The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet-of-things (IoT) paradigm exploits the Distributed Measurement System (DMS) to execute measurements. Each node of the DMS has computational and communicative capabilities, and can be equipped by sensors and measurement instruments. Therefore, it can be assumed as Smart Object (SO). The availability of mobile SO (MSO) (cars, smartphones, drones) is taken into consideration in the research to...
In order to ensure timing sequence and synchronization performance between different pulses not affected by temperature drift, a method of detecting temperature and compensating temperature drift based on FPGA was proposed, which can ensure data synchronization between different pulses at different temperatures. Because FPGA temperature influenced temperature drift, this method was used to detect...
There are main parameters of synchronization signals stability and methods for their monitoring in packet networks in the article. The principles of monitoring synchronization signals in the LTE network are presented.
Industrial communication is on its way from field-bus to Ethernet. In an industry 4.0 scenario various applications and branches in automated manufacturing, process industry and intra logistics are affected. Here, Ethernet communication will not be limited to the communication between controllers and devices such as programmable logic controllers (PLC) and sensors and actors, but will also be applied...
Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching...
A major issue of present age system on chip (SoC) designing is meeting of stringent time to market deadlines along with the reduction of various challenges faced during design. A significant strategy adopted in tackling such a problem is to procure different components or IPs (intellectual properties) of the SoC from different third party IP vendors (3PIPs). Such a technique targets independent working...
Networks are currently essential for computing: It is therefore essential to guarantee the quality of network links in order to ensure a proper operation of computing systems. However, a widespread deployment of network monitoring devices might not be economically feasible. In this paper, we propose the use of Programmable System-on-Chip FPGAs (PSoCs) for enabling a comprehensive testing of networks...
In modern RAID-structured storage systems, reliability is guaranteed by the use of parity blocks. But the parity-update overheads upon each write request have become a performance bottleneck of RAID systems. In some ways, an attached log disk is used to improve the write performance by delaying the parity blocks update. However, these methods are data-block-oriented and they need more time to rebuild...
In this paper, we propose a scheme for multiple Autonomous Underwater Vehicles (AUVs) based data-gathering in large hierarchical underwater sensor networks where the AUVs constitute an intermittently connected multihop network through inter AUV synchronization. The variations in underwater currents severely affect the AUV mobility which affect the inter AUV synchronization and hence contributes to...
Wireless sensor networks (WSN) face different security threats that disrupt the normal activities and degrade the performance of the networks. The wormhole attack is one of the most severe security attacks in WSN. In this paper, we analyze the effect of the wormhole attack in Optimized Link State routing (OLSR), which is a standard proactive routing protocol for WSN. A modified version of wormhole...
The paper addresses an attempt to perform dynamic timing simulations of complex mixed signal IP's. The targeted IP is a memory and uses its behavioural model; the idea spans from checking the presence of IO Path delays and timing checks viz. setup, hold, recovery, removal, width etc, and validating the impact on the IP behaviour. The methodology is developed and validated on UVM semantics; the eco-system...
We are concerned with reliably harvesting data used to monitor a service-based system hosted in a mobile ad hoc network (MANET) environment. These data are time-bounded, time-sensitive time-series data recorded by individual hosts in the network. Harvesting is used to gather the data for global time-series analyses, such as fault localization. The MANET environment challenges data harvesting, due...
Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics like dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. A node in MANET acts not only as an end terminal but both as router and client. In this way, multi-hop communication occurs in MANETs and thus it becomes much more difficult task to establish...
In order to reduce the cost and acquire the microsecond-level time synchronization, this paper has proposed the DF-NTP (Double filter NTP) and analyzed the algorithm of NTP (network time protocol) and the causes of synchronization error. The precision of time synchronization can be raised through filtrating the delay in the forward-backward path and reducing the influence of uncertain delay. The experimental...
Wearable sensing technologies such as Wireless Body Area Network (WBAN) for hazardous environments moni- toring generate heterogeneous types of traffic with diverse quality of service requirements related to delay, reliability, priority awareness and throughput, for instance. In addition, several WBANs might need to collaborate together by relaying each other's packets, as generated by constraining...
Network-based clock synchronization is an important prerequisite for many application areas and more and more required for the factory floor for network arbitration, control, and monitoring. Limitations of existing clock synchronization protocols are that they either support high redundancy and robustness or high precision. This paper presents an approach to integrate slave-side robustness into high...
Wireless Sensor Networks (WSNs) anomaly detection applications aim at identifying events which occur in a monitored area. Forest fire, landslide or intrusion detection are some examples. In order to perform anomaly detection, wireless sensors are deployed in the area of interest and the nodes monitor a physical parameter. If this parameter exceeds a predefined threshold, the node generates an alarm...
The recently-standardized Precision Time Protocol v2 (PTPv2) aims at achieving sub-microsecond-level synchronization between network clocks. In this work, we make the case for an alternative use of it: Adopting a learning approach, we observe its delay behavior during the protocol message exchange, derive models of its dependence on network load and build a real-time load estimation service. Then,...
An IF-Condition Invariance Violation (ICIV) occurs when, after a thread has computed the control expression of an IF statement and while it is executing the THEN or ELSE clauses, another thread updates variables in the IF's control expression. An ICIV can be easily detected, and is likely to be a sign of a concurrency bug in the code. Typically, the ICIV is caused by a data race, which we call IF-Condition...
The Defence Science and Technology Organisation (DSTO) has developed a versatile, low power, and networked sensor interface design suitable for use with a wide range of sensors. The sensor interfaces consist of: 1) core hardware and software that is the same for any sensor and 2) sensor specific hardware and software. The core software provides basic communications routines and manages a simple file...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.