The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Reality has been traditionally explored in many robotics systems, with applications such as off-line programming, trajectory planning, teleoperation, education, design, natural user interfaces and rehabilitation. Implementing these features in an all-in-one monolithic solution can be complex and slow. Also, new trends in automation, notably the Internet of Things, represent promissing technological...
The Trustful Space-Time Protocol (TSTP) allows for time synchronization to be performed upon receiving any message from another node in a sensor network, removing the need for explicit synchronization messages. Previous work has shown that TSTP performs well under controlled experimental environments. In this work, we analyze how the quality of synchronization in TSTP is affected when nodes are communicating...
More than eighty different test environments need to be created and maintained for debugging the Marvell Ethernet PHY chip if the traditional industrial verification methodology is being used. This can easily incite very complicated debugging procedures and cause the problems and concerns of a multitude of engineering resources. The latest Marvell Ethernet PHY IC UVM verification platform integrating...
This paper discusses the time synchronization issue in wireless sensor networks. An event-triggered average consensus time synchronization algorithm is proposed. This algorithm uses the average time message from one node's one-hop neighbors to update the clock parameters of the node. And it achieved acceptable synchronization accuracy. We also proposed an event-trigger mechanism to reduce the communication...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
Time synchronization over a distributed BLE wireless network poses several challenging problems which may affect the accuracy of time stamping of events recorded by BLE devices. In this paper, we study the accuracy of a time synchronization scheme based on generation of an event in the application program at the time of BLE connection establishment. We discuss the background of the problem, explain...
In industrial applications synchronized sensor nodes are vital for many tasks like multi parameter sampling of complex machinery behavior. The wirelessly connected nodes are usually synchronized to a base station. Therefore, frequency or period estimation of the reference clock is a key issue for all connected tasks like sampling, localization or applying energy optimized communication protocols....
To satisfy the requirements of complex distributed power electronic system (PES) communication, this paper has proposed a single optic-fiber link data communication protocol based on the Manchester code due to an vacancy in the commonly-adopted protocols, analyzed the encoding and decoding principle of Manchester code, defined the formats of command frame and data frame, calculated the communication...
Localization of wireless networks has remained an active research topic for more than a decade, as it finds more and more applications in numerous scenarios, including environment surveillance, asset tracking, and healthcare monitoring, etc. In this paper, we consider the maximum likelihood localization of a network where some of the nodes are GPS-capable while the others attempt to achieve self localization...
The clock synchronization technologies applied to controlling layer and primary equipment like intelligent switchgear of processing layer in intelligent substation are analyzed in this paper. IEEE1588 message timing mode, which can be accurate to nanosecond, is used as the mode of substation system, in order to fulfill the real-time and accuracy requirements of intelligent switchgears and remote control...
Emerging protocols for low-power wireless networks increasingly exploit constructive interference and the capture effect. The basic idea is that the synchronous transmission of identical packets by neighboring nodes leads to constructive interference - or at least do not cause destructive interference. This requires that the temporal displacement of packets at receiving nodes is lower than 0.5 μs...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
In this paper, we simulate the tri-message time synchronization protocol within the cluster sub net for the MAC layer of underwater acoustic network. Distinguished with the traditional TDMA protocols, all sub nodes are time consistent with the cluster node and the sub nodes can be quickly netted in the improved TDMA protocol. We established a network simulation with a bunch of 6 nodes in OPNET software...
This paper proposes a filter-based distributed protocol to realize time synchronization under time-varying clock parameters. The proposed protocol is derived from a first-order controller and is fully distributed, meaning that by relying merely on its local clock readings and reading announcements from its neighbouring sensor nodes, each node in WSNs can dynamically update its virtual clock and bound...
The Kiwi project revolves around a compiler that converts C# .NET bytecode into Verilog RTL and/or SystemC. An alpha version of the Kiwi toolchain is now open source and a user community is growing. We will demonstrate an incremental approach to large system assembly of HLS and blackbox components, based on an extended IP-XACT intermediate representation. We show how to address multi-FPGA designs...
In an increasingly interconnected world, the rising number of wireless devices in the Internet of Things has caused heavy congestion on particular bandwidths (BWs). Due to spectrum scarcity, the need has arisen for these devices to operate on the same BWs. However, existing wireless devices are inflexible and have no capabilities to coexist with devices using other protocols. In this work, we propose...
In both wired and wireless networks, time synchronization is an important service for a wide range of applications in distributed systems. This includes radio interferometry. However, literature researches show that many distributed protocols cannot satisfy sub-ns time synchronization accuracy due to asymmetric delay errors, accumulated jitters and because of the strategy used to compute and adjust...
Many smart city applications involve groups of individuals that wish to remain together as they move throughout the city. For example, a group of tourists may be monitored by a tour operator to keep the group together and on schedule. Alternatively, a group of elementary school children in transit to school should be closely supervised by an adult to ensure the children stay safe. This paper presents...
Vehicular Ad Hoc Networks (VANET) are the fastchanging networks for connected vehicles, in which Vehicle- to-Vehicle and Vehicle-to-Infrastructure communication are the basis for technologies aiming at reducing accidents and improving operation. DSRC Safety Applications, designed to assist drivers in order to avoid accidents, might be subjected to malicious attacks, such as GPS time spoofing attacks,...
Many data center applications are latency-sensitive. Monitoring continuously the network latency and reacting to congestion on a network path is important to ensure that the applications performance does not suffer penalties. We show how to use the Precision Time Protocol (PTP) to infer network latency and packet loss in data centers, and we conduct network latency and packet loss measurements in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.