Academia.eduAcademia.edu

Communication Protocol

6,486 papers
1,118 followers
AI Powered
A communication protocol is a set of rules and conventions that govern the exchange of data between devices in a network. It defines the syntax, semantics, and synchronization of communication, ensuring that data is transmitted accurately and efficiently across different systems.
Many different quantum information communication protocols such as teleportation, dense coding and entanglement based quantum key distribution are based on the faithful transmission of entanglement between distant location in an optical... more
This paper presents PROTOB, an object-oriented methodology and CASE system based on an extended dataflow model dcfined using PROT nets. It consists of several tools supporting specification, modclling and prototyping activities within the... more
Consider the problem to design a component that combined with a known part of a system, called the context, conforms to a given overall specification. This question arises in several applications ranging from logic synthesis to the design... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
Long reconfiguration times form a major bottleneck in dynamic reconfigurable systems. Many approaches have been proposed to address this problem. However, improvements in the configuration circuit that introduces this overhead are usually... more
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication protocols to address real-time requirements of these... more
Design space exploration is a component of the product optimization process that confronts the architect with the task of evaluating a large number of design choices. In order to achieve this goal software tools are used to automatically... more
Races in Message Sequence Charts may lead to a bad interpretation of described behaviours, and are often considered as a design error. While there is a quadratictime algorithm detecting races in Basic Message Sequence Charts (BMSCs), the... more
The objective of the Canadian Advanced Nanospace eXperiment (CanX) program is to develop highly capable "nanospacecraft," or spacecraft under 10 kilograms, in short timeframes of 2-3 years. CanX missions offer low-cost and rapid access to... more
The objective of the Canadian Advanced Nanospace eXperiment (CanX) program is to develop highly capable "nanospacecraft," or spacecraft under 10 kilograms, in short timeframes of 2-3 years. CanX missions offer low-cost and rapid... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
Many organizations around the world have started to adopt Web services as well as server farms and clouds hosted by large enterprise and data centers for various applications. Web Services offer several advantages over other communication... more
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. Previously, we have proposed the concept for a fully-distributed, but non-optimum opportunistic... more
The purpose of this article is to accomplish various appointed objectives. The objectives of this article include: to become acquainted with the Modbus RTU protocol, to implement the Modbus RTU protocol onto an Arduino Uno microcontroller... more
The purpose of this article is to accomplish various appointed objectives. The objectives of this article include: to become acquainted with the Modbus RTU protocol, to implement the Modbus RTU protocol onto an Arduino Uno microcontroller... more
Dagstuhl seminar 10381 on robust query processing (held 19.09.10 -24.09.10) brought together a diverse set of researchers and practitioners with a broad range of expertise for the purpose of fostering discussion and collaboration... more
The increasing complexity of embedded systems requires modeling at higher levels of abstraction. Transaction level modeling (TLM) has been proposed to abstract communication for high-speed system simulation and rapid design space... more
We develop an octonionic representation of the payoff function for three player, two strategy, maximally entangled quantum games in order to obtain computationally friendly version of this function. This computational capability is then... more
The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers of computational resources to express their technical and economic... more
In developing countries, demand for 24x7x365 availability of reliable power is on rise. On the other side distribution utilities in these countries, finds growing deployment of renewables driven distributed generation. This on one side,... more
We address the problem of minimizing the communication involved in the exchange of similar documents. We consider two users, A and B, who hold documents x and y respectively. Neither of the users has any information about the other's... more
This paper presents a family of intelligent ultra low R DSON power switches replacing electromechanical relays in the car. This approach removes fuses and reduces wire harness complexity with a significant system cost savings. The paper... more
A.4 Results obtained by simulating in urban scenario the ES configuration (chunk_size=28278, timeout=6.00000, max_attempts=9). . . . . . . A.5 Results obtained by simulating in urban scenario the SA configuration (chunk_size=19756,... more
The evaluation of new communication protocols for Vehicular Ad-hoc Networks (VANETs) is a hot topic in research. An efficient design and actual deployment of such software tools is crucial for any VANET. The design phase is difficult and... more
The emerging field of vehicular ad hoc networks (VANETs) deals with a set of communicating vehicles which are able to spontaneously interconnect without any pre-existing infrastructure. In such kind of networks, it is crucial to make an... more
Due to the autonomous nature of spacecraft, on-board devices feature relatively complex functionality in their software, including interface(s) that provide telecommands and telemetry. Once in space, the devices are physically... more
Address-Event-Representation (AER) is a pixels whose code or address was on the bus. In this way, communication protocol for transferring asynchronous events cells with the same address in the emitter and receiver chips between VLSI... more
Presently, there are many research work for sensor networks. In our previous work, we implemented a simulation system for sensor networks. But, we considered that the event node is stationary in the observation field. However, in many... more
We discuss the design and implementation of network and transport layer protocols for mobile networking. The network architecture used is unique in that it separates the mobile network(s) from fixed networks and provides connectivity... more
The next-generation electric power systems (smart grid) are studied intensively as a promising solution for energy crisis. One important feature of the smart grid is the integration of high-speed, reliable and secure data communication... more
This paper describes the implementation and test of a control and data acquisition board designed to be integrated on systems demanding high availability and reliability, foreseen for future experiments like ITER or other long operation... more
1976 TABLE I [14] J. C. Ashlock and S. M. Lurie, "On the application of extremevalue statistics to command oriented problems," Jet Propulsion Actual BER Estimated BER Lab.,Pasadena, CA,Tech. Rep. 32-1025, Oct. 15, 1966. [15] E. C. Posner,... more
Digital signal processors are highly used in a large variety of today's domestic and industrial applications. This paper emphasizes on the principles and techniques involved in professional audio processing field. Some basic digital... more
In this paper, we present a machine-learning technique to counteract jamming attacks in underwater networks. Indeed, this is relevant in security applications where sensor devices are located in critical regions, for example, in the case... more
The advent of high-speed networks has resulted in increased communication processing requirements. In order to meet this increase in processing requirements, a multiprocessing network interface is considered for processing multiple layers... more
We consider models of N interacting objects, where the interaction is via a common resource and the distribution of states of all objects. We consider the case where the number of transitions per time slot per object vanishes as N grows.... more
L.0 is an executable specification language designed for describing communications protocols and similar reactive systems. L.0 is synchronous and rule-based. The rules are either cause-effect rules or constraints. Rules can be activated... more
We propose two algorithms to form spanning trees in sensor networks. The first algorithm forms hierarchical clusters of spanning trees with a given root, the sink. All of the nodes in the sensor network are then classified iteratively as... more
We study the problem of discrete distribution testing in the two-party setting. For example, in the standard closeness testing problem, Alice and Bob each have t samples from, respectively, distributions a and b over [n], and they need to... more
The need for precision measurement of dc current in the nanoampere and picoampere ranges is continuously increasing. The present paper discusses in detail the establishment of measurement facility for the first time at NPLI for these low... more
The Planets Testbed, a key outcome of the EC co-funded Planets project, is a web based application that provides a controlled environment where users can perform experiments on a variety of preservation tools using sample data and a... more
We present an approach for applying symmetry reduction techniques to probabilistic model checking, a formal verification method for the quantitative analysis of systems with stochastic characteristics. We target systems with a set of... more
Deriving test cases from formal specifications of communicating processes has been studied for a while. Several methods have been proposed for specifications based on FSM (Finite State Machines), LTS (Labelled Transition Systems), IOTS... more
There has been a lot of research on testing based on formal specifications, especially in the area of communication protocols. Most approaches take as starting point some finite model of the required behaviours of the system under test,... more
Para la realización del análisis de un protocolo de comunicaciones en una red de tipo Ad Hoc es necesario incluir en el modelo no solamente las características internas del protocolo sino, además, el contexto propio bajo el cual se... more
In this paper, we study the verification of dense time properties by discrete time analysis. Interval Duration Logic, (IDL), is a highly expressive dense time logic for specifying properties of real-time systems. Validity checking of IDL... more