14,624 research outputs found

    CSP channels for CAN-bus connected embedded control systems

    Get PDF
    Closed loop control system typically contains multitude of sensors and actuators operated simultaneously. So they are parallel and distributed in its essence. But when mapping this parallelism to software, lot of obstacles concerning multithreading communication and synchronization issues arise. To overcome this problem, the CT kernel/library based on CSP algebra has been developed. This project (TES.5410) is about developing communication extension to the CT library to make it applicable in distributed systems. Since the library is tailored for control systems, properties and requirements of control systems are taken into special consideration. Applicability of existing middleware solutions is examined. A comparison of applicable fieldbus protocols is done in order to determine most suitable ones and CAN fieldbus is chosen to be first fieldbus used. Brief overview of CSP and existing CSP based libraries is given. Middleware architecture is proposed along with few novel ideas

    Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks

    Get PDF
    In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes a recovery framework that may be included in the SLA contract between ISP and customers in order to provide the required level of survivability. A key concern with such a recovery framework is how to present the different survivability alternatives including recovery techniques, failure scenario and layered integration into a transparent manner for customers. In this paper, two issues are investigated. First, the performance of the recovery framework when applying a proposed mapping procedure as an admission control mechanism in the edge router considering a smart-edge simple-core GMPLS-based IP/WDM network is considered. The second issue pertains to the performance of a pre-allocated restoration and its ability to provide protected connections under different failure scenarios

    Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea

    Get PDF
    Crime is a core issue for companies and more recently for NGOs working in Papua New Guinea (PNG). The nation is facing major challenges as crime levels rise exponentially across the country. Erstwhile un-affected humanitarian operations were often seen as immune from criminality, but now have become just as likely to be targeted as any other organisation. Consequently, there is a need to adopt security measures, but maybe not necessarily as draconian as those used hitherto by major companies. People-centered, locally-owned is a concept whereby the local population is encouraged to protect the delivery of health services and aid from humanitarian providers. The inclusive approach challenges previous concepts of what is required to protect workers in intimidating and dangerous areas. A mind-set change is required. The proposed multi-layered approach stems from defence-in-depth strategies. Although such a strategy is still primarily based upon the security risk assessment process, at the core of all operational security required in challenging environments, it also requires a proactive approach combined with engagement with the local population based around the Aid-security-triangle. The methodology used interpretative analysis of relevant literature underpinned by personal interviews with selected stake holders in the PNG during 2014

    QoS provisioning in multimedia streaming

    Get PDF
    Multimedia consists of voice, video, and data. Sample applications include video conferencing, video on demand, distance learning, distributed games, and movies on demand. Providing Quality of Service (QoS) for multimedia streaming has been a difficult and challenging problem. When multimedia traffic is transported over a network, video traffic, though usually compressed/encoded for bandwidth reduction, still consumes most of the bandwidth. In addition, compressed video streams typically exhibit highly variable bit rates as well as long range dependence properties, thus exacerbating the challenge in meeting the stringent QoS requirements of multimedia streaming with high network utilization. Dynamic bandwidth allocation in which video traffic prediction can play an important role is thus needed. Prediction of the variation of the I frame size using Least Mean Square (LMS) is first proposed. Owing to a smoother sequence, better prediction has been achieved as compared to the composite MPEG video traffic prediction scheme. One problem with this LMS algorithm is its slow convergence. In Variable Bit Rate (VBR) videos characterized by frequent scene changes, the LMS algorithm may result in an extended period of intractability, and thus may experience excessive cell loss during scene changes. A fast convergent non-linear predictor called Variable Step-size Algorithm (VSA) is subsequently proposed to overcome this drawback. The VSA algorithm not only incurs small prediction errors but more importantly achieves fast convergence. It tracks scene changes better than LMS. Bandwidth is then assigned based on the predicted I frame size which is usually the largest in a Group of Picture (GOP). Hence, the Cell Loss Ratio (CLR) can be kept small. By reserving bandwidth at least equal to the predicted one, only prediction errors need to be buffered. Since the prediction error was demonstrated to resemble white noise or exhibits at most short term memory, smaller buffers, less delay, and higher bandwidth utilization can be achieved. In order to further improve network bandwidth utilization, a QoS guaranteed on-line bandwidth allocation is proposed. This method allocates the bandwidth based on the predicted GOP and required QoS. Simulations and analytical results demonstrate that this scheme provides guaranteed delay and achieves higher bandwidth utilization. Network traffic is generally accepted to be self similar. Aggregating self similar traffic can actually intensify rather than diminish burstiness. Thus, traffic prediction plays an important role in network management. Least Mean Kurtosis (LMK), which uses the negated kurtosis of the error signal as the cost function, is proposed to predict the self similar traffic. Simulation results show that the prediction performance is improved greatly as compared to the LMS algorithm. Thus, it can be used to effectively predict the real time network traffic. The Differentiated Service (DiffServ) model is a less complex and more scalable solution for providing QoS to IP as compared to the Integrated Service (IntServ) model. We propose to transport MPEG frames through various service classes of DiffServ according to the MPEG video characteristics. Performance analysis and simulation results show that our proposed approach can not only guarantee QoS but can also achieve high bandwidth utilization. As the end video quality is determined not only by the network QoS but also by the encoded video quality, we consider video quality from these two aspects and further propose to transport spatial scalable encoded videos over DiffServ. Performance analysis and simulation results show that this can provision QoS guarantees. The dropping policy we propose at the egress router can reduce the traffic load as well as the risk of congestion in other domains

    Evaluating the Stream Control Transmission Protocol Using Uppaal

    Get PDF
    The Stream Control Transmission Protocol (SCTP) is a Transport Layer protocol that has been proposed as an alternative to the Transmission Control Protocol (TCP) for the Internet of Things (IoT). SCTP, with its four-way handshake mechanism, claims to protect the Server from a Denial-of-Service (DoS) attack by ensuring the legitimacy of the Client, which has been a known issue pertaining to the three-way handshake of TCP. This paper compares the handshakes of TCP and SCTP to discuss its shortcomings and strengths. We present an Uppaal model of the TCP three-way handshake and SCTP four-way handshake and show that SCTP is able to cope with the presence of an Illegitimate Client, while TCP fails. The results confirm that SCTP is better equipped to deal with this type of attack.Comment: In Proceedings MARS 2017, arXiv:1703.0581

    An Introduction To The Implementation Of The User Datagram Protocol

    Get PDF

    HYPERMEDIA, INFORMATION SYSTEMS AND ORGANIZATIONS: A RESEARCH AGENDA

    Get PDF
    Although hypermedia systems are becoming more sophisticated and readily available as of thee shelf products, there are few hypermedia applications within business and industrial organizations. This paper argues that this phenomena is rooted in the concept of hypermedia applications as standalone programs. Larger acceptance of hypermedia within organizations will occur once this technology is better integrated with other organizational systems and applied to carefully selected tasks. The paper identifies three areas for research in this context: the tasks perspective, which deals with selecting tasks for which to develop hypermedia applications, the knowledge perspective, which deals with representing and managing the knowledge processed by organizations, and the integration perspective, which deals with technical issues in software integration. This paper suggests that solutions to the problems presented will prompt the acceptance of hypermedia technology within organizations.Information Systems Working Papers Serie
    • …
    corecore