Communication Protocol Research Papers - Academia.edu (original) (raw)

Abstrak Pengaturan dan monitoring kecepatan putar motor DC dalam sebuah sistem proses sangat penting peranannya dalam implementasi industri. Pengaturan dan monitoring kecepatan putar motor DC ini menggunakan perangkat antarmuka komputer... more

Abstrak Pengaturan dan monitoring kecepatan putar motor DC dalam sebuah sistem proses sangat penting peranannya dalam implementasi industri. Pengaturan dan monitoring kecepatan putar motor DC ini menggunakan perangkat antarmuka komputer dimana dalam industri hal ini diperlukan untuk memudahkan operator dalam mengatur dan memonitor kecepatan motor.

The Internet of Things (IoT) has promised a future where everything gets connected. Unfortunately, building a single global ecosystem of Things that communicate with each other seamlessly is virtually impossible today. The reason is that... more

The Internet of Things (IoT) has promised a future where everything gets connected. Unfortunately, building a single global ecosystem of Things that communicate with each other seamlessly is virtually impossible today. The reason is that the IoT is essentially a collection of isolated " Intranets of Things " , also referred to as " vertical silos " , which cannot easily and efficiently interact with each other. Smart cities are perhaps the most striking examples of this problem since they comprise a wide range of stakeholders and service providers who must work together, including urban planners, financial organisations, public and private service providers, telecommunication providers, industries, citizens, and so forth. Within this context, the contribution of this paper is threefold: (i) discuss business and technological implications as well as challenges of creating successful open innovation ecosystems, (ii) present the technological building blocks underlying an IoT ecosystem developed in the framework of the EU Horizon 2020 programme, (iii) present a smart city pilot (Heat Wave Mitigation in Métropole de Lyon) for which the proposed ecosystem significantly contributes to improving interoperability between a number of system components, and reducing regulatory barriers for joint service co-creation practices.

IEC 61850 was proposed as a standard protocol for communications within the substation. In its current edition, the standard does not cover communications outside the substation, either with the control center or with other substations,... more

IEC 61850 was proposed as a standard protocol for communications within the substation. In its current edition, the standard does not cover communications outside the substation, either with the control center or with other substations, for instance for remote protection. However, during the recent years, there has been a general belief that some features of the standard can be efficiently utilized for applications outside the substation as well. With the advent of new monitoring and control technologies the idea of power system automation at the distribution system and feeder level is crossing new boundaries. In such applications, accessing the accurate data is a necessity. With its future-proof object oriented structure, IEC 61850 can provide comprehensive and accurate information models for various components of distribution automation systems. This paper provides some examples on how the standard can be employed for this purpose, and what measures need to be taken to enable it to efficiently respond to some of the emerging technologies in distribution automation systems.

Within a smart home environment the information processing is supposed to be thoroughly integrated into everyday objects. This introduces the need to keep track of the everyday objects and their state changes produced based on the... more

Within a smart home environment the information processing is supposed to be thoroughly integrated into everyday objects. This introduces the need to keep track of the everyday objects and their state changes produced based on the userpsilas interaction with them. Such information is useful in recognizing the userpsilas activities, situations, etc. In this paper we present a ZigBee communication protocol

A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more

A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.

In Body Area Networks (BANs), quality of service is needed to provide reliable data communication over prioritized data streams coming from energy constrained sensors attached to, or possibly implanted in, patients. In this work, we... more

In Body Area Networks (BANs), quality of service is
needed to provide reliable data communication over prioritized
data streams coming from energy constrained sensors attached
to, or possibly implanted in, patients. In this work, we focus on
BAN for real-time data streaming applications, where the realtime
nature of data streams is of critical importance for providing
a useful and efficient sensorial feedback for the user while system
lifetime should be maximized. Thus, bandwidth, throughput and
energy efficiency of the communication protocol must be carefully
optimized. In this paper, we present an Energy-Balanced Rate
Assignment and Routing Protocol (EBRAR). EBRAR selects
routes based on the residual energy, thus, instead of continuously
routing data through an optimized (energy efficient) fixed path,
the data is transported more intelligently and the burden of
forwarding the data is more equally spread among the nodes.
Another unique property of EBRAR is its ability to provide
adaptive resource allocation. Our experimental results show that
the proposed protocol performs well in terms of balancing energy
consumption across the BAN and thus guarantees longer network
lifetime.

This paper describes an integrating hardware and software ensemble for the development of microcontroller-based computer numerical control system. The discuss is focused on design and implementation of the communication between the PC and... more

This paper describes an integrating hardware and software ensemble for the development of microcontroller-based computer numerical control system. The discuss is focused on design and implementation of the communication between the PC and a numerical control machine. Among topics covered are: the C#/.NET serial port programming, and further, how to create a Windows application for sending, trough a COM port, the Computer Aided Design/Manufacturing data needed by a numerical control machine. A PIC microcontroller-based communication hardware module was developed and tested.

The growth of the Internet of Thing (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as... more

The growth of the Internet of Thing (IoT) results in an expanded attack that requires end-to-end security techniques. IoT applications involve in a business-oriented such as insurance and banking, and mission-critical crisis such as e-health and intelligent transportation systems. One of the most protocols commonly used for resource discovery in IoT is the Constrained Application Protocol (CoAP) protocol which fits the constrained devices. There is a need for security support in CoAP for the IoT environment. This paper presents a security approach using TACACS+ to strengthen the security of CoAP. The proposed security mechanism separately supports access control, authentication, and accounting. It has been implemented using a mobile phone and a Raspberry Pi. The mobile phone is used as a client, and the Raspberry Pi is used as a server. The implementation composes of a TI SensorTag and a WeMo switch that are used as resources. This paper, also, presents performance indexes of the security technique in terms of CPU usage, time computation, latency, energy consumption, and traffic exchange between a client and a server. The experimental results show the proposed method is compatible with IoT devices.

The recent advances in cognitive radio technology based on software defined radio platforms have extended the capabilities of wireless communication systems. The unique ability of cognitive radios to alter their communication protocols to... more

The recent advances in cognitive radio technology based on software defined radio platforms have extended the capabilities of wireless communication systems. The unique ability of cognitive radios to alter their communication protocols to meet changing system demands make them great candidates for wireless applications that are difficult to implement using conventional wireless terminals. Small form factor platforms make cognitive radio portable and easy to deploy. This paper discusses the design and implementation methodology to build a cognitive radio on small form factor platform with heterogeneous processing architecture. The result of this discussion is a configurable wireless transceiver that features two important concepts of cognitive radio, namely configurability and adaptability.