scispace - formally typeset
Search or ask a question

Showing papers on "Internetwork protocol published in 2006"


Proceedings ArticleDOI
22 Mar 2006
TL;DR: Performance evaluation results show that the proposed cross-layer protocol significantly improves the communication efficiency and outperforms the traditional layered protocol architecture that has been used so far in WSNs.
Abstract: Severe energy constraints of battery-powered sensor nodes necessitate energy-efficient communication protocols in order to fulfill application objectives of wireless sensor networks (WSN). However, the vast majority of the existing solutions are based on classical layered protocols approach. It is much more resource-efficient to have a unified scheme which melts common protocol layer functionalities into a cross-layer module for resource-constrained sensor nodes. To the best of our knowledge, to date, there is no unified cross-layer communication protocol for efficient and reliable event communication which considers transport, routing, medium access functionalities with physical layer (wireless channel) effects for WSNs. In this paper, a unified cross-layer protocol is developed, which replaces the entire traditional layered protocol architecture that has been used so far in WSNs. Our design principle is complete unified cross-layering such that both the information and the functionalities of traditional communication layers are melted in a single protocol. The objective of the proposed crosslayer protocol is highly reliable communication with minimal energy consumption, adaptive communication decisions and local congestion avoidance. To this end, the protocol operation is governed by the new concept of initiative determination. Based on this concept, the cross-layer protocol performs received based contention, local congestion control, and distributed duty cycle operation in order to realize efficient and reliable communication in WSN. Performance evaluation results show that the proposed cross-layer protocol significantly improves the communication efficiency and outperforms the traditional layered protocol architectures.

201 citations


Proceedings ArticleDOI
Xun Chen1, Peng Han1, Qiu-Sheng He1, Shiliang Tu1, Zhanglong Chen1 
20 Sep 2006
TL;DR: A novel multi-channel medium access control protocol for wireless sensor networks that can dynamically assign multiple channels to nodes, thereby significantly increasing network energy efficiency, network lifetime and data throughput as well.
Abstract: In this paper, we propose a novel multi-channel medium access control protocol for wireless sensor networks. Our protocol can dynamically assign multiple channels to nodes, thereby significantly increasing network energy efficiency, network lifetime and data throughput as well. The protocol requires only one transceiver per node, but solves the multi-channel hidden terminal problem through distributed coordinator node. Finally we evaluate the performance of this protocol through simulations. The performance results show that protocol significantly increase network energy efficiency, network lifetime and data throughput and exhibits prominent ability to utilize multi-channel transceiver among neighboring nodes.

118 citations


Patent
Vladimir Kostadinov1
09 Feb 2006
TL;DR: In this article, the authors propose a method and devices for use with multiple communications protocols automatically determine which communications protocol to use when connected to a system bus. But they do not specify which protocols the system is using, only a compatible protocol is selected from one of several communications protocols stored in a device's memory.
Abstract: In one general aspect, methods and devices for use with multiple communications protocols automatically determine which communications protocol to use when connected to a system bus. Signals transmitted on the system bus are monitored to determine what communications protocol the system bus is using. After determining which communications protocol the system is using, a compatible communications protocol is selected from one of several communications protocols stored in a device's memory. As a result, a user may connect a device to the system bus without having to determine which communications protocol is used by the system bus. Furthermore, suppliers may stock a single type of device that is compatible with multiple communications protocols reducing overhead associated with stocking devices. In addition, a device may be switched between systems without regard to the communications protocol of the device or system.

113 citations


Proceedings ArticleDOI
23 Apr 2006
TL;DR: A simple and accurate technique for estimating the throughput of the IEEE 802.11 DCF protocol is developed, based on a rigorous analysis of the Markov chain that corresponds to the time evolution of the back-off processes at the contending nodes.
Abstract: This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the IEEE 802.11 DCF protocol is developed. The technique is based on a rigorous analysis of the Markov chain that corresponds to the time evolution of the back-off processes at the contending nodes. An extension of the technique is presented to handle the case where service differentiation is provided with the use of heterogeneous protocol parameters, as, for example, in IEEE 802.11e EDCA protocol. Our results provide new insights into the operation of such protocols. The techniques developed in the paper are applicable to a wide variety of contention based MAC protocols. Index Terms—Carrier sense multiple-access protocol with colli- sion avoidance (CSMA/CA), diffusion approximation, fixed point analysis,fluidlimit,IEEE80211,IEEE80211e,performanceevalu- ation, performance of the medium access control (MAC) protocols, wireless local-area networks (WLANs).

79 citations


Proceedings ArticleDOI
11 Dec 2006
TL;DR: The MAC protocol proposed in [5] addresses the throughput fairness problem in wireless LANs that provide multi-rate support using an efficient cooperative scheme and shows that it performs efficiently in supporting TCP applications.
Abstract: In wireless LANs that provide multi-rate support (IEEE 802.11a, 802.11b), stations that experience poor channel quality tend to use low transmission rates to reduce the bit-error-rate (BER) of each transmission. This phenomenon usually leads to a throughput fairness problem between the stations with good channel quality and those without. This fairness problem has been shown to result in throughput degradation for the whole network [8]. The MAC protocol proposed in [5] addresses this issue using an efficient cooperative scheme. Under this scheme, low rate stations are assisted by a high rate station, referred to as helper stations, in its transmissions. With such assistance, the low rate station will be able to transmit data at a higher rate in a two-hop manner using the helper station. We implemented this new protocol in a Linux testbed. This paper describes the assumptions, the implementation process and the challenges we were presented with. We evaluated the protocol using our testbed through experiments. The implementation of the protocol shows that it performs efficiently in supporting TCP applications.

60 citations


Patent
06 Jan 2006
TL;DR: In this paper, the authors propose a dual packet protocol where a first protocol includes a frame that specifies a destination device/resource and a data field, and the second protocol specifies a final destination device and includes data field and encapsulated in the first protocol packet frames.
Abstract: The invention includes a method and apparatus for use with a system including networked resources where communication between resources is via a dual packet protocol wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field and where the second packets are encapsulated in the first protocol packet frames the method including the steps of specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining at least a subset of the additional embedded packet information to identify at least one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.

49 citations


Proceedings ArticleDOI
01 Dec 2006
TL;DR: The characteristics of the proposed LPRT protocol are low power consumption, support for real-time and loss intolerant traffic through contention-free operation and a retransmission scheme, flexibility, and high throughput efficiency.
Abstract: This paper presents LPRT, a new medium access control (MAC) protocol for wireless sensing and actuation systems. Some of the characteristics of the proposed protocol are low power consumption, support for real-time and loss intolerant traffic through contention-free operation and a retransmission scheme, flexibility, and high throughput efficiency. The LPRT protocol was implemented it in the MICAz motes, a platform for the development of wireless sensor networks. We also briefly describe a wireless hydrotherapy application that benefits from the use of the proposed protocol. This paper also provides experimental results and comparison of the proposed protocol with the CSMA/CA protocol of IEEE 802.15.4.

41 citations


Patent
18 Sep 2006
TL;DR: The protocol server module translates data packets from the source between the first protocol and a second protocol and transports the data packets having the second protocol to the destination as mentioned in this paper, in which the source is one of a client device operating system protocol stack and the host system and the destination is a PPP server module located on the client device.
Abstract: Communicating data packets between a client device and a host system generally includes using a protocol server module, located on the client device, that terminates a communication session that uses a first protocol and that is intended to enable communications between a source and a destination, in which the source is one of a client device operating system protocol stack and the host system and the destination is one of the client device operating system protocol stack and the host system but differs from the source. The protocol server module translates data packets from the source between the first protocol and a second protocol that is different from the first protocol and transports the data packets having the second protocol to the destination. A controller module generally also is included on the client device. The protocol server module may include a PPP server module located on the client device.

38 citations


Journal ArticleDOI
TL;DR: Analysis and simulation results confirm the effectiveness of the p-persistent protocol in achieving the optimal throughput and in improving the frame delay, and the protocol can be easily extended to be a distributed priority mechanism, which requires further research.
Abstract: This paper focuses on the design and the performance evaluation of a p-persistent transmission control protocol that can enhance the IEEE 802.11 MAC, namely the p-persistent IEEE 802.11 DCF. Unlike the well-known p-persistent CSMA for modeling the legacy IEEE 802.11 MAC, the proposed protocol truly exploits the p-persistent transmission capability for this MAC. Moreover, the protocol is not restricted to IEEE 802.11 and, in fact, it can be executed on the top of a pre-existent access protocol without introducing additional overhead. When considered with WLAN, this protocol can optimize the throughput of the wireless network by setting the optimal transmission probability in the IEEE 802.11 MAC according to the throughput calculation given in this paper. The key characteristics of this protocol are represented by its simplicity, integration with the Standard, complete distribution, absence of modifications to the original IEEE 802.11 MAC frame format, and no requirement of extra messages being shared by the cooperating nodes. Analysis and simulation results confirm the effectiveness of the p-persistent protocol in achieving the optimal throughput and in improving the frame delay. In addition, the protocol can be easily extended to be a distributed priority mechanism, which requires further research.

37 citations


Proceedings ArticleDOI
24 May 2006
TL;DR: This paper presents the design of secure-SPIN, a secure extension for the SPIN protocol, and shows that this secure protocol may increase the data communication security in wireless sensor networks.
Abstract: Many routing protocols have been proposed for sensor network, but most of them have not designed with security as a goal. Sensor protocol for information via negotiation (SPIN) protocol is a basic data centric routing protocol of sensor networks. In this paper, we present the design of secure-SPIN, a secure extension for the SPIN protocol. We divide secure-SPIN into three phases and use some cryptographic functions that require small memory and processing power to create an efficient, practical protocol. Then we give security analyses of this protocol. It shows that this secure protocol may increase the data communication security in wireless sensor networks.

30 citations


Proceedings ArticleDOI
03 Apr 2006
TL;DR: The purpose of the document is to provide evaluation material based on a link layer protocol that is (to the authors' understanding) among the primary link layer protocols that FMIPv6 was built to work on, and find such an evaluation quite necessary for the pending optimisations of the protocol.
Abstract: Straightforward, transparent mobility management has now been available for some time with IPv6 through the mobile IPv6 protocol. There are numerous MIPv6 implementations available and some have been successfully deployed and tested in real world scenarios. Yet, certain aspects of that mobility support, such as security, seamless handovers, and heterogeneous network technologies support are still being discussed and improved by working groups on the IETF and in various research communities. One such example is the continuing work on the "fast handovers for mobile IPv6" protocol that aims to reduce the packet loss and latency inherent to the handover process. In this document we present a set of experiments with an implementation of that protocol and the resulting performance evaluation. All tests take place over IEEE wireless LANs, and are performed using the fmipv6.org protocol implementation for the Linux operating system, that we have developed and contributed to the open source community. The paper, exposes an analysis of the provided results and brings out some issues, not currently addressed by the protocol, like for example connection and packet loss occurring during the IEEE 802.11 scanning procedure, and lack of more appropriate alternative mechanisms for discovery and selection of candidate access points. The purpose of the document is to provide evaluation material based on a link layer protocol that is (to our understanding) among the primary link layer protocols that FMIPv6 was built to work on. We find such an evaluation quite necessary for the pending optimisations of the protocol

Patent
20 Dec 2006
TL;DR: In this article, the authors present a protocol conversion apparatus and method supporting communication between terminals through protocol conversion when IPv4/IPv6 terminals coexist or a terminal supports an IPv6 dual stack in one physical network but an application service supports a specific protocol.
Abstract: Provided is a protocol conversion apparatus and method supporting communication between terminals through a protocol conversion when IPv4/IPv6 terminals coexist or a terminal supports an IPv4/IPv6 dual stack in one physical network but an application service supports a specific protocol. A conventional SIIT protocol conversion technique can be used by receiving a communication request through an IPv4 and IPv6 dual stack for a communication request of an IPv4 terminal or an IPv6 terminal, and supporting a protocol conversion between the IPv4/IPv6 terminal through a mapping table mapping respective actual IP address and virtual IP address of the IPv4 and IPv6, and performing communication between the IPv4/IPv6 terminals. Therefore, it is possible to transparently communicate to each other in an IP protocol version. Moreover, a terminal communicates with another terminal in an external network through a conventional protocol or a protocol conversion technique without modification.

Journal ArticleDOI
TL;DR: With satisfactory QoS provisioning, end-systems have more incentives to voluntarily regulate multimedia traffic with an AIMD-based congestion controller, which is vital for network stability, integrity, and future proliferation.
Abstract: We propose a TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) based Datagram Congestion Control Protocol (DCCP) protocol for supporting multimedia traffic in hybrid wireless/wired networks. We further demonstrate how to select the protocol parameters to fairly and efficiently utilize network resources with the consideration of quality of service (QoS) requirements. Since the parameter selection procedure requires only the exchange of parameters among the application, the transport layer protocol, and the link layer protocol, our approach preserves the end-to-end semantics of the transport layer protocol and the layered structure of the Internet. Extensive simulations are performed to evaluate the proposed protocol. It is shown that the AIMD protocol can appropriately regulate multimedia traffic to efficiently utilize the wireless link and fairly share the network resources with coexisting TCP flows, and it can provide satisfactory QoS for delay-sensitive multimedia applications. In addition, AIMD protocol can outperform the non-responsive User Datagram Protocol (UDP) when transporting multimedia traffic over hybrid wireless/wired networks. With satisfactory QoS provisioning, end-systems have more incentives to voluntarily regulate multimedia traffic with an AIMD-based congestion controller, which is vital for network stability, integrity, and future proliferation.

Proceedings ArticleDOI
01 Dec 2006
TL;DR: A new communication protocol for sensor networks is presented which is based on and is an enhancement over the LEACH protocol, based on adaptive clustering of the sensor nodes, the nodes with the maximum amount of residual energies being selected as the cluster-heads.
Abstract: This paper presents a new communication protocol for sensor networks which is based on and is an enhancement over the LEACH protocol proposed by Heinzelman et al. The proposed protocol is based on adaptive clustering of the sensor nodes, the nodes with the maximum amount of residual energies being selected as the cluster-heads. This is in contrast with the original LEACH protocol which employs a simple randomized rotation of the cluster-heads. We define a new eligibility criterion for the selection of cluster-heads and introduce data-acknowledgements, advertisement updates and cluster-head reselection to make the protocol robust against node and channel failures. We will show how the utilization of these measures improves the system lifetime and reduces the data losses. With the use of the proposed protocol, the system life is increased by three times as compared to that obtained by using the LEACH protocol. Also, the percentage data loss is reduced by around twenty times.

Journal ArticleDOI
TL;DR: Performance measurement shows that compared with directly using interfaces provided by JMF, using DPF to set up a dynamic protocol stack incurs slight overhead in unicast, and the similar condition is observed in multicast.

Patent
Dirk-Holger Lenz1, Jens Kittan1
10 Feb 2006
TL;DR: In this paper, a protocol stack is created by making available the protocol layer(s), randomly compiling the protocol stack from the protocol layers, and making available an instance for the administration of the stack using a graphical user interface.
Abstract: An apparatus for creating a protocol stack has at least one protocol layer with at least one standardized interface and an instance for the administration of the protocol stack. The protocol stack is created by making available the protocol layer(s), randomly compiling the protocol stack from the protocol layer(s), and making available an instance for the administration of the protocol stack using a graphical user interface.

Journal ArticleDOI
TL;DR: In the present paper, a generic architecture and respective mechanisms to achieve protocol stack and component based protocol layer reconfiguration are proposed.
Abstract: The next generation of wireless mobile communications termed beyond 3G (or 4G), will be based on a heterogeneous infrastructure that comprises different wireless networks in a complementary manner. Beyond 3G will introduce reconfiguration capabilities to flexibly and dynamically (i.e., during operation) adapt the wireless protocol stacks to better meet the ever-changing service requirements. For the dynamic reconfiguration of protocol stacks during runtime operation to become a practical capability of mobile communication systems, it is necessary to establish a software architecture that functionally supports reconfiguration. In the present paper, a generic architecture and respective mechanisms to achieve protocol stack and component based protocol layer reconfiguration are proposed.

Proceedings ArticleDOI
01 Nov 2006
TL;DR: A TDMA-based MAC protocol for wireless sensor networks built for industrial applications that uses link state dependent scheduling that significantly improves packet throughput as compared to both the general non-link state dependent TDMA protocol and CSMA protocol.
Abstract: Existing TDMA-based MAC protocols for wireless sensor networks are not specifically built to consider the harsh conditions of industrial environments where the communication channel is prone to signal fading. We propose a TDMA-based MAC protocol for wireless sensor networks built for industrial applications that uses link state dependent scheduling. In our approach, nodes gather samples of the channel quality and generate prediction sets from the sample sets in independent slots. Using the prediction sets, nodes only wake up to transmit/receive during scheduled slots that are predicted to be clear and sleep during scheduled slots that may potentially cause a transmitted signal to fade. We simulate our proposed protocol and compare its performance with a general non-link state dependent TDMA protocol and a CSMA protocol. We found that our protocol significantly improves packet throughput as compared to both the general non-link state dependent TDMA protocol and CSMA protocol. We also found that in conditions which are not perfect under our assumptions, the performance of our protocol degrades gracefully.

Proceedings ArticleDOI
Reza Ghanadan1, John Gu1, Jessica Hsu1, Greg Sadosuk1, Phong C. Khuu1, William Gallagher1 
23 Oct 2006
TL;DR: A novel wireless intranet networking protocol providing the flexibility and efficiency needed to operate in airborne environments, and an efficient mobile ad-hoc networking design, known as adaptive hybrid domain routing (AHDR) protocol, devised primarily for airborne networking.
Abstract: We illustrate a novel wireless intranet networking protocol providing the flexibility and efficiency needed to operate in airborne environments. A critical component of this protocol is an efficient mobile ad-hoc networking (MANET) design, known as Adaptive Hybrid Domain Routing (AHDR) protocol, devised primarily for airborne networking. We describe the driving networking requirements and tradeoffs, protocol architecture, and measured and simulated performance. The MANET element in this protocol is composed of a strategic combination of proactive and reactive algorithms. It provides updated route information for neighbor nodes and offers optimized route resolution for unknown routes in a fast-changing topology. The set of optimization parameters for making routing decisions is configurable via a network management module. The selection of the best route, data rate, transmission power, message format, frame length, and transmission time is distributed and depends on real-time optimization parameters.

Proceedings ArticleDOI
02 Mar 2006
TL;DR: A 4-layered protocol stack including application, transaction, data-link and physical layers is taken which supports the best effort traffic as well as guaranteed bandwidth using the virtual channels which logically share the physical links.
Abstract: In this paper, we present a communication protocol for network on chip architectures which have complex packet switched communication protocols. In order to manage this complexity and advance reusability, a layered approach is taken. It is a 4-layered protocol stack including application, transaction, data-link and physical layers. Our protocol stack supports the best effort traffic as well as guaranteed bandwidth using the virtual channels which logically share the physical links. In order to evaluate the design, an HDL implementation of this protocol stack is implemented and synthesized. The results show 0.5% of a Virtex II 2VP30 FPGA is employed by our proposed protocol stack for each resource network interface.

Book
11 May 2006
TL;DR: This book is suitable for the novice and experienced system administrators, programmers, and anyone who would like to learn how to work with the TCP/IP protocol suite, and can be read even by those who have little background in networking.
Abstract: The TCP/IP protocol stack is the foundation of the internet and, more generally, network communication. Operating at various physical and logical layers, these protocols are the language that allow computers to communicate with each other. While most IT professionals don't work at the protocol level regularly, there are times when a clear understanding of what's going at the network level can be invaluable. This is the book to give that grounding and to act as a definitive reference when needed. This book is suitable for the novice and experienced system administrators, programmers, and anyone who would like to learn how to work with the TCP/IP protocol suite. It can be read even by those who have little background in networking.

Proceedings ArticleDOI
01 Jan 2006
TL;DR: Simulation results show that the proposed protocol can reduce the cost of channel negotiation and increase the network throughput.
Abstract: This paper presents an on-demand connection-oriented multi-channel MAC protocol for ad-hoc networks. The major characteristics of proposed protocol are: (a) each mobile node is equipped with two network interfaces, (b) frame broadcasting is supported and (c) no time synchronization is needed. Compared with other multi-channel MAC protocols, the proposed protocol reduces the cost of channel negotiation by considering the property that a connection generates multiple frames for transmitting. NS-2 is used to evaluate the performance of the proposed protocol. Simulation results show that the proposed protocol can reduce the cost of channel negotiation and increase the network throughput

Proceedings ArticleDOI
11 Dec 2006
TL;DR: A Markov chain model for the single-hop S-MAC protocol under un-saturated condition is presented and, by considering competing sensors in shared channel, the energy consumption of the S- MAC protocol is derived.
Abstract: Recently, analytic models proposed to evaluate the energy consumption of sensor-medium access control (S-MAC) protocol, one of the well-known MAC protocols for wireless sensor networks (WSNs), are based on the model for the IEEE 802.11 MAC protocol. Since the S-MAC protocol has distinct differences from the IEEE 802.11 MAC protocol, however, those differences should be reflected in the analytic evaluation. For this, we first present a Markov chain model for the single-hop S-MAC protocol under un-saturated condition. Then, by considering competing sensors in shared channel, we derive the energy consumption of the S-MAC protocol. Finally, numerical results for a practical sensor mote are shown

Patent
09 Feb 2006
TL;DR: In this paper, a system and method for sharing a communications link between multiple protocols is described that comprises a system comprising a communications interface configured to exchange information with other systems using at least one of a plurality of protocols; a protocol select register that stores a value that selects a protocol from among the plurality to become an active protocol; and a state machine accessible to the communications interface, the state machine used to control the exchange of information through the communication interface according to the active protocol.
Abstract: A system and method for sharing a communications link between multiple protocols is described that comprises a system comprising a communications interface configured to exchange information with other systems using at least one of a plurality of protocols; a protocol select register that stores a value that selects a protocol from among the plurality of protocols to become an active protocol; and a state machine accessible to the communications interface, the state machine used to control the exchange of information through the communications interface according to the active protocol. The active protocol is used by the communications interface to exchange information while the remaining protocols of the plurality of protocols remain inactive. The state machine sequences through a series of states that cause the communications interface to operate according to the active protocol, and that are designated as inert sequences under the remaining protocols.

Proceedings ArticleDOI
25 Oct 2006
TL;DR: Security analysis of MIS protocol comparison with IEEE 802.11i shows that countermeasure against DoS attack which inflicts a lack of availability can provide by the technique on the system implementation.
Abstract: We attempt security analysis of MIS protocol comparison with IEEE 80211i The both protocols, IEEE 80211i and MIS protocol, achieve enough confidentiality, integrity, authentication and key exchange in practical use However, the both protocols are under threats of forged control messages by using of management/control frame of IEEE 80211 and control messages of MIS protocol In fact, countermeasure against DoS attack which inflicts a lack of availability can provide by the technique on the system implementation

Book ChapterDOI
28 May 2006
TL;DR: The computational cost of the proposed TAKE protocol is less than that of the PP-TAKE protocol, as is the number of steps needed to communicate is one fewer in which needs only three steps.
Abstract: Recently, Park and Park proposed a new two factor authenticated key exchange (PP-TAKE) protocol that can be applied to low-power PDAs in Public Wireless LANs (PWLANs). The current paper proposes an efficient TAKE protocol based upon the PP-TAKE protocol. The computational cost of the proposed TAKE protocol is less than that of the PP-TAKE protocol, as is the number of steps needed to communicate is one fewer in which needs only three steps.

Patent
21 Nov 2006
TL;DR: In this paper, an HDL description of a communications protocol machine for transforming object communications into low-level octet sequences for physical transport is synthesized onto a programmable logic device such as an FPGA.
Abstract: The present disclosure generally relates to methods and systems for accelerating inter-ORB protocol. In an exemplary embodiment, an HDL description of a communications protocol machine for transforming object communications into low- level octet sequences for physical transport is synthesized onto a programmable logic device such as an FPGA. This communications protocol machine replaces traditional software-based inter-ORB protocol engines in distributed computing environments, including embedded environments, to provide reduced latency. In preferred embodiments, the communications protocol machine is described with two distinct elements: a protocol messaging machine and an encoder/decoder. The protocol messaging machine converts an object communication into a low- level octet sequence comprising one or more inter-ORB protocol messages and also converts a low-level octet sequence comprising an inter-ORB protocol message into an object communication.

Patent
Gang Ding1, Sanjay Rungta1
30 May 2006
TL;DR: In this paper, a new communication protocol based on a new physical interference model, and apparatuses and systems for implementing such protocols are described, and a new medium access control (MAC) protocol for a wireless network that uses different signal transmission powers for transmitting and receiving various MAC protocol packets are described.
Abstract: A new communication protocol based on a new physical interference model, and apparatuses and systems for implementing such protocols are described herein. The new communication protocol may be a new medium access control (MAC) protocol for a wireless network that uses different signal transmission powers for transmitting and receiving various MAC protocol packets.

Patent
13 Feb 2006
TL;DR: In this paper, a protocol packet filter based on the first protocol header corresponds to a first protocol packet embedded in the data frame, and successively processing octets in the datastore by processing the octet according to the rules of the data-frame protocol.
Abstract: A system and method for filtering communications packets on electronic devices. The system and method operable to receive a communications packet in a link layer protocol embedded in a data frame in a data frame protocol on the electronic device, to filter based on the first protocol header corresponds to a first protocol packet embedded in the data frame, to successively processing octets in the data frame by processing the octet according to the rules of the data frame protocol; upon processing octets comprising the first protocol header, passing the protocol header to a first protocol packet filter and in response to receiving a first protocol filter result indicative that the received packet should be dropped, skipping processing through the end of the data frame.

Patent
26 Sep 2006
TL;DR: In this paper, a protocol converter analyzes packets of speech received from the packet-switching network to specify the encoding bit rate of speech data in the speech packets, and then generates frames by using the multiplex table that was specified to multiplex data.
Abstract: In media communication by way of a packet-switching network and a circuit-switching network, a protocol conversion device for converting protocols between the packet-switching network and the circuit-switching network includes a call connection unit and a protocol converter. The call connection unit carries out call connection processes of media communication between terminals of the packet-switching network side and terminals of the circuit-switching network side. The protocol converter analyzes packets of speech received from the packet-switching network to specify the encoding bit rate of speech data in the speech packets. The protocol converter then specifies the multiplex table used in multiplexing frames on the circuit-switching network from the encoding bit rate. The protocol converter further generates frames by using the multiplex table that was specified to multiplex data in the payload of packets received from the packet-switching network and transmits to the circuit-switching network.