-REP provides advanced protection against multiple failures in a protected network domain and the protection can be provided for all network flows. The EB-REP calculates alternative paths in advance based on link metrics, but also allows the construction of alternative paths independently of them. The construction of alternative FRR paths uses a standardized tunneling approach via a unique field Bit-String. Thanks to these features, EB-REP is an advanced contribution to solving IP FRR-related problems, which enables the use of EB-REP in many network deployments, but especially in network solutions that require reliable data transmission.
APA, Harvard, Vancouver, ISO, and other styles
42

Vinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)." International Journal of Information System Modeling and Design 8, no. 3 (July 2017): 43–63. http://dx.doi.org/10.4018/ijismd.2017070103.

Full text
Abstract:
This article describes how sequential data modeling is a relevant task in Cybersecurity. Sequences are attributed temporal characteristics either explicitly or implicitly. Recurrent neural networks (RNNs) are a subset of artificial neural networks (ANNs) which have appeared as a powerful, principle approach to learn dynamic temporal behaviors in an arbitrary length of large-scale sequence data. Furthermore, stacked recurrent neural networks (S-RNNs) have the potential to learn complex temporal behaviors quickly, including sparse representations. To leverage this, the authors model network traffic as a time series, particularly transmission control protocol / internet protocol (TCP/IP) packets in a predefined time range with a supervised learning method, using millions of known good and bad network connections. To find out the best architecture, the authors complete a comprehensive review of various RNN architectures with its network parameters and network structures. Ideally, as a test bed, they use the existing benchmark Defense Advanced Research Projects Agency / Knowledge Discovery and Data Mining (DARPA) / (KDD) Cup ‘99' intrusion detection (ID) contest data set to show the efficacy of these various RNN architectures. All the experiments of deep learning architectures are run up to 1000 epochs with a learning rate in the range [0.01-0.5] on a GPU-enabled TensorFlow and experiments of traditional machine learning algorithms are done using Scikit-learn. Experiments of families of RNN architecture achieved a low false positive rate in comparison to the traditional machine learning classifiers. The primary reason is that RNN architectures are able to store information for long-term dependencies over time-lags and to adjust with successive connection sequence information. In addition, the effectiveness of RNN architectures are shown for the UNSW-NB15 data set.
APA, Harvard, Vancouver, ISO, and other styles
43

Olenev, Valentin. "Analysis of requirements for modern spacecraft onboard network protocols." Information and Control Systems, no. 1 (March 3, 2021): 8–16. http://dx.doi.org/10.31799/1684-8853-2021-1-8-16.

Full text
Abstract:
Introduction: New technologies are replacing the onboard space networks based on bus topologies. One of these technologies is SpaceWire. New communication protocols are being developed, expanding SpaceWire functionality. The protocol developers should provide all the required technical characteristics for data transmission and processing. Purpose: Analysis of the existing requirements for communication protocols, and development of consolidated set of requirements that will take into account the modern requests of the space industry. Results: The analysis of the existing demands on communication protocols resulted in a set of consolidated requirements for the physical-network layers’ protocols and the transport layer protocols. The requirements cover the speed, latencies, transmission distance, transmitted information amount, fault detection functionality, time synchronization between the devices, quality of service, main user data types, and data transfer modes at the transport level. The existing SpaceWire protocols are defined as a special class of protocols, possessing unique characteristics. Practical relevance: The performed analysis can simplify the implementation of new onboard communication protocols and provide a required level of technique for new generation spacecraft.
APA, Harvard, Vancouver, ISO, and other styles
44

Kim, Ku-Hwan, Hoang-Linh To, Won-Joo Hwang, and Jung-Tae Lee. "Infinite Queue Management via Cascade Control for Industrial Routers in Smart Grid IP Networks." Scientific Programming 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/5796907.

Full text
Abstract:
Smart grid applications experience an extremely wide range of communication delay. Data flows of those applications are normally aggregated at industrial network routers in substations, form infinite (long) queues termed bufferbloat issue, and might damage the operation of transmission control protocol. The default queue management scheme, DropTail, in such routers just drops packets if queue is full while the others in literature are mostly based on one-loop feedback control where an optimal point of performance between queue length and drop rate is limited. In this paper, we study the problem of managing a long queue of industrial router at substation under heterogeneous smart grid networks. Specifically, we propose an enqueue-dequeue dropping cascade control using a two-loop design method to control both window size and queue length. Moreover, our proposal can be easily implemented into router firmware with provided discrete expressions. Finally, our simulation results are presented to validate the possible benefits that can be gained from cascade control and compare the existing queue management methods as well.
APA, Harvard, Vancouver, ISO, and other styles
45

Jiang, Haifeng, Xiaoxiao Liu, Shuo Xiao, Chaogang Tang, and Wei Chen. "Physarum-Inspired Autonomous Optimized Routing Protocol for Coal Mine MANET." Wireless Communications and Mobile Computing 2020 (August 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8816718.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is suitable for complex environment communication in coal mine. The processes of nutrient flux transfer and path choice in Physarum networks are similar to data transmission and routing decision in MANET. In this paper, we use a Physarum optimization model to design Physarum-inspired autonomous optimized routing (PIAOR) protocol to adapt to the dynamic network topology in underground mine. PIAOR introduces the status of MANET into the Poisson equation in the Physarum model, selects reasonable parameters to represent the transmission performance of the network, and uses the differential evolution equation of the Physarum model to evolve the parameters. PIAOR has achieved the distributed routing decision by automatically reconstructing the optimal routing path, which has reduced the algorithm complexity. Based on NS2, simulation experiments are performed to evaluate the performance of PIAOR, and the results are compared with GPSR, PIMAR, and P-IRP routing algorithms. The experimental results show that the routing path selected by PIAOR is better than that selected by the other three protocols in the performance of average end-to-end delay, delivery ratio, and throughput. The balance of energy consumption and network load is reached, and the network lifetime is effectively prolonged when using the PIAOR protocol.
APA, Harvard, Vancouver, ISO, and other styles
46

Ma, Xuebin, Xiaojuan Zhang, and Ren Yang. "Reliable Energy-Aware Routing Protocol in Delay-Tolerant Mobile Sensor Networks." Wireless Communications and Mobile Computing 2019 (February 17, 2019): 1–11. http://dx.doi.org/10.1155/2019/5746374.

Full text
Abstract:
In the data transmission process of delay-tolerant mobile sensor networks, data is easily lost, and the network lifetime decreases due to energy depletion by the nodes. We propose a reliable energy-aware routing protocol, called RER. To ensure the reliability of message transmission, a hop-by-hop retransmission acknowledgement mechanism is introduced in the RER. Second, we design a metric called Reliable Energy Cost Based on Distance (RECBD) to aid RER, which is determined by analysing the distance between the current node and the relay node, the distance between the relay node and the sink node, the current residual energy of the current node, and the link quality. Finally, the message is routed based on the RECBD to improve reliability and reduce energy consumption. The simulation results show that the routing protocol can improve the energy utilization of the sensor nodes and prolong the network lifetime while guaranteeing the delivery ratio and reliability.
APA, Harvard, Vancouver, ISO, and other styles
47

Jurenoks, Aleksejs, and Leonids Novickis. "Wireless sensor networks lifetime assessment model development." Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference 3 (June 16, 2015): 121. http://dx.doi.org/10.17770/etr2015vol3.508.

Full text
Abstract:
<p class="R-AbstractKeywords"><span lang="EN-US">In the recent years low power computing systems have gained popularity. Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks, which main task is to get the information from sensors and transmission network. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the new optimization of structure of network transmission protocol, the routing optimization in transmission network, optimization of network structure, as a result of which the life circle of wireless network sensors is possible to increase. In the present article the methodology for determining the life circle of network is discussed. The approaches in detection of life circle pertaining to the important network nodes are described.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Tsu-Yang, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, and Sachin Kumar. "A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (April 14, 2021): 1–15. http://dx.doi.org/10.1155/2021/5537018.

Full text
Abstract:
The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
49

ARYANTA, DWI, ARSYAD RAMADHAN DARLIS, and ARDHIANSYAH PRATAMA. "Implementasi Sistem IP PBX menggunakan Briker." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 1, no. 2 (July 1, 2013): 117. http://dx.doi.org/10.26760/elkomika.v1i2.117.

Full text
Abstract:
ABSTRAKVoIP (Voice over Internet Protocol) adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP) yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS). Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer) mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”.Kata Kunci: Briker, VoIP, QoS, IP PBX, Smartphone.ABSTRACTVoIP (Voice over Internet Protocol) is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP) which controls the analog phone extensions and IP Phone extensions. VirtualBox software is used in order to make it easier for the Linux operating system to create a program which is using briker IP PBX that works on Linux 2.6 Operating System. After the installation process is done briker on Virtualbox IP PBX network implementation. After implementing the IP PBX network according to the topology, and then do a test call success rate and analysis of Quality of Service (QoS). Measurement of QoS parameters using jitter, delay, and packet loss resulting in the IP PBX system. Jitter value briker fellow users (either on a smartphone or computer) has been on the average value of 16.77 ms. While the values obtained packetloss when there is 1 user when a phone caller is 0%. While the percentage of packet loss at user 1 as a telephone receiver is 0.01%. Delay value when communicating between users located at 11.75 ms. Overall value obtained through this study , where the results of testing the QOS parameters in accordance with the standards recommended by the ITU and the QoS values obtained with the results "good".Keywords: Briker, VoIP, QoS, IP PBX, Smartphone.
APA, Harvard, Vancouver, ISO, and other styles
50

Rîșteiu, Mircea, Remus Dobra, Alexandru Avram, Florin Samoilă, Georgeta Buică, Renato Rizzo, and Dan Doru Micu. "Designing a Smart Gateway for Data Fusion Implementation in a Distributed Electronic System Used in Automotive Industry." Energies 14, no. 11 (June 4, 2021): 3300. http://dx.doi.org/10.3390/en14113300.

Full text
Abstract:
This paper focuses on the interdisciplinary research on the design of a smart gateway for managing the dynamic error code testing collected and generated by the Electronic Control Unit (ECU) from the automotive industry. The techniques used to exchange information between the ECU code errors and knowledge bases, based on data fusion methods, allowed us to consolidate and ensure data reliability, and then to optimize processed data in our distributed electronic systems, as the basic state for Industry 4.0 standards. At the same time, they offered optimized data packets when the gateway was tested as a service integrator for ECU maintenance. The embedded programming solutions offered us safe, reliable, and flexible data packet management results on both communication systems (Transmission Control Protocol/Internet Provider (TCP/IP) and Controller Area Network (CAN) Bus) on the Electronic Control Unit (ECU) tested for diesel, high-pressure common rail engines. The main goal of this paper is to provide a solution for a smart, hardware–software, Industry-4.0-ready gateway applicable in the automotive industry.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography