10,052 research outputs found
An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks
A high degree of reliability for critical data transmission is required in
body sensor networks (BSNs). However, BSNs are usually vulnerable to channel
impairments due to body fading effect and RF interference, which may
potentially cause data transmission to be unreliable. In this paper, an
adaptive and flexible fault-tolerant communication scheme for BSNs, namely
AFTCS, is proposed. AFTCS adopts a channel bandwidth reservation strategy to
provide reliable data transmission when channel impairments occur. In order to
fulfill the reliability requirements of critical sensors, fault-tolerant
priority and queue are employed to adaptively adjust the channel bandwidth
allocation. Simulation results show that AFTCS can alleviate the effect of
channel impairments, while yielding lower packet loss rate and latency for
critical sensors at runtime.Comment: 10 figures, 19 page
Formal Scheduling Constraints for Time-Sensitive Networks
In recent years, the IEEE 802.1 Time Sensitive Networking (TSN) task group
has been active standardizing time-sensitive capabilities for Ethernet networks
ranging from distributed clock synchronization and time-based ingress policing
to frame preemption, redundancy management, and scheduled traffic enhancements.
In particular the scheduled traffic enhancements defined in IEEE 802.1Qbv
together with the clock synchronization protocol open up the possibility to
schedule communication in distributed networks providing real-time guarantees.
In this paper we formalize the necessary constraints for creating
window-based IEEE~802.1Qbv Gate Control List schedules for Time-sensitive
Networks (TSN). The resulting schedules allow a greater flexibility in terms of
timing properties while still guaranteeing deterministic communication with
bounded jitter and end-to-end latency
A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
Datacenter Traffic Control: Understanding Techniques and Trade-offs
Datacenters provide cost-effective and flexible access to scalable compute
and storage resources necessary for today's cloud computing needs. A typical
datacenter is made up of thousands of servers connected with a large network
and usually managed by one operator. To provide quality access to the variety
of applications and services hosted on datacenters and maximize performance, it
deems necessary to use datacenter networks effectively and efficiently.
Datacenter traffic is often a mix of several classes with different priorities
and requirements. This includes user-generated interactive traffic, traffic
with deadlines, and long-running traffic. To this end, custom transport
protocols and traffic management techniques have been developed to improve
datacenter network performance.
In this tutorial paper, we review the general architecture of datacenter
networks, various topologies proposed for them, their traffic properties,
general traffic control challenges in datacenters and general traffic control
objectives. The purpose of this paper is to bring out the important
characteristics of traffic control in datacenters and not to survey all
existing solutions (as it is virtually impossible due to massive body of
existing research). We hope to provide readers with a wide range of options and
factors while considering a variety of traffic control mechanisms. We discuss
various characteristics of datacenter traffic control including management
schemes, transmission control, traffic shaping, prioritization, load balancing,
multipathing, and traffic scheduling. Next, we point to several open challenges
as well as new and interesting networking paradigms. At the end of this paper,
we briefly review inter-datacenter networks that connect geographically
dispersed datacenters which have been receiving increasing attention recently
and pose interesting and novel research problems.Comment: Accepted for Publication in IEEE Communications Surveys and Tutorial
Advanced information processing system for advanced launch system: Avionics architecture synthesis
The Advanced Information Processing System (AIPS) is a fault-tolerant distributed computer system architecture that was developed to meet the real time computational needs of advanced aerospace vehicles. One such vehicle is the Advanced Launch System (ALS) being developed jointly by NASA and the Department of Defense to launch heavy payloads into low earth orbit at one tenth the cost (per pound of payload) of the current launch vehicles. An avionics architecture that utilizes the AIPS hardware and software building blocks was synthesized for ALS. The AIPS for ALS architecture synthesis process starting with the ALS mission requirements and ending with an analysis of the candidate ALS avionics architecture is described
- …