scispace - formally typeset
Search or ask a question

Showing papers on "Internetwork protocol published in 2008"


Patent
11 Apr 2008
TL;DR: In this article, the authors propose a protocol for supporting wireless communications between pairs of the plurality of field devices, including providing a set of protocol commands, transferring process control data from at least some of the field devices using a first subset of the protocol commands of the communication protocol.
Abstract: A method of efficiently operating a wireless communication network in a process control environment, such that the wireless communication network includes a plurality of field devices, includes defining a communication protocol for supporting wireless communications between pairs of the plurality of field devices, including providing a set of protocol commands, transferring process control data from at least some of the plurality of field devices using a first subset of the set of protocol commands of the communication protocol, and transferring network management data to at least some of the plurality of field devices using a second subset of the set of protocol commands of the communication protocol.

103 citations


Journal ArticleDOI
TL;DR: The persistent relay carrier sensing multiple access (PRCSMA) protocol is presented in this paper as a novel medium access control protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ) scheme in IEEE 802.11 wireless networks.
Abstract: The persistent relay carrier sensing multiple access (PRCSMA) protocol is presented in this paper as a novel medium access control (MAC) protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ) scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

85 citations


Patent
15 Aug 2008
TL;DR: In this paper, a wireless communication infrastructure entity is configured to allocate radio resources, in a radio frame, to a wireless terminal compliant with a first protocol and to a second protocol.
Abstract: A wireless communication infrastructure entity configured to allocate radio resources, in a radio frame, to a wireless terminal compliant with a first protocol and to a wireless terminal compliant with a second protocol. The radio frame including a first protocol resource region and a second protocol resource region. The radio frame including a first protocol allocation control message that allocates resources within the first protocol resource region to the wireless terminal compliant with the first protocol, and a second protocol allocation control message that allocates resources within the second protocol resource region to the wireless terminal compliant with the second protocol.

49 citations


Patent
10 Oct 2008
TL;DR: In this article, a protocol stack with a plurality of protocol layers is used to transmit information over a communication medium, and the computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier.
Abstract: Described are a system and method for use by a computing device to transmit information over a communication medium. The computing device communicates over the medium according to a protocol stack having a plurality of protocol layers. Information having an identifier is received at a first protocol layer from a higher protocol layer in the protocol stack. The computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier. Upon determining to present the information to the communication medium, the computing device incorporates the identifier in the information before placing the information on the network communication medium.

41 citations


Proceedings ArticleDOI
15 Apr 2008
TL;DR: This paper focuses on the SHIM6 protocol - a new multihoming protocol proposed by the IETF - and investigates to what extent it can achieve mobility.
Abstract: Multihoming and mobility in IPv6 are usually considered as two disjoints concepts. This has lead to the development of the two protocols family separately. However, the new IPv6 terminals are most of the time mobile and are equipped with multiple interfaces. Thus, we need to adopt a new vision toward multihoming and mobility and propose new solutions to manage both of them. In this paper, we focus on the SHIM6 protocol - a new multihoming protocol proposed by the IETF - and we investigate to what extent it can achieve mobility.

32 citations


Journal ArticleDOI
01 May 2008
TL;DR: A comparative study shows that AsyMAC improves on two previously proposed protocols' accuracy in determining the nodes to be silenced to prevent collisions.
Abstract: We introduce AsyMAC, a MAC layer protocol for wireless networks with asymmetric links and study a protocol stack consisting of AsyMAC and the A^4LP routing protocol. The two protocols are able to maintain connectivity where the standard IEEE 802.11 MAC protocol coupled with either AODV or OLSR routing protocols may loose connectivity. A comparative study shows that AsyMAC improves on two previously proposed protocols' accuracy in determining the nodes to be silenced to prevent collisions.

29 citations


Patent
Pouya Taaghol1
28 Feb 2008
TL;DR: In this article, the authors describe a convergence gateway having a protocol converter, the protocol converter to receive as input control plane protocol signals and a first set of user plane protocols from a first network, and to send as output the second set of control plane protocols and the second sets of user protocols to a second network.
Abstract: Techniques for mobility protocol switching for wireless networks are described. An apparatus may comprise a convergence gateway having a protocol converter, the protocol converter to receive as input a first set of control plane protocol signals and a first set of user plane protocol signals from a first network, convert the first set of control plane protocol signals to a second set of control plane protocol signals and the first set of user plane protocol signals to a second set of user plane protocol signals, and to send as output the second set of control plane protocol signals and the second set of user plane protocol signals to a second network. Other embodiments are described and claimed.

20 citations


Patent
09 Jul 2008
TL;DR: In this article, a port on-site data acquiring, transmitting, sending and ensuring system based on Zigbee technology in the remote monitoring and controlling field of electromechanical equipment, comprises a wireless sensing network and a remote data server, wherein the wireless sensor network is distributed in a port working field, and can acquire working state data of the port field, collect the intra-network acquired data in a zigbee wireless manner, pack the collected data, and transmit to the remote dataserver via wired enterprise in-house network based on a transmission control protocol and an internetwork
Abstract: A port on-site data acquiring, transmitting, sending and issuring system based on zigbee technology in the remote monitoring and controlling field of electromechanical equipment, comprises a wireless sensing network and a remote data server, wherein the wireless sensing network is distributed in a port working field, and can acquire working state data of the port field, collect the intra-network acquired data in a zigbee wireless manner, pack the collected data, and transmit to the remote data server via wired enterprise in-house network based on a transmission control protocol and an internetwork protocol. The remote data server can receive the data based on the transmission control protocol and the internetwork protocol, resolve the data according to the packed data transmission format, store the data in a database, and issue the data in a web service mode. The invention provides data support for monitoring application program development, failure pre-warning and equipment maintenance. In addition, the low-cost zigbee technology can reduce system complexity, and has good anti-interference performance, expandability and practicability.

19 citations


Proceedings ArticleDOI
14 Sep 2008
TL;DR: A methodology and a design chain for the automated generation of networking protocols, with the potential to dramatically change the future of networking protocol design by moving protocol design to a more abstract level, finding high-performance protocols not easily discovered by human intuition, and reducing the currently long protocol design cycles.
Abstract: This paper establishes a framework for the automated generation of networking protocols. The need for the rapid design of networking protocols in application-specific contexts has increased dramatically over the past five years. Each new application requires high performance in its own domain, as well as a rapid design cycle. Further, changes in physical layer technology quickly render previously high-performance protocols poor performance. Currently, there are no tools to automate the design of networking protocols. This paper addresses the challenge of building such tools. It proposes a methodology and a design chain for the automated generation of networking protocols, with the following novel ideas: (1) Formulation of the network protocol problem such that the exchange of protocol control information can be specified as part of the optimization program, (2) Optimal waveform generation, which specifies the optimal exchange of both control information and data, (3) Protocol Extraction: The extraction of the optimal protocol as a minimal description of the optimal waveforms. This methodology has the potential to dramatically change the future of networking protocol design by moving protocol design to a more abstract level, finding high-performance protocols not easily discovered by human intuition, and reducing the currently long protocol design cycles.

16 citations


Patent
31 Mar 2008
TL;DR: In this article, a method for enabling session mobility in a multi-participant IP-based multi-media communication network in full-mesh conference model is described, the method comprising: mapping a full mesh communication protocol to a Session Initiation Protocol (SIP), defining an extended message protocol including new message mechanisms to support session mobility options, mapping the extended message protocols to the SIP, and adding headers to mapped messages from the extended m-message protocol and from the full m-mess communications protocol to comply with fullmesh message signalization protocol mechanisms.
Abstract: There is described a method for enabling session mobility in a multi-participant IP-based multi-media communication network in full-mesh conference model, the method comprising: mapping a full-mesh communication protocol to a Session Initiation Protocol (SIP); defining an extended message protocol including new message mechanisms to support session mobility options; mapping the extended message protocol to the Session Initiation Protocol; and adding headers to mapped messages from the extended message protocol and from the full-mesh communication protocol to comply with full-mesh message signalization protocol mechanisms.

14 citations


Patent
29 Apr 2008
TL;DR: In this paper, a method and corresponding apparatus for supporting a call in the presence of a fault in a network is provided, which includes supporting a primary protocol to service a call between near-end and far-end access nodes associated with two or more callers.
Abstract: Malfunctions in a communications network may introduce an unacceptably low level of reliability for many users, thereby slowing further adoption of Internet Protocol (IP) telephony, for example. In an example embodiment of the present invention, a method and corresponding apparatus for supporting a call in a presence of a fault in a network is provided. The method includes supporting a primary protocol to service a call between near-end and far-end access nodes associated with two or more callers. Signaling information in the primary protocol supporting the call may be identified and used to establish a backup protocol between the near-end and far-end access nodes. The primary protocol may be monitored for a fault and, in an event a fault occurs, supporting the call using the backup protocol. As a result, IP telephony may be transported in a more reliable manner, thereby reducing the number of dropped and uncompleted calls.

Proceedings ArticleDOI
19 May 2008
TL;DR: A novel paradigm is refereed to as distributed protocol stacks, and aims at providing a framework for performance optimization of data transfer, improved QoS provisioning, as well as advances in network design, operation, and management.
Abstract: This paper discusses architectural details related to a possible evolution in the protocol stack design, enabling to move a set of functions implemented at a particular layer of the protocol stack of one node to another element of the network (node, router, or base station). Communication with the functional block detached in such way is performed using a predefined communication interface. This novel paradigm is refereed to as distributed protocol stacks, and aims at providing a framework for performance optimization of data transfer, improved QoS provisioning, as well as advances in network design, operation, and management.

Book ChapterDOI
10 Jun 2008
TL;DR: This work introduces a methodology and formal framework that uses model program composition to specify behavior of protocols, and defines how the individual parts interoperate.
Abstract: Designing and interoperability testing of distributed, application-level network protocols is complex. Windows, for example, supports currently more than 200 protocols, ranging from simple protocols for email exchange to complex ones for distributed file replication or real time communication. To fight this increasing complexity problem, we introduce a methodology and formal framework that uses model program composition to specify behavior of such protocols. A model program can be used to specify an increment of protocol functionality with a coherent purpose, which can be understood and analyzed separately. The overall behavior of a protocol can be defined by a composite model program, which defines how the individual parts interoperate.

Patent
12 Mar 2008
TL;DR: In this paper, a packet transfer apparatus connected to a first communication network and a second communication network performs the steps of: storing first destination correspondence information; receiving a packet of the first communication protocol; determining destination information of a packet; generating the header of the packet of a second protocol; converting the received one or more packets from the first protocol to the second protocol.
Abstract: A packet transfer apparatus connects two networks of different protocols The packet transfer apparatus, connected to a first communication network and a second communication network, performs the steps of: storing first destination correspondence information; receiving a packet of the first communication protocol; based on the first destination correspondence information, determining destination information of a packet of the second communication protocol corresponding to destination information of the received packet of the first communication protocol; generating the header of the packet of the second communication protocol, based on the determined destination information of the packet of the second communication protocol; converting the received one or more packets of the first communication protocol into one or more packets of the third communication protocol; and adding the generated header of the packet of the second communication protocol to the packets of the third communication protocol

Patent
01 May 2008
TL;DR: In this article, an inter-chip communication protocol, based on a standard interface protocol, which is adapted to incorporate control, configuration and/or recovery information for computer chips, and the data encoded within communication packets of a communication layer above the physical layer of the interface protocol is described.
Abstract: The invention relates to an inter-chip communication protocol, based on a standard interface protocol, which is adapted to incorporate control, configuration and/or recovery information for computer chips, and the data encoded within communication packets of a communication layer above the physical layer of the interface protocol

Patent
16 Jun 2008
TL;DR: In this paper, an equipment and method to implement the adaptive functions of communication protocols are provided so that the smart card operation system can adaptively select the corresponding communication protocol according to that of the terminal.
Abstract: An equipment and method to implement the adaptive functions of communication protocols are provided so that the smart card operation system can adaptively select the corresponding communication protocol according to that of the terminal. The equipment includes: a communication protocol setting module; a communication protocol detecting module; a communication protocol selecting module. The method includes: setting communication protocol for the smart card operation system; judging whether the communication protocol type of the smart card operation system is identical with that of the terminal; if not identical, selecting communication protocol for the smart card operation system. Therefore, the communication protocol of the smart card operation system can be adaptively selected according to the protocol of the terminal.

Journal ArticleDOI
TL;DR: An open standard protocol for networking of energy meters under the simple network-management protocol (SNMP) environment is proposed and a sample network is created under the LabVIEW virtual instrumentation environment and studied to validate the proposed openstandard protocol.
Abstract: An open standard protocol for networking of energy meters under the simple network-management protocol (SNMP) environment is proposed. Since the SNMP is quite popular for network enabling of uninterruptible power supplies, the necessary support hardware and software already exist. Hence, migrating energy meter connectivity to the transfer control protocol/Internet protocol-based SNMP would be an easy task. A sample network is created under the LabVIEW virtual instrumentation environment and studied to validate the proposed open standard protocol for networking of energy meters.

Patent
24 Sep 2008
TL;DR: In this paper, a congestion control method is proposed to discard the useless relevant packet slicing in advance, thus alleviating the load of network devices, reducing the resource utilization rate, saving bandwidth and further ensuring high effectively carrying out other sessions without discarding packets.
Abstract: The invention discloses a congestion controlling method which is applied to a network technique field and comprises: packet identifiers that are corresponding to the packet slicing which is discarded in the process of random early testing and processing are extracted; the packet slicing with the same packet identifier is discarded Internetwork protocol identifiers can be taken as the packet identifiers or adding identifiers; internetwork protocol identifiers or adding identifiers which are corresponding to the packet slicing which is discarded in the process of random early testing and processing are extracted; the extracted identifiers are compared with identifiers of subsequent packet slicing and if the identifiers are the same, the packet slicing are discarded, and if not, are retransmitted continuously A receiving end receives and reorganizes the received packet slicing and when the reorganization goes wrong, retransmission is requested The invention also discloses a congestion controlling device The utilization of the invention can discard the useless relevant packet slicing in advance, thus alleviating the load of network devices, reducing the resource utilization rate, saving bandwidth and further ensuring high effectively carrying out other sessions without discarding packets

Proceedings ArticleDOI
08 Dec 2008
TL;DR: An evaluation of the quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (next steps in signalling) protocol suite and the implementations of the software architecture are described.
Abstract: This paper presents an evaluation of the quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (next steps in signalling) protocol suite. The QoS-NSLP in combination with the NSIS Transport Layer Protocol (NTLP) is proposed by the Internet Engineering Task Force (IETF) as an alternative to the Resource reSerVation Protocol (RSVP). We describe our implementations of the software architecture, both on a network simulator and on a Linux implementation. Both implementations are used in a complimentary manner to illustrate the performance of the QoS-NSLP protocol. The results show the performance of QoS-NSLP with respect to resource consumption, packet processing time, session set up time, refresh interval and protocol overhead. Furthermore, we analyse the protocol performance during route change scenarios.

Yuwang Yang, Yutao Ju, Hengxin Xia, Wei Zhao, Ya Zhen 
01 Jan 2008
TL;DR: Experiments show that the protocol stack design is suitable to be applied in the wireless sensor networks and the radiation detection network is valuable for radiation emergency system of humanitarian succor.
Abstract: This article mainly designs a network protocol stack and network detection system for humanitarianism succor under radiation emergency conditions. The network protocol stack is based on the link and physical layers of IEEE 802.15.4 standard, and composed mainly of a hybrid multi-channel MAC protocol with virtual mechanism and power control mechanism and a routing protocol with ad hoc on-demand distance vector for micro sensor network. The radiation detection system consists of sensing nodes with γ detector and GPS localization function, the relay and gateway node s with long communication distance, and the information treatment center for further radiation analysis. The performance of the protocol stack is tested and compared with zigbee implementation. The information transmission is tested by sensor network for the radiation detection system. Experiments show that the protocol stack design is suitable to be applied in the wireless sensor networks and the radiation detection network is valuable for radiation emergency system of humanitarian succor.

08 Oct 2008
TL;DR: A modified version of the ZigBee Application Protocol is named CAP (Compact Application Protocol), and it is intended to provide a complete stack of application profiles, data exchange, binding operations, security protocols, and discovery to IP-networked hosts and embedded devices.
Abstract: This document describes a UDP/IP adaptation of the IEEE 802.15.4- based ZigBee Application Protocol that enables IP hosts to communicate using the application profiles and data models described by that protocol, over a wide range of links. This modified version of the ZigBee Application Protocol is named CAP (Compact Application Protocol), and it is intended to provide a complete stack of application profiles, data exchange, binding operations, security protocols, and discovery to IP-networked hosts and embedded devices. The protocol's domain of applicability includes IEEE 802.15.4-based 6LoWPAN devices, but also those on conventional wired and wireless links and emerging powerline communication networks.

Proceedings ArticleDOI
08 Dec 2008
TL;DR: e-SCP-ECG+ is backward compatible to the SCP- ECG protocol while it is able to handle more vital sign and demographic data and overrides some limits of the original protocol.
Abstract: Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG) has been standardized in order different ECG devices to be able to communicate with computers through the same language. This paper proposes specific extensions on SCP-ECG protocol structure and introduces the enhanced SCP-ECG+ (e-SCP-ECG+) protocol. e-SCP-ECG+ is backward compatible to the SCP-ECG protocol while it is able to handle more vital sign and demographic data. It also overrides some limits of the original protocol. The proposed extension has been implemented both as new tags in existing sections and as new sections of the SCP-ECG protocol appended to the original file format.

Proceedings ArticleDOI
19 May 2008
TL;DR: An evolutionary topology unware TDMA MAC protocol which improves upon the existing threaded time spread multiple access (T-TSMA) protocol while preserving the advantage of the T- TSMA protocol is proposed.
Abstract: In this paper, we propose an evolutionary topology unware TDMA MAC protocol (E-TUTM) which improves upon the existing threaded time spread multiple access (T-TSMA) protocol while preserving the advantage of the T-TSMA protocol According to the current network topology and traffic load, our proposed E-TUTM protocol can control each node to utilize the shared wireless channel effectively by the protocol threading technique and the hybrid channel access strategy In this paper, we present the E-TUTM protocol and analyze the performance of it Simulation results show that our proposed E-TUTM protocol improves the performance dramatically as compared with the T-TSMA protocol

Patent
03 Nov 2008
TL;DR: In this article, the authors describe a system that causes an electronic interface device to dynamically switch protocols that it uses to communicate with a host to which the EI device is connected.
Abstract: Methods and systems are disclosed including those that cause an electronic interface device to dynamically switch protocols that it uses to communicate with a host to which the electronic interface device is connected. In one such embodiment, the electronic interface device first attempts using a first communications protocol, such as a CCID protocol. If the host contains a driver for the first communications protocol, the host communicates with the electronic interface device using the first communications protocol. If the host does not contain a driver for the first communications protocol, the electronic interface device attempts using a second communications protocol that is different from the first communications protocol, such as a HID protocol. The host then communicates with the electronic interface device using the second communications protocol. If the electronic interface device communicates with the host using the first communications protocol, it may transmit user authentication data, such as a password, to the host.

Proceedings ArticleDOI
Huiming Wang1, Xingang Shi1, Zhiliang Wang1, Xia Yin1, Jianping Wu1 
06 Jul 2008
TL;DR: An emulation-based method for performance testing of mobile IPv6 protocol is designed, which gives performance evaluation metrics in view of the three kinds of MIPv6 nodes (HA, home agent; MN, mobile node; CN, correspondent node), tests and analyzes MIPL 1.1 on Linux 2.4.26.
Abstract: Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility of IPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing consists of conformance testing, interoperability testing and performance testing. Protocol emulation testing, which we adopt in this paper, is a way of protocol testing. This paper designs an emulation-based method for performance testing of mobile IPv6 protocol, gives performance evaluation metrics in view of the three kinds of MIPv6 nodes (HA, home agent; MN, mobile node; CN, correspondent node), tests and analyzes MIPL 1.1 on Linux 2.4.26. Our method is easy to implement on commonly used hardware, very convenient to deploy and more flexible compared to most commercial test instruments. As far as we know, this is the first work on the research of performance testing of Mobile IPv6 protocol.

Proceedings ArticleDOI
18 Nov 2008
TL;DR: Different from classic 802.11 DCF protocol, the cross-layer MAC protocol improved the efficiency, the success ratio, the end-to-end delay, the jitter and the throughput.
Abstract: Given the special requirements from wireless sensor networks and the disadvantages of current MAC protocol, a new cross-layer MAC protocol, which combines the physics layer and a MAC protocol, is introduced. The former layer is based on direct-sequence spread-spectrum, and the latter busy tone. First the physics layer and MAC layer were designed concretely, and then the power consumption and duty cycle of the protocol were analyzed quantitatively. Finally, the protocol was simulated on NS2 platform. Different from classic 802.11 DCF protocol, the protocol improved the efficiency ,the success ratio, the end-to-end delay, the jitter and the throughput.


Patent
31 Mar 2008
TL;DR: In this article, a method for enabling session mobility in a multi-participant IP-based multi-media communication network in full-mesh conference model is described, the method comprising: mapping a full mesh communication protocol to a Session Initiation Protocol (SIP), defining an extended message protocol including new message mechanisms to support session mobility options, mapping the extended message protocols to the SIP, and adding headers to mapped messages from the extended m-message protocol and from the full m-mess communications protocol to comply with fullmesh message signalization protocol mechanisms.
Abstract: There is described a method for enabling session mobility in a multi-participant IP-based multi-media communication network in full-mesh conference model, the method comprising: mapping a full-mesh communication protocol to a Session Initiation Protocol (SIP); defining an extended message protocol including new message mechanisms to support session mobility options; mapping the extended message protocol to the Session Initiation Protocol; and adding headers to mapped messages from the extended message protocol and from the full-mesh communication protocol to comply with full-mesh message signalization protocol mechanisms.

Proceedings ArticleDOI
11 May 2008
TL;DR: This paper focuses on the supply of a customized protocol stack for each application according to the communication environment and puts forward an optimization scheme that finds better protocol components from the network-side library to replace ill-suited ones running in the current system.
Abstract: In the future wireless communication environment, many radio access technologies will coexist in the same or border areas to provide users with ubiquitous access. The heterogeneous infrastructure makes reconfigurability an important characteristic which is very necessary in the mobile terminals. Moreover, the reconfiguration technique is also introduced to the design of protocol stack to meet the ever-changing link conditions and service requirements. Hence, in order to facilitate the realization of the protocol reconfiguration capabilities, a component-based protocol architecture is introduced by end-to-end reconfigurability (E2R) II project. This paper focuses on the supply of a customized protocol stack for each application according to the communication environment. To achieve this goal, an evaluation mechanism for protocol components is proposed. Besides, we put forward an optimization scheme that finds better protocol components from the network-side library to replace ill-suited ones running in the current system. The major advantage of the proposed protocol management schemes is that users may enjoy a better quality of service due to the protocol reconfigurability.

01 Jan 2008
TL;DR: X-Layer is presented, an implementation of a “cross-layer” network stack for wireless sensor networks, designed under the assumption that different network layers will interact and share resources directly with each other.
Abstract: Cross-layer design of network protocol stacks is important for wireless networking applications due to limited resources. Although much has been proposed in the literature, little experimental cross-layer work has been done. Even less has been done concerning actual designs for such cross-layer network stacks. This paper presents X-Layer, an implementation of a “cross-layer” network stack for wireless sensor networks, designed under the assumption that different network layers will interact and share resources directly with each other. X-Layer’s cross-layer stack is compared with a network stack implemented with traditional network layer abstractions using the same basic protocols at each layer as in the cross-layer stack. The efficiency and effectiveness of the stacks are compared and evaluated. Based on this evaluation a new mechanism is proposed for managing shared network resources and code in an orderly fashion.