Search results for "Protocol"

showing 10 items of 1808 documents

Review of IEEE 802.22 and IEC 61850 for real-time communication in Smart Grid

2015

Real time data communication in Smart Grid is a big challenge due to its vastness and complexities. Wireless Regional Area Network (WRAN) - IEEE 802.22 permits opportunistic use of television white space (TVWS) by secondary user, if it is not being utilized by primary user. This standard has the potential to transfer big data of smart grid in real time to control center. The IEC 61850 is the standard for electrical substation automation that uses TCP/IP for data transfer among different ‘intelligent electronic devices’ (IEDs). IEC 61850 consists of different message types which belong to different performance classes that are mapped to different communication protocols. The different perfor…

EthernetIEEE 802.22Smart gridDNP3IEC 61850business.industryComputer scienceWide area networkReal-time computingManufacturing Message SpecificationCommunications protocolbusinessComputer network2015 International Conference on Computing and Network Communications (CoCoNet)
researchProduct

Gigabit Ethernet backbones with active loops

2001

The current standard Ethernet switches are based on the Spanning Tree (ST) protocol. Their most important restriction is that they can not work when the topology has active loops. In fact, the ST protocol selects a tree from the real topology by blocking the links that are not involved in the tree. This restriction produces a network traffic unbalancing behavior saturating those link near the root switch while rest of links will be idle or with a very low utilization. This paper proposes a new transparent switch protocol for Gigabit Ethernet backbones that considerably improves the performance of current ones. The proposed protocol is named ALOR for Active Loops and Optimal Routing. ALOR pr…

EthernetMedia Redundancy ProtocolEthernet Global Data ProtocolComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEthernet flow controlGigabit EthernetLocal area networkCore networkJumbo frameSpanning Tree ProtocolNetwork topologyMetro EthernetSynchronous EthernetNetwork interface controllerGigabitEtherChannelFiber Distributed Data InterfacebusinessATA over EthernetComputer networkCarrier EthernetInternational Conference on Parallel Processing, 2001.
researchProduct

SmartARP: merging IP and MAC addressing for low-cost gigabit Ethernet networks

1999

Abstract Address Resolution Protocol (ARP) is one of the key TCP/IP stack protocols, used on LANs to map 32 bit IP addresses into 48 bit hardware addresses. Regular ARP uses MAC layer broadcasts to perform the mapping. In this paper a new server-based ARP extension (smartARP) is proposed, which allows the extension of ARP functionality beyond a single MAC layer broadcast domain. Compared to regular IP router, smartARP together with simple broadcast-filtering switches presents a low-cost alternative for forwarding packets between MAC layer broadcast domains. SmartARP is transparent to existing IP hosts, operates independent of LAN speed, and scales for big networks.

EthernetProxy ARPComputer Networks and Communicationscomputer.internet_protocolVirtual LANComputer scienceIP forwardinglaw.inventionInternet protocol suitelawNetwork architecturebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGigabit EthernetLocal area networkBroadcast domainOptical IP SwitchingTelecommunications networkIP tunnelForwarding information baseARP spoofingThe InternetAddress Resolution ProtocolbusinesscomputerComputer networkComputer Networks
researchProduct

LSOM: A Link State protocol Over MAC addresses for metropolitan backbones using Optical Ethernet switches

2003

This paper presents a new protocol named "Link State Over MAC" (LSOM) for Optical Ethernet switches to allow the use of active loop topologies, like meshes, in Metropolitan Area Networks (MAN) or even Wide Area Networks (WAN) backbone. In this respect, LSOM is an alternative to a ring topology as proposed in draft IEEE 802.17 Resilient Packet Ring (RPR) or a tree topology using IEEE802. 1D Rapid Spanning Tree Protocol (RSTP). LSOM provides higher scalability and is able to achieve better bandwidth utilization and lower latency than RSTP and RPR. Simulation results for 4-node and 9-node topologies show that LSOM can improve throughput over RPR by a factor of up to 1.7. Furthermore, full free…

Ethernetbusiness.industryComputer scienceDistributed computingResilient Packet RingSynchronous optical networkingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRing networkThroughputNetwork topologySpanning Tree ProtocolOptical switchMetropolitan areaLink-state routing protocolbusinessComputer networkSecond IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003.
researchProduct

A CORBA based architecture for distributed embedded systems using the RTLinux-GPL platform

2004

This paper describes an architecture for distributed computing on the RTLinux-GPL(GPL version of RTLinux, hereafter RTLinux) platform. The proposed architecture implements the CORBA (common object request broker architecture) model of computation, more specifically the minimum CORBA specification for embedded systems, and also provide the extensions for real-time computing. Since RTLinux lacks networking capabilities, the architecture implements all the required functionality in a layered fashion: network drivers, TCP/IP stack and an ORB (object request broker). Most of this work consists on a set of partings of some widely known open source Linux projects to RTLinux: Linux Ethernet device …

Ethernetbusiness.industrycomputer.internet_protocolComputer scienceLocal area networkcomputer.software_genreApplication softwareInteroperable Object ReferenceInternet protocol suiteCommon Object Request Broker ArchitectureEmbedded systemOperating systemObject request brokerbusinesscomputerOrb (optics)Seventh IEEE International Symposium onObject-Oriented Real-Time Distributed Computing, 2004. Proceedings.
researchProduct

ZERO: An Efficient Ethernet-Over-IP Tunneling Protocol

2013

An Ethernet over IPv4 tunneling protocol is proposed, which categorizes all Ethernet frames to be tunneled into NICE and UGLY frames. The UGLY frames are tunneled by traditional methods, such as UDP or GRE encapsulation, resulting in substantial overhead due to additional headers and fragmentation usually required to transport long Ethernet frames over IP network typically limited to MTU=1,500 bytes. Meanwhile the NICE Ethernet frames are tunneled without any overhead as plain IPv4 packets due to non-traditional reuse of “fragment offset” or “identification” field in the IP header. It is shown that for typical Internet traffic transported over Ethernet, the proposed ZERO tunneling protocol …

Ethernetcomputer.internet_protocolNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMultiprotocol Label SwitchingTunneling protocolEthernet frameIP headerIP tunnelInternet protocol suitebusinesscomputerComputer network
researchProduct

Challenges in EU External Climate Change Policy-Making in the Early Post-Lisbon Era: The UNFCCC Copenhagen Negotiations

2011

The 15th United Nations Framework Convention on Climate Change (UNFCCC) Conference of the Parties (COP) meeting held in Copenhagen from 7 to 18 December 2009, which took place one week after the entry into force of the Treaty of Lisbon on 1 December 2009, has brought about rather disappointing outcomes from the perspective of the European Union (EU), which had previously displayed substantial leadership within the UN climate regime. Contrary to the EU’s objectives for the COP15 meeting, no legally binding agreement was reached to succeed the Kyoto Protocol after 2012 and the final Copenhagen Accord contained disappointingly few ambitious targets. This chapter tries to explain how this resul…

European Union lawinternational relationsEuropean lawConference of the partiesUNFCCCGeographyclimate changeUnited Nations Framework Convention on Climate ChangeUnanimityPolitical economymedia_common.cataloged_instanceKyoto ProtocolCopenhagen AccordTreaty of LisbonEuropean unionEUEnvironmental planningmedia_common
researchProduct

Fear-then-relief, mindlessness, and cognitive deficits

2002

The assumption that mindlessness underlies the effectiveness of the ‘fear-then-relief’ social influence technique has been verified in four studies. The first two experiments indicated that compliance of those experiment participants who were made to function on the thoughtful level under a ‘fear-thenrelief’ condition decreases to the level observed in the control group. The other two experiments were to analyze the cognitive functioning of people who at first experience fear and then a sudden and unexpected relief. The first of these experiments indicated that the amount of time needed to detect the expression of emotion on other persons’ faces is prolonged, and the second of these latter …

ExemplificationSocial PsychologyAction (philosophy)JokeCognitive skillSuspectSet (psychology)Think aloud protocolPsychologySocial psychologyCompliance (psychology)European Journal of Social Psychology
researchProduct

Potential applications using LNG cold energy in Sicily

2008

According to previsions, natural gas could be the main energy source worldwide, inducing relevant geopolitical changes. Most likely, such problems will be solved with the development of a gas transportation mode alternative to traditional pipelines: liquefied natural gas (LNG). The global LNG trade has increased rapidly during recent years. A significant amount of energy is consumed to produce low-temperature LNG, which has plenty of cryogenic exergy/ energy. Therefore, the effective utilization of the cryogenic energy associated with LNG vaporization is very important. Sicily, with more than five million inhabitants, is the second biggest region of Italy and in this region will be realized…

ExergyEngineeringEnergy recoveryWaste managementRenewable Energy Sustainability and the Environmentbusiness.industryEnergy Engineering and Power TechnologyFuel TechnologyNuclear Energy and EngineeringNatural gasGreenhouse gasKyoto ProtocolCold chainbusinessEnergy sourceLNG RefrigerationLiquefied natural gas
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct