The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The lack of technical equipment is one of the hurdles in facing challenges in engineering education and basic research for universities in developing countries. In this paper we present a low-cost laboratory mostly based on commercial off-the-shelf wifi routers. A basic workbench is made out of three second hand wireless routers. Our local market provided plenty of used D-Link DIR-300. Total cost...
The design of Wireless Network Interface Card device driver, based on PCI bus, is the key part of WMN(Wireles Mesh Network). MIPS and uclinux based development environment, Network Interface Card device driver RT2860 oriented are designed and realized. Combining to network protocol of IEEE 802.11, this paper focuses on the initialization, opening, transmission and receive, interrupt handling of RT2860...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
Taking advantage of computing capabilities offered by modern parallel and distributed architectures is fundamental to run large-scale simulation models based on the Parallel Discrete Event Simulation (PDES) paradigm. By relying on this computing organization, it is possible to effectively overcome both the power and the memory wall, which are core limiting aspects to deliver high-performance simulations...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
In-memory key-value store is a crucial building block of large-scale web architecture. Given the growth of the data volume and the need for low-latency responses, cost-effective storage expansion and fast large-message processing are the major challenges. In this paper, we explore the design of key-value middleware that takes advantage of modern NVMe SSDs and RDMA interconnects to achieve high performance...
RDMA (Remote Direct Memory Access) is a technology that enables user applications to perform direct data transfer between the virtual memory of processes on remote endpoints, without operating system involvement or intermediate data copies. Achieving zero intermediate data copies using RDMA requires specialized network interface hardware. Software RDMA drivers emulate RDMA semantics in software to...
We propose a server-based approach to manage a general-purpose graphics processing unit (GPU) in a predictable and efficient manner. Our proposed approach introduces a GPU server task that is dedicated to handling GPU requests from other tasks on their behalf. The GPU server ensures bounded time to access the GPU, and allows other tasks to suspend during their GPU computation to save CPU cycles. By...
Laser shooting will gradually replace the traditional live fire shooting as the main shooting training method, this paper discusses the Linux environment based on laser shooting system server-side software design ideas and implementation of the program. The software uses a multithreaded architecture, the use of message queues as a tool for communication between threads. Based on the V4L2 standard-driven...
Wi-Fi network packet capturing techniques are used to examine and capture real-time running packets, is a crucial step to analyze and evolve communication protocols. On most mobile phones based on Android system, FullMAC Wi-Fi chips are used in WLAN subsystem, and the secure digital input output (SDIO) interface is used between Wi-Fi chip and host driver. Most Wi-Fi capture tools are not suitable...
The evolution of commodity PCs towards multi-core processing platforms equipped with high-speed network interfaces makes them reasonable and cost effective targets for the implementation of generic network functions. In addition, the availability of software accelerated I/O frameworks provides a convenient ground for running a broad variety of applications, from simple software switches to more complex...
Today's data center servers are equipped with high speed and complex network adaptors, featuring an array of functions, e.g. hardware TX/RX queues, packet filters, rate limiters, etc. Recent work like IX, Arrakis, MultiStack has made us rekindle the user-level network stacks' innovation utilizing these commodity network adaptors. In this paper, we revisit the idea to move stacks' design from in-kernel...
This research presents object-based design and implementation techniques to build a Microcontroller-based Multi-channel Modbus Master for industrial automation systems. The proposed Modbus Master is designed to support various kinds of slave devices. It can communicate to multiple types, vendors, protocols and communication properties of the target slave devices. The master device can choose and communicate...
Nowadays, the demand for more IP addresses resulted in the shift from IPv4 to IPv6. Besides solving a couple of daily life problems and certain business issues of communication and access to information, one of the major features of IPv6 is that of Mobility. This work presents improvements in the Internet protocol in terms of comparisons with the previous implementation i.e. IPv4. The main contribution...
Network firewall rules are usually written by administrators or automated intrusion detection systems and often contain inconsistencies. Therefore, it is fundamental to ensure that only an absolutely correct configuration is active. In this paper, we design an open source conflict resolution framework (C application and Linux firewall kernel module on top of netfilter) that can be used as a constant...
Because of the rapid development of EtherCAT as the standard fieldbus in control and automation and the increasing demands of low cost portable main controllers, we aim to assess the performance of an EtherCAT network in handling real-time demands using open source EtherCAT master protocol on open hardware platforms. In comparison to that of commercial products, the performance of open platforms is...
For a given TCP or UDP flow, protocol processing of incoming packets is performed on the core that receives the interrupt, while the user-space application which consumes the data may run on the same or a different core. If the cores are not the same, additional costs due to context switches, cache misses, and the movement of data between the caches of the cores may occur. The magnitude of this cost...
Many applications these days require data processing that is both efficient and reliable. Distributed databases are one way to meet these requirements, but must be updated using distributed transactions. To manage foreign key constraints, secondary indices, and materialized views in distributed environments, read atomic multi-partition (RAMP) transactions demonstrate high efficiency. RAMP transactions...
Security in Cyber-Physical Systems (CPS) has become a serious concern owing to the rapid adoption of technologies such as plug-and-play connectivity, robotics and remote coordination and control. It is well understood that the performance overhead incurred due to security considerations is rather high, which needs to be captured holistically for a real-time CPS with strict timing budget and hard deadlines...
Cloud computing is one of the most popular Internet concepts, and many large companies provide cloud services to users. These large companies have built their own data centers to support upper layers of cloud services. To save cost and increase flexibility, SDN and virtualization technologies are widely used in data centers. Open vSwitch is an open source virtual switch that supports the OpenFlow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.