Search results for "Header"

showing 6 items of 6 documents

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks

2013

In modern networks, HTTP clients communicate with web servers using request messages. By manipulating these messages attackers can collect confidential information from servers or even corrupt them. In this study, the approach based on anomaly detection is considered to find such attacks. For HTTP queries, feature matrices are obtained by applying an n-gram model, and, by learning on the basis of these matrices, growing hierarchical self-organizing maps are constructed. For HTTP headers, we employ statistical distribution models based on the lengths of header values and relative frequency of symbols. New requests received by the web-server are classified by using the maps and models obtaine…

Self-organizing mapWeb serverComputer scienceServerHeaderSingle-linkage clusteringAnomaly detectionIntrusion detection systemData miningWeb servicecomputer.software_genrecomputer
researchProduct

Improving pediatric radiation dose management using Agfa digital radiography DICOM header information

2007

Dose reduction in pediatric explorations is especially important because of children radiation sensitivity. According to this, with the aim of saving radiation exposure in future clinical practice, we have developed a technique to control delivered dose in pediatric radiographic exams. To that, a computer science program has been developed to calculate entrance skin dose (ESD) provided by AGFA radiology digital system, using the "lgM" parameter exported from Dicom files. ESD values are compared with dose limits established in regulations to detect if children are being exposed to excessive amounts of radiation during their explorations.

Malemedicine.medical_specialtybusiness.industryRadiographyRadiation DosageRadiographic Image EnhancementRadiation exposureDICOMEntrance skin doseChild PreschoolHeaderHumansMedicineDosimetryFemaleDose reductionMedical physicsChildbusinessNuclear medicineSoftwareDigital radiography2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
researchProduct

Stability of Positive Systems in WSN Gateway for IoT&IIoT

2020

Modern sensor networks work on the basis of intelligent sensors and actuators, their connection is carried out using conventional or specifically dedicated networks. The efficiency and smooth transmission of such a network is of great importance for the accuracy of measurements, sensor energy savings, or transmission speed. Ethernet in many networks is typically based on the TCP/IP protocol suite. Regardless of whether or not the network transmission is wired or wireless, it should always be reliable. TCP ensures transmission reliability through retransmissions, congestion control and flow control. But TPC is different in networks based on the UDP protocol. The most important here is the tr…

Flow control (data)0209 industrial biotechnologyAutomatic controlbusiness.industryComputer scienceMetzler matrixComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork system stability020206 networking & telecommunications02 engineering and technologyWireless sensor networkslaw.inventionNetwork congestion020901 industrial engineering & automationIntelligent sensorIndustrial IoTlawHeaderInternet Protocol0202 electrical engineering electronic engineering information engineeringUser Datagram ProtocolSoftware testing methodologybusinessWireless sensor networkComputer network
researchProduct

Distance Constrained Mapping to Support NoC Platforms Based on Source Routing

2010

Efficient NoC is crucial for communication among processing elements in a highly parallel processing systems on chip. Mapping cores to slots in a NoC platform and designing efficient routing algorithms are two key problems in NoC design. Source routing offers major advantages over distributed routing especially for regular topology NoC platforms. But it suffers from a serious drawback of overhead since it requires whole communication path to be stored in every packet header. In this paper, we present a core mapping technique which helps to achieve a mapping with the constraint over the path length. We have found that the path length constraint of just 50% is sufficient in most cases. We als…

Routing protocolDynamic Source RoutingEqual-cost multi-path routingComputer scienceRouting tableDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolGeographic routingSource routingRouting Information ProtocolHeaderDestination-Sequenced Distance Vector routingTriangular routingZone Routing ProtocolStatic routingbusiness.industryPolicy-based routingPath vector protocolDSRFLOWNetwork on a chipLink-state routing protocolRouting domainMultipath routingbusinessComputer network
researchProduct

ZERO: An Efficient Ethernet-Over-IP Tunneling Protocol

2013

An Ethernet over IPv4 tunneling protocol is proposed, which categorizes all Ethernet frames to be tunneled into NICE and UGLY frames. The UGLY frames are tunneled by traditional methods, such as UDP or GRE encapsulation, resulting in substantial overhead due to additional headers and fragmentation usually required to transport long Ethernet frames over IP network typically limited to MTU=1,500 bytes. Meanwhile the NICE Ethernet frames are tunneled without any overhead as plain IPv4 packets due to non-traditional reuse of “fragment offset” or “identification” field in the IP header. It is shown that for typical Internet traffic transported over Ethernet, the proposed ZERO tunneling protocol …

Ethernetcomputer.internet_protocolNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMultiprotocol Label SwitchingTunneling protocolEthernet frameIP headerIP tunnelInternet protocol suitebusinesscomputerComputer network
researchProduct