7,227 results on '"ethernet"'
Search Results
2. Introduction to Time-Sensitive Networking
- Author
-
Norman Finn
- Subjects
Ethernet ,Computer science ,business.industry ,Computer Networks and Communications ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Equipment failure ,PHY ,Packet loss ,Management of Technology and Innovation ,Time sensitive networking ,Wireless ,Latency (engineering) ,business ,Safety, Risk, Reliability and Quality ,Law ,Time synchronization ,Computer network - Abstract
A number of companies and standards development organizations have, since 2000, been producing products and standards for "time-sensitive networks" to support real-time applications that require a) zero packet loss due to buffer congestion, b) extremely low packet loss due to equipment failure, and c) guaranteed upper bounds on end-to-end latency. Often, a robust capability for time synchronization to less than 1 μs is also required. These networks consist of specially-featured bridges that are interconnected using standard Ethernet links with standard MAC/PHY layers. Since 2012, this technology has advanced to the use of routers, as well as bridges, and features of interest to time-sensitive networks have been added to both Ethernet and wireless standards.
- Published
- 2022
3. A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks
- Author
-
Elena Pagani, Andrea Lanzi, Silvio Ghilardi, Andrea Di Pasquale, and Danilo Bruschi
- Subjects
Ethernet ,business.industry ,Computer science ,Local area network ,Cryptography ,Man-in-the-middle attack ,Computer security ,computer.software_genre ,ARP spoofing ,DNS spoofing ,Electrical and Electronic Engineering ,Communications protocol ,business ,Host (network) ,computer - Abstract
Since the nineties, the Man-in-The-Middle (MITM) attack has been one of the most effective strategies adopted for compromising information security in network environments. In this paper, we focus our attention on ARP cache poisoning, which is one of the most well-known and more adopted techniques for performing MITM attacks in Ethernet local area networks. More precisely, we will prove that, in network environments with at least one malicious host in the absence of cryptography, an ARP cache poisoning attack cannot be avoided. Subsequently, we advance ArpON, an efficient and effective solution to counteract ARP cache poisoning, and we use a model-checker for verifying its safety property. Our main finding, in accordance with the above impossibility result, is that the only event that compromises the safety of ArpON is a cache poisoning that nevertheless is removed by ArpON itself after a very short period, thus making it practically infeasible to perpetrate an ARP cache poisoning attack on network hosts where ArpON is installed.
- Published
- 2022
4. An Efficient Pro-Active Fault-Tolerance Scheduling of IEEE 802.1Qbv Time-Sensitive Network
- Author
-
Zhiwei Feng, Qingxu Deng, and Mingyang Cai
- Subjects
Ethernet ,IEEE 802 ,Computer Networks and Communications ,Computer science ,business.industry ,Node (networking) ,Fault tolerance ,Fault (power engineering) ,Computer Science Applications ,Scheduling (computing) ,Transmission (telecommunications) ,Hardware and Architecture ,Cyclic redundancy check ,Signal Processing ,business ,Information Systems ,Computer network - Abstract
Time-Sensitive Network (TSN) has emerged as one of the enhancement Ethernet technologies of real-time applications for future industrial networks. However, the data of TSN messages may be unexpectedly changed within the transmission duration due to electromagnetic interference. Cyclic Redundancy Check can detect such errors and notify the sender node to re-transmit the erroneous message through Automatic RepeatreQuest (ARQ). The time when the error occurs is uncertain. Consequently, the time when performing the re-transmission requests is also random, which results in different transmission sequences and violates the deterministic transmission of TSN. In addition, the returned CRC detection messages also might be at fault during transmission. In order to provide the fault tolerance capability of critical flows in TSN without violating the nature of deterministic transmission, this paper proposes a pro-active faulttolerant TSN scheduling algorithm (PFT-TSN), which not only transmits a certain number of instance copies for critical flows but provides network transmission services for non-critical flows. The challenge is that schedulability and safety of critical flows are trade-offs in terms of the number of transmissions per instance of critical flows and the schedulability. Moreover, the transmission service of non-critical flows can also affect the schedulability of critical flows. We conduct comprehensive experiments with synthetic networks to show that the proposed method can meet both safety and schedulability requirements for critical flows, and non-critical flows are also allowed to be transmitted by the service degradation.
- Published
- 2022
5. SparkCognition Research Fellow and Advisor Bob Metcalfe, Co-Inventor of Ethernet Technology, Wins Turing Award
- Subjects
Xerox Corp. -- Achievements and awards ,3Com Corp. -- Achievements and awards ,Ethernet ,Artificial intelligence ,Computer peripherals industry -- Achievements and awards ,Computer science ,Ethernet ,Artificial intelligence ,Business ,News, opinion and commentary - Abstract
AUSTIN, Texas, March 23, 2023 /PRNewswire/ -- SparkCognition, a global leader in artificial intelligence (AI) software solutions perfected for business, is proud to announce that Bob Metcalfe has been named [...]
- Published
- 2023
6. ACM TURING AWARD HONORS BOB METCALFE FOR ETHERNET
- Subjects
Intel Corp. -- Achievements and awards ,Ethernet ,Semiconductor industry -- Achievements and awards ,College teachers -- Achievements and awards ,Computer science ,Semiconductor industry ,Ethernet ,Business ,News, opinion and commentary ,Massachusetts Institute of Technology - Abstract
Technology Developed 50 Years Ago Remains the Dominant Way of Connecting Computers and Billions of Other Devices to Each Other and the Internet NEW YORK, March 22, 2023 /PRNewswire/ -- [...]
- Published
- 2023
7. BOB METCALFE '68 WINS $1 MILLION TURING AWARD
- Subjects
Xerox Corp. -- Achievements and awards ,International Business Machines Corp. -- Achievements and awards ,3Com Corp. -- Achievements and awards ,Ethernet ,Computer peripherals industry -- Achievements and awards ,Computer industry -- Achievements and awards ,Computer science ,Ethernet ,Microcomputer industry ,Computer industry ,News, opinion and commentary ,Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory ,Massachusetts Institute of Technology - Abstract
CAMBRIDGE, Mass. -- The following information was released by the Massachusetts Institute of Technology (MIT): CSAIL research affiliate and MIT Corporation life member emeritus is honored with the 'Nobel Prize [...]
- Published
- 2023
8. IEEE 802.1AS Clock Synchronization Performance Evaluation of an Integrated Wired–Wireless TSN Architecture
- Author
-
Armando Astarloa, Raul Torrego, Oscar Seijo, and Inaki Val
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Ethernet ,IEEE 802 ,business.industry ,Computer science ,Reliability (computer networking) ,Clock synchronization ,Computer Science Applications ,Computer Science - Networking and Internet Architecture ,Control and Systems Engineering ,Synchronization (computer science) ,Wireless ,Electrical and Electronic Engineering ,Latency (engineering) ,business ,Field-programmable gate array ,Information Systems ,Computer network - Abstract
Industrial control systems present numerous challenges from the communication systems perspective: clock synchronization, deterministic behavior, low latency, high reliability, flexibility, and scalability. These challenges are mostly solved with standard technologies over Ethernet, e.g., Time-Sensitive Networking (TSN). As a research trend, it is expected that TSN will converge with wireless, leading to the Wireless TSN paradigm. Also, Wireless TSN is expected to be integrated with Ethernet TSN to create large-scale wired-wireless (Hybrid) TSN networks. The first step towards Hybrid TSN is the distribution of the clock reference from the wired to the wireless domain. In this paper, we leverage existing Ethernet TSN and wireless technologies implementations (Wi-Fi and w-SHARP) and we present two hardware architectures specifically engineered to enable the clock synchronization distribution among the network domains. The hardware architectures have been implemented over a System-on-Chip (SoC) Field Programmable Gate Array (FPGA) platform. We demonstrate through several experiments that the implementation is able to fulfill the synchronization performance required by TSN., Comment: This paper has been accepted by IEEE Transaction on Industrial informatics 2021
- Published
- 2022
9. Enhanced Self-Synchronized Reduced Media-Independent Interface for Robotic and Automotive Applications
- Author
-
Alexey M. Romanov and Francesco Gringoli
- Subjects
Ethernet ,network interfaces ,business.industry ,Computer science ,reduced media-independent interface ,Automotive industry ,3-D molded interconnection device (3D-MID) ,Network interface ,Encoding ,field-programmable gate arrays ,self-synchronization ,wire communication interference ,Computer Science Applications ,Control and Systems Engineering ,Encoding (memory) ,Robot ,Electrical and Electronic Engineering ,Media Independent Interface ,business ,Field-programmable gate array ,Computer hardware ,Information Systems - Published
- 2022
10. HERO: Pbit High-Radix Optical Switch Based on Integrated Silicon Photonics for Data Center
- Author
-
Xuanqi Chen, Yinyi Liu, Shixi Chen, Jun Feng, Jiaxu Zhang, Zhifei Wang, and Jiang Xu
- Subjects
Ethernet ,Silicon photonics ,business.industry ,Computer science ,Network packet ,Interface (computing) ,Electrical engineering ,Throughput ,Computer Graphics and Computer-Aided Design ,Optical switch ,Model predictive control ,Control theory ,Electrical and Electronic Engineering ,business ,Software - Abstract
To establish flatten networks and accomplish rapid and efficient communications in the future hyper-scale data centers, HERO, a high-radix optical switch based on integrated silicon photonics, is proposed in this work. The architecture of HERO, including the switch fabric, switch interface and switch controller, is described in detail. Two new switch control approaches: split-transaction predictive control and wavelength-group switching, are developed. The efficient control together with the optimized high-radix integrated optical switch fabrics help HERO achieve over 1 Pbps switching capacity. Even for small packets, such as 64–256 B Ethernet packets, the maximal utilization of the switch can reach up to 83%, and the throughput can approximate 1 Pbps. Further design explorations on the packet length and some key configurations, including the number of wavelengths and wavelength groups, are also conducted in this work, paving the way to the design of high-performance flatten data-center networks in the future.
- Published
- 2022
11. Bandwidth Allocation of Stream-Reservation Traffic in TSN
- Author
-
Feng He, Ershuai Li, Qiao Li, and Hua Gang Xiong
- Subjects
Ethernet ,Queueing theory ,Computer Networks and Communications ,business.industry ,Computer science ,Node (networking) ,Reservation ,Bandwidth allocation ,Transmission (telecommunications) ,Bandwidth (computing) ,Industrial Ethernet ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Time-Sensitive Networking (TSN) evolves from Ethernet AVB in which the Credit-Based Shaping (CBS) is employed to guarantee the deterministic transmission of traffic. In CBS, the real-time performance of traffic associated with the credits can practicably settle the uncertainty of queueing and forwarding for stream-reservation traffic. Hence, the optimization of bandwidth allocation under the CBS becomes a key point to ensure guaranteed performance in the network. In this paper, a bandwidth allocation method is proposed for stream-reservation traffic while the real-time requirements are satisfied. We first illustrate the significance of appropriate bandwidth allocation for traffic under the CBS and construct a general schema for its bandwidth allocation. Also, the influences of the protected window for Control Data Traffic (CDT) on stream-reservation traffic are considered in our method. Further, mathematical models are constructed to analyze the delay bounds and backlogs of traffic to form the feedback for the optimal bandwidth allocation process. Finally, two node-level cases with different bandwidth utilization and a synthetic industrial networking scenario are carried out to demonstrate our method. The results confirm that the excessive reserved bandwidth does not necessarily decrease the delay bound, especially under the high traffic loads scenario. A more desirable bandwidth allocation strategy under the CBS mechanism is that the reserved bandwidth should be just enough according to the traffic loads to ensure the deterministic transmission of traffic.
- Published
- 2022
12. Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
- Author
-
Nurul Adilah Abdul Latiff, Munther Numan Munther, Jiun Terng Liew, Fazirulhisyam Hashim, and Kamal Ali Alezabi
- Subjects
Ethernet ,Network architecture ,business.industry ,Computer science ,Network packet ,Ethernet scalability ,Broadcast domain ,QA75.5-76.95 ,Management Science and Operations Research ,Network topology ,Computer Science Applications ,OSI model ,ARP storm ,Dynamic host configuration protocol (DHCP) ,Electronic computers. Computer science ,Scalability ,Layer (object-oriented design) ,Address Resolution Protocol (ARP) ,business ,Software-defined network (SDN) ,Spoofing attack ,Information Systems ,Computer network - Abstract
Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread use in all types of network topology and becomes an essential part of computer and network architecture. Despite its features, Ethernet suffers from scalability issues where the increasing number of hosts in a single broadcast domain will significantly expand the broadcast traffic in the network. Since the emergence of software-defined networking (SDN), researchers exploited various attractive features of SDN to suppress the broadcast traffic. Although capable in addressing the scalability issue of Ethernet, the existing SDN based solutions are lacking of security mechanism, which may expose the network to various ARP based attacks. Owing to this issue, this paper proposes a floodless and secure mechanism to suppress broadcast traffic. In general, the proposed solution utilizes SDN architecture and accommodates a multistage security algorithm. The multistage security algorithm consists of three stages; each stage incorporates specific analysis to identify the packet status or behavior, and react accordingly based on its status. To demonstrate the efficiency of the proposed solution, several ARP based attack scenarios are generated and evaluated using Mininet emulator. The performance evaluation indicates that the true positive ratio for attack detection in the proposed solution is 57.14% for the first stage, 66.66% for the second stage, and in some cases may achieve 100% for the final stage.
- Published
- 2022
13. Lane alignment characteristics in massively parallel Ethernet-based transmission systems
- Author
-
Naoaki Yamanaka, Masaki Murakami, Kyosuke Sugiura, Yoshihiko Uematsu, and Satoru Okamoto
- Subjects
Ethernet ,business.industry ,Computer science ,Physical layer ,Transmission system ,business ,Massively parallel ,Computer hardware - Published
- 2022
14. A Migration Strategy for Profinet Toward Ethernet TSN-Based Field-Level Communication: An Approach to Accelerate the Adoption of Converged IT/OT Communication
- Author
-
Sebastian Schriegel and Juergen Jasperneite
- Subjects
Ethernet ,PROFINET ,Field (physics) ,Computer science ,business.industry ,Electrical and Electronic Engineering ,business ,Industrial and Manufacturing Engineering ,Computer network - Published
- 2021
15. Security framework for smart cyber infrastructure
- Author
-
Shalaka Satam, Jesus Pacheco, Salim Hariri, and Pratik Satam
- Subjects
Ethernet ,Local outlier factor ,Computer Networks and Communications ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Denial-of-service attack ,Intrusion detection system ,law.invention ,Bluetooth ,Support vector machine ,Naive Bayes classifier ,law ,business ,Replay attack ,Software ,Computer network - Abstract
The rapid deployment of the Internet of Things (IoT) devices have led to the development of innovative information services, unavailable a few years ago. To provide these services, IoT devices connect and communicate using networks like Bluetooth, Wi-Fi, and Ethernet. This full-stack connection of the IoT devices has introduced a grand security challenge. This paper presents an IoT security framework to protect smart infrastructures from cyber attacks. This IoT security framework is applied to Bluetooth protocol and IoT sensors networks. For the Bluetooth protocol, the intrusion detection system (IDS) uses n-grams to extract temporal and spatial features of Bluetooth communication. The Bluetooth IDS has a precision of 99.6% and a recall of 99.6% using classification technique like Ripper algorithm and Decision Tree (C4.5). We also used AdaBoost, support vector machine (SVM), Naive Bayes, and Bagging algorithm for intrusion detection. The Sensor IDS uses discrete wavelet transform (DWT) to extract spatial and temporal features characteristics of the observed signal. Using the detailed coefficients of Biorthogonal DWT, Daubechies DWT, Coiflets DWT, Discrete Meyer DWT, Reverse Biorthogonal DWT, Symlets DWT, we present the results for detecting attacks with One-Class SVM, Local Outlier Factor, and Elliptic Envelope. The attacks used in our evaluation include Denial of Service Attacks, Impersonation Attacks, Random Signal Attacks, and Replay Attacks on temperature sensors. The One-Class SVM performed the best when compared with the results of other machine learning techniques.
- Published
- 2021
16. Ethernet-Based Servo-Hydraulic Real-Time Controller and DAQ at ELSA for Large Scale Experiments
- Author
-
Marco Peroni, Francisco Javier Molina, Pierre Pegon, and Philippe Buchet
- Subjects
Ethernet ,Data acquisition ,Scale (ratio) ,Computer science ,business.industry ,Control theory ,Building and Construction ,Geotechnical Engineering and Engineering Geology ,business ,Servo ,Computer hardware ,Civil and Structural Engineering - Published
- 2021
17. DAQ readout prototype for JUNO
- Author
-
Kejun Zhu, Fei Li, Xiaolu Ji, and Tong Zhou
- Subjects
Ethernet ,Nuclear and High Energy Physics ,Photomultiplier ,Computer science ,business.industry ,Detector ,Gigabit Ethernet ,Data flow diagram ,Data acquisition ,Nuclear Energy and Engineering ,business ,Computer hardware ,Graphical user interface ,Jiangmen Underground Neutrino Observatory - Abstract
The Jiangmen Underground Neutrino Observatory (JUNO) is a multi-purpose underground neutrino experiment. About 18000 20-inch photomultipliers (PMTs) are instrumented in the Central Detector to detect the photons, and the signals will be captured by high-speed high-resolution waveform full sampling technique. In addition, about 25000 3-inch PMTs are also instrumented to capture T/Q Hits information. This work builds a DAQ readout prototype system for JUNO, which can be used to test the full readout chain for 20-inch and 3-inch PMTs. The system is designed to continuously readout the data flow from multiple electronics channels, check the raw data, and finally save them into disk. Meanwhile, the graphical user interface (GUI) provides a real time display of the sampled waveforms. The system is developed with the open source Qt platform. The design and performance of the system have been verified in detail, particularly by performance test based on Gigabit Ethernet and 10-Gigabit Ethernet. A DAQ readout prototype system has been developed for JUNO, which is successfully applied to electronics testing system in Italy and PMT testing system in Guangdong.
- Published
- 2021
18. Dynamic Deterministic Digital Infrastructure for Time-Sensitive Applications in Factory Floors
- Author
-
Wolfram Lautenschlaeger, Florian Frick, Nihel Benzaoui, Ray Miller, Sebastien Bigo, and Konstantinos Christodoulopoulos
- Subjects
Ethernet ,Computer science ,business.industry ,Reliability (computer networking) ,Distributed computing ,Cloud computing ,Reuse ,Atomic and Molecular Physics, and Optics ,Telecom infrastructure sharing ,Scalability ,Factory (object-oriented programming) ,Electrical and Electronic Engineering ,business ,Host (network) - Abstract
By massively digitalizing production processes, the industry expects an efficient and secure cooperation of a large number of machines, as well as an increasing integration of IT-systems for control and services, for instance using edge clouds. Their vision calls for a distributed, converged datacom and telecom infrastructure where performance, can be deterministic per application, i.e. strictly guaranteed, end-to-end, across technologies and across layers. Its success will largely depend on how dynamically it can reuse resources and how cost-effectively it can host mainstream best-effort applications. In this paper, we review the key performance indicators for such an infrastructure while confronting them to thirty use cases reported by the industry. We then examine the requirements for the digital infrastructure. We benchmark them against the capabilities of relevant network technologies, while pointing to meaningful enhancements. We particularly discuss Time-Sensitive Networking (TSN), a set of standards extending IEEE 802.1 Ethernet with some deterministic functions, which is considered to be the most promising enabling technology for future industrial networks. We propose to augment its scalability with a novel optical backbone which can interconnect islands of TSN networks while preserving timing.
- Published
- 2021
19. Enabling and Optimizing MACsec for Industrial Environments
- Author
-
Tim Lackorzynski, Gregor Garten, Hermann Härtig, Stefan Köpsell, and Jan Sonke Huster
- Subjects
Ethernet ,IEEE 802.1AE ,Computer science ,business.industry ,Cryptography ,Cryptographic protocol ,Computer security ,computer.software_genre ,Encryption ,Automation ,Computer Science Applications ,Work (electrical) ,Control and Systems Engineering ,Electrical and Electronic Engineering ,business ,computer ,Information Systems - Abstract
Industry 4.0 will revolutionize industrial automation. Yet, future smart factories will not be created from scratch. They will rather evolve from existing legacy installations. Consequently, also industrial networks will evolve and the result will be a mixture of new and legacy components. This will make new security mechanisms necessary, that are specifically designed for this industrial use case. This work proposes modifications for MACsec [1] , a new security protocol for protecting communication traffic. These modifications enable MACsec to work within future industrial settings, circumventing drawbacks introduced by legacy networking technologies. Furthermore, we managed to significantly increase the performance of MACsec.
- Published
- 2021
20. Real Time Network Implementation for Military Unmanned Ground Vehicle based on Standard Ethernet
- Author
-
Namgon Kim, DongWon Yang, and Dojong Kim
- Subjects
Ethernet ,Unmanned ground vehicle ,Computer science ,Real-time computing ,Real time networks - Published
- 2021
21. Implementing Time-triggered Communication for Embedded Ethernet Real-time Network using IEEE 1588 Time Synchronization
- Author
-
Mohamad Khairi Ishak and Ju Han Goh
- Subjects
Ethernet ,business.industry ,Computer science ,Signal Processing ,Electrical and Electronic Engineering ,business ,Real time networks ,Computer network ,Time synchronization - Published
- 2021
22. A method for generating a local network graph based on the analysis of address sets
- Author
-
V. V. Galushka, E. R. Gazizov, and D. V. Fatkhi
- Subjects
Ethernet ,Computer science ,Network packet ,Relational database ,Distributed computing ,local network ,Local area network ,General Medicine ,graph ,Network topology ,network topology ,tree ,OSI model ,relational operations ,traffic analysis ,Component-based software engineering ,TA401-492 ,Link layer ,sets ,Materials of engineering and construction. Mechanics of materials - Abstract
Introduction. The paper deals with the problem of automated construction of a local area network using tools and methods for traffic analysis at the link layer of OSI model. The problem is caused by two factors. These are difficulties of the manual determination of the communication between equipment and the lack of physical access to communication lines of an already functioning network. The purpose of the work is to reduce the time spent on building a local network diagram through automating the process of determining the communication between the equipment.Materials and Methods. To solve the set tasks, a method for determining the relative location of devices is proposed. The network adapters of a specialized software and hardware complex, which are connected to a communication line break at different points of the network, are used in opposite directions. The method used is based on calculations of intersections of address sets received from these adapters. The structural schemes of the construction of such a software and hardware complex and the requirements for it are given. The methods of obtaining MAC addresses from transit packets are described. Examples of libraries of software components for performing this operation are given. The structure of a relational database is proposed for storing the received data. The format and content of the fields of its table are described.Results. Using the developed methods, a typical example of an Ethernet network shows a way to determine the relative location of end devices specified by their MAC addresses, as well as at least two switches located between them. The signs by which it is possible to judge the presence of switching equipment in a particular segment are determined. A method is proposed that enables through using a set of relational operations, to sequentially refine the network topology until the required accuracy is achieved.Discussion and Conclusions. The results obtained can be used under the administration of large local networks with an extensive structure. The proposed approach allows you to reduce the time required for building a scheme. This is possible due to the automation of the process of obtaining information about devices operating on the network and their mutual location.
- Published
- 2021
23. Investigating the Throughput Performance of the MPT-GRE Network Layer Multipath Library in Emulated WAN Environment
- Author
-
Imre Bordán and Szabolcs Szilágyi
- Subjects
Ethernet ,Emulation ,Computer science ,business.industry ,computer.internet_protocol ,Fast Ethernet ,Throughput ,Building and Construction ,Network interface ,IPv4 ,Secure communication ,business ,computer ,Computer network ,Data transmission - Abstract
Nowadays there is a growing demand for a much faster and more secure communication without borders through the internet, which is provoking more and more both network designers and manufacturers of communication devices. Thanks to the BYOD trend, our communication devices can be easily carried anywhere in the world. They generally have several built-in network interfaces (e.g. Ethernet, Wi-Fi, 4G). Theoretically, using these cards in parallel, we could speed up data transmission, and thus communication, by aggregating the channel capabilities of the interfaces. On the other hand, we could make data transmission more secure by applying redundancy to the system. Unfortunately, traditional IP-based communications do not allow the use of parallel interfaces in a given communication session, leaving the hardware capabilities of our communications devices virtually untapped. To address this issue, we have developed a multipath communication solution called MPT-GRE, which we have already tested in several laboratory environments. The measurement results were published in our previous articles. In this paper we are going to test it in a much more realistic environment, using the Dummynet WAN emulation software. The measurement results confirmed that the MPT-GRE multipath solution is able to aggregate the performance of physical connections efficiently in the emulated Fast Ethernet IPv4 WAN environment as well.
- Published
- 2021
24. Latest Trends in 400- and Beyond 400-Gbit/s Ethernet Standardization in IEEE 802.3
- Author
-
Yoshiaki Sone and Shuto Yamamoto
- Subjects
Ethernet ,IEEE 802 ,Standardization ,Computer science ,Gigabit ,business.industry ,Telecommunications ,business - Published
- 2021
25. Performance Evaluation of Automotive PLCA Ethernet Using CAN-over-Ethernet (CoE)
- Author
-
Youngil Park, Soyoung Jeong, and Jihyeon Min
- Subjects
Ethernet ,Computer science ,business.industry ,Embedded system ,Automotive industry ,business - Published
- 2021
26. Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci
- Author
-
Yifan Jiang, Zihao Fang, Feng Luo, Zhenyu Yang, and Bowen Wang
- Subjects
Ethernet ,Security analysis ,IEEE 802 ,Science (General) ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Automotive industry ,Denial-of-service attack ,Cryptographic protocol ,Q1-390 ,T1-995 ,Anomaly detection ,business ,Protocol (object-oriented programming) ,Technology (General) ,Information Systems ,Computer network - Abstract
With the development of intelligent and connected vehicles, onboard Ethernet will play an important role in the next generation of vehicle network architectures. It is well established that accurate timing and guaranteed data delivery are critical in the automotive environment. The time-sensitive network (TSN) protocol can precisely guarantee the time certainty of the key signals of automotive Ethernet. With the time-sensitive network based on automotive Ethernet being standardized by the TSN working group, the TSN has already entered the vision of the automotive network. However, the security mechanism of the TSN protocol is rarely discussed. First, the security of the TSN automotive Ethernet as a backbone E/E (electrical/electronic) architecture is analyzed in this paper through the Microsoft STRIDE threat model, and possible countermeasures for the security of automotive TSNs are listed, including the security protocol defined in the TSN, so that the TSN security protocol and the traditional protection technology can form a complete automotive Ethernet protection system. Then, the security mechanism per-stream filtering and policing (PSFP) defined in IEEE 802.1Qci is analyzed in detail, and an anomaly detection system based on PSFP is proposed in this paper. Finally, OMNeT++ is used to simulate a real TSN topology to evaluate the performance of the proposed anomaly detection system (ADS). As a result, the protection strategy based on 802.1Qci not only ensures the real-time performance of the TSN but can also isolate individuals with abnormal behavior and block DoS (denial of service) attacks, thus attaining the security protection of the TSN vehicle-based network.
- Published
- 2021
27. Deep Learning to Predict the Feasibility of Priority-Based Ethernet Network Configurations
- Author
-
Tieu Long Mai and Nicolas Navet
- Subjects
Ethernet ,Control and Optimization ,Speedup ,Computer Networks and Communications ,Computer science ,Design space exploration ,Distributed computing ,Network topology ,Schedulability analysis ,Artificial Intelligence ,Robustness (computer science) ,Machine learning ,Feature (machine learning) ,Computer science [C05] [Engineering, computing & technology] ,Ensemble forecasting ,business.industry ,Deep learning ,Design Space Exploration ,Graph Neural Network ,Sciences informatiques [C05] [Ingénierie, informatique & technologie] ,Human-Computer Interaction ,Hardware and Architecture ,Time-Sensitive Networking ,Artificial intelligence ,business ,In-vehicle networks - Abstract
This study is a contribution towards leveraging deep learning to further automate the design of communication architectures used in critical systems and, ultimately, design systems that are more efficient in terms of resource usage. Two well identified use-cases of deep-learning, and AI at large, in the design of critical systems are 1) fast prediction techniques that can replace, at some stages of the design, exact approaches, and 2) technology-agnostic configuration algorithms, {\it i.e.} algorithms not relying on extensive domain knowledge. This paper contributes to the first use-case and presents what is, to the best of our knowledge, the first deep learning model for feasibility prediction of real-time Ethernet networks. Machine learning has been recently applied in real-time systems to predict whether Ethernet network configurations are feasible in terms of meeting deadline constraints without executing conventional schedulability analysis. However, the existing prediction techniques require domain expertise to choose the relevant input features and may perform poorly when topologies or traffic patterns differ significantly from the ones in the training data. To overcome these problems, we propose a Graph Neural Network (GNN) prediction model that synthesizes relevant features directly from the raw data. This deep learning model possesses the ability to exploit relations among flows, links, and queues in switched Ethernet networks, and, over the 13 testing sets used in this work, has proven an ability to generalize beyond the training data that is significantly superior to traditional ML algorithms. We also explore the use of ensembles of GNNs and show that it enhances the robustness of the predictions. An evaluation on heterogeneous testing sets comprising actual automotive networks, shows that ensembles of 32 GNN models features a prediction accuracy ranging from 79.3% to 90% for Ethernet networks using priorities as the Quality-of-Service mechanism. The use of ensemble models provides a speedup factor ranging from 77 to 1715 compared to schedulability analysis. Such speed-up factors unlock new possibilities for design-space exploration and the development of near-interactive design tools. A practical advantage of our model is that it automates the feature engineering process, and does not require domain expertise. In that regard, the model could potentially be efficient in other areas of real-time computing.
- Published
- 2021
28. Universal Hash Based Built-In Secure Transport in FlexE Over WDM Networks
- Author
-
Jiabin Cui, Yuefeng Ji, and Pengfei Zhu
- Subjects
Ethernet ,Radio access network ,business.industry ,Network security ,Universal hashing ,Computer science ,Ant colony optimization algorithms ,Hash function ,Overhead (computing) ,business ,Atomic and Molecular Physics, and Optics ,Networking hardware ,Computer network - Abstract
Flexible Ethernet (FlexE) over WDM transport is one of the key technologies for achieving high-speed next generation radio access network (NG-RAN). The security issue, such as optical fiber wiretap, becomes increasingly prominent. However, optical or electrical layer secure strategies cannot support higher rate and lower overhead transport, respectively. To this end, in this paper, we propose a cross-layer secure transport strategy in end-to-end FlexE over WDM networks, which leverages Universal Hashing based FlexE data block permutation and multiple parallel fiber transmission to achieve anti-eavesdropping. Different levels of attack ability are considered for measuring the impact on network security and resources utilization. Furthermore, the trade-off between efficient resources utilization and guarantee of higher level of transport security is also explored through building an integer linear programming (ILP) model. For the computation complexity of ILP model at large scale input conditions, a Security and resource-Efficiency-oriented Ant Colony optimization algorithm (SEAC) is proposed. Simulation results show that the cross-layer defense strategy is effective to struggle against intruders with different levels of attack ability, and the SEAC algorithm can achieve near-optimal performance and outperform the traditional first-fit algorithm.
- Published
- 2021
29. On the Cross-Layer Network Planning for Flexible Ethernet Over Elastic Optical Networks
- Author
-
Hui Liang, Nelson L. S. da Fonseca, and Zuqing Zhu
- Subjects
Ethernet ,Mathematical optimization ,Computer Networks and Communications ,Computer science ,Bin packing problem ,Heuristic (computer science) ,Approximation algorithm ,020206 networking & telecommunications ,Topology (electrical circuits) ,02 engineering and technology ,Network planning and design ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Leverage (statistics) ,Electrical and Electronic Engineering ,Integer programming - Abstract
This article studies the cross-layer network planning that tries to combine flexible Ethernet (FlexE) and elastic optical networks (EONs), for FlexE-over-EONs. We focus our investigation on the most challenging setting, i.e. , the FlexE-over-EONs based on the FlexE-aware architecture, and consider both single-hop and multi-hop scenarios for the cross-layer planning. For the single-hop scenario, we assume that all the client flows are routed over end-to-end lightpaths in the EON. We formulate a mixed integer linear programming (MILP) model for this problem, transform it into the class constrained bin packing problem (CCBP), and leverage the primal-dual interior-point (PDIP) method to propose a polynomial-time approximation algorithm for it. Then, for the multi-hop scenario, we use a more realistic assumption that each client flow can be routed over multiple lightpaths in the EON. We show that after solving the virtual topology design, the cross-layer planning in this scenario can be transformed into that in the single-hop scenario. Therefore, an integer linear programming (ILP) model is formulated to tackle the virtual topology design, and we design a polynomial-time approximation algorithm for it by modifying the well-known branch-and-bond method. To evaluate the performance of our two-step method for the multi-hop scenario, we also propose a heuristic algorithm. Extensive simulations verify that regarding large-scale cross-layer planning for FlexE-over-EONs, our approximation algorithms are significantly more time-efficient than the ILP/MILP models, and their solutions have bounded gaps to the optimal ones and are much better than those of the heuristic.
- Published
- 2021
30. Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network
- Author
-
Ruifeng Duo, Chuan Yue, Dengrui Wang, Lide Wang, and Haipeng Yan
- Subjects
Ethernet ,Science (General) ,Article Subject ,Computer Networks and Communications ,business.industry ,Computer science ,Denial-of-service attack ,Intrusion detection system ,Man-in-the-middle attack ,Q1-390 ,T1-995 ,Train ,business ,Technology (General) ,Information Systems ,Computer network - Abstract
The train communication Ethernet (TCE) of modern intelligent trains is under an ever-increasing threat of serious network attacks. Denial of service (DoS) and man in the middle (MITM), the two most destructive attacks against TCE, are difficult to detect by conventional methods. Aiming at their highly time-correlated properties, a novel dynamic temporal convolutional network-based intrusion detection system (DyTCN-IDS) is proposed in this paper to detect these temporal attacks. A semiphysical TCE testbed that is capable of simulating real situations in TCE-based trains is first built to generate an effective dataset for training and testing. DyTCN-IDS consists of two phases, and in the first phase, systematic feature engineering is designed to optimize the dataset. In the second phase, a basic detection model that is good at dealing with temporal features is first built by utilizing the temporal convolutional network with several architectural optimizations. Then, in order to decrease the computational consumption waste on network packet sequences with different lengths of inner temporal relationships, dynamic neural network technology is further adopted to optimize the basic detection model. Diverse experiments were carried out to evaluate the proposed system from different angles. The experimental results indicate that our system is easy to train, converges fast, costs less computational resources, and achieves satisfying detection performance with a macro false alarm rate of 0.09%, a macro F-score of 99.39%, and an accuracy of 99.40%. Compared to some canonical DL-based IDS and some latest IDS, our system acquires the best overall detection performance as well.
- Published
- 2021
31. A Chip-Level Optical Interconnect for CPU
- Author
-
Limin Xiao, Xiaolin Li, Qinfen Hao, Meng Han, Kai Hao, Kazuhiko Kurata, Nan Qi, Dongrui Fan, Xingmao Niu, Haiyun Xue, and Mengyuan Qin
- Subjects
Ethernet ,Computer science ,business.industry ,Payload (computing) ,Optical interconnect ,Chip ,Optical switch ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,visual_art ,Electronic component ,Hardware_INTEGRATEDCIRCUITS ,visual_art.visual_art_medium ,Electrical and Electronic Engineering ,Transceiver ,Adaptive optics ,business ,Computer hardware - Abstract
With the rapid growth of electronic chip’s performance, electric signal limits chip I/O in power consumption, reachability, and signal quality. In this letter, we propose a new chip-let architecture for chip-level optical interconnect. An optic I/O chip-let including an ultra-small optic transceiver and electronic components is implemented. Our analysis shows that the optical interconnect based on this architecture can achieve 1/3 power consumption and 1/2 area compared with traditional board-level optical interconnect in Ethernet NIC application. By adopting the architecture we proposed, the optic I/O chip-let can support any payload IC such as CPU, GPU, switch to have optic I/O.
- Published
- 2021
32. LightSpeed: A Compact, High-Speed Optical-Link-Based 3D Optoacoustic Imager
- Author
-
Ali Ozbek, Çağla Özsoy, Pascal A. Hager, Luca Benini, Andrea Cossettini, Xosé Luís Deán-Ben, Sergei Vostrikov, Daniel Razansky, University of Zurich, Razansky, Daniel, Ozsoy C., Cossettini A., Ozbek A., Vostrikov S., Hager P., Dean-Ben X.L., Benini L., and Razansky D.
- Subjects
Ethernet ,data acquisition ,high-speed imaging ,Computer science ,Image quality ,Optical link ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Laser ,10050 Institute of Pharmacology and Toxicology ,photoacoustic ,610 Medicine & health ,Iterative reconstruction ,030218 nuclear medicine & medical imaging ,law.invention ,Photoacoustic Techniques ,170 Ethics ,03 medical and health sciences ,0302 clinical medicine ,Optics ,Data acquisition ,3D imaging ,law ,1706 Computer Science Applications ,Humans ,10237 Institute of Biomedical Engineering ,Electrical and Electronic Engineering ,3614 Radiological and Ultrasound Technology ,Ultrasonography ,Radiological and Ultrasound Technology ,ultrasound ,business.industry ,Lasers ,2208 Electrical and Electronic Engineering ,Angiography ,Frame rate ,optoacoustic ,3. Good health ,Computer Science Applications ,1712 Software ,business ,Ultrashort pulse ,Software ,Human - Abstract
Wide-scale adoption of optoacoustic imaging in biology and medicine critically depends on availability of affordable scanners combining ease of operation with optimal imaging performance. Here we introduce LightSpeed: a low-cost real-time volumetric handheld optoacoustic imager based on a new compact software-defined ultrasound digital acquisition platform and a pulsed laser diode. It supports the simultaneous signal acquisition from up to 192 ultrasound channels and provides a hig-bandwidth direct optical link (2x 100G Ethernet) to the host-PC for ultra-high frame rate image acquisitions. We demonstrate use of the system for ultrafast (500Hz) 3D human angiography with a rapidly moving handheld probe. LightSpeed attained image quality comparable with a conventional optoacoustic imaging systems employing bulky acquisition electronics and a Q-switched pulsed laser. Our results thus pave the way towards a new generation of compact, affordable and high-performance optoacoustic scanners.
- Published
- 2021
33. White Rabbit Time Synchronization for Radiation Detector Readout Electronics
- Author
-
Shawn Hoover and Wolfgang Hennig
- Subjects
Ethernet ,Nuclear and High Energy Physics ,Physics - Instrumentation and Detectors ,Physics::Instrumentation and Detectors ,Computer science ,business.industry ,Detector ,Gigabit Ethernet ,FOS: Physical sciences ,Instrumentation and Detectors (physics.ins-det) ,Particle detector ,Clock synchronization ,Synchronization ,Nuclear Energy and Engineering ,Nuclear Experiment (nucl-ex) ,Electrical and Electronic Engineering ,Precision Time Protocol ,business ,Field-programmable gate array ,Nuclear Experiment ,Computer hardware - Abstract
As radiation detector arrays in nuclear physics applications become larger and physically more separated, the time synchronization and trigger distribution between many channels of detector readout electronics become more challenging. Clocks and triggers are traditionally distributed through dedicated cabling, but newer methods such as the IEEE 1588 Precision Time Protocol and White Rabbit allow clock synchronization through the exchange of timing messages over Ethernet. Consequently, we report here the use of White Rabbit in a new detector readout module, the Pixie-Net XL. The White Rabbit core, data capture from multiple digitizing channels, and subsequent pulse processing for pulse height and constant fraction timing are implemented in a Kintex 7 field programmable gate array (FPGA). The detector data records include White Rabbit timestamps and are transmitted to storage through the White Rabbit core’s gigabit Ethernet data path or a slower diagnostic/control link using an embedded Zynq processor. The performance is characterized by time-of-flight style measurements and by time correlation of high energy background events from cosmic showers in detectors separated by longer distances. Software for the Zynq processor can implement “software triggering,” for example to limit recording of data to events where a minimum number of channels from multiple modules detect radiation at the same time.
- Published
- 2021
34. Gigabit Ethernet Daisy Chain on FPGA for COMET Readout Electronics
- Author
-
Yuki Fujii, Eitaro Hamada, Masahiro Ikeno, Satoshi Mihara, Tomohisa Uchida, Y. Igarashi, Hajime Nishiguchi, Hiroshi Yamaguchi, Kazuki Ueno, and Kou Oishi
- Subjects
Ethernet ,Nuclear and High Energy Physics ,Physics - Instrumentation and Detectors ,business.industry ,computer.internet_protocol ,Computer science ,Network processor ,Gigabit Ethernet ,FOS: Physical sciences ,Instrumentation and Detectors (physics.ins-det) ,Internet protocol suite ,Nuclear Energy and Engineering ,Gate array ,Electrical and Electronic Engineering ,business ,Daisy chain ,Field-programmable gate array ,Throughput (business) ,computer ,Computer hardware - Abstract
The COMET experiment at J-PARC aims to search for the neutrinoless transition of a muon to an electron. We have developed the readout electronics board called ROESTI for the COMET straw tube tracker. We plan to install the ROESTI in the gas manifold of the detector. The number of vacuum feedthroughs needs to be reduced due to space constraints and cost limitations. In order to decrease the number of vacuum feedthroughs drastically, we developed a network processor with a daisy-chain function of Gigabit Ethernet for the FPGA on the ROESTI. We implemented two SiTCPs, which are hardware-based TCP processors for Gigabit Ethernet, in the network processor. We also added the data path controllers which handle the Ethernet frames and the event data. The network processor enables ROESTI to process the slow control over UDP/IP and to transfer event data over TCP/IP. By using the network processor, we measured the throughput, the stability, and the data loss rate for two to six ROESTIs. In any number of boards, the throughput of the event data transfer achieved the theoretical limit of TCP over the Gigabit Ethernet stably and ROESTI stably sent 100% of the data., IEEE Real Time 2020 Conference, 8 pages, 17 figures
- Published
- 2021
35. Cyber–Physical Codesign of Field-Level Reconfigurations in Networked Motion Controllers
- Author
-
Di Li and Nan Zhou
- Subjects
Ethernet ,business.industry ,Computer science ,Cyber-physical system ,Control reconfiguration ,Reconfigurability ,Motion controller ,EtherCAT ,Modular design ,Computer Science Applications ,Scheduling (computing) ,Control and Systems Engineering ,Embedded system ,Electrical and Electronic Engineering ,business - Abstract
To be successful in the quickly evolving future of machine building and meet the increasingly complex requirements of manufacturers, equipment manufacturers face challenges of reconfigurability on the motion controller. This article proposes a cyber–physical codesign approach to enable plug-and-play of field devices via real-time Ethernet in controllers. In our proposal, we first design a modular runtime framework to facilitate auto-discovery and self-configuration of servo drives with EtherCAT. Then, we implement a self-adaptive period synthesis method for real-time scheduling. The method can automatically attain a combination of minimized periods for communication and control task during startup and achieve dynamic compensations of drifts and jitters occurred in the network. Through experiments, we show that for various combinations of cyber–physical settings, our proposal can ensure low jitters ( $ 10 μs) and stable latencies with a 125 μs cycle time and achieve runtime reconfiguration with a 250 μs or larger cycle time.
- Published
- 2021
36. On Development of MySignals based prototype for application in health vitals monitoring
- Author
-
Suparna Biswas, Ramesh Saha, and Sohail Saif
- Subjects
Ethernet ,IoT ,business.industry ,Computer science ,Real-time computing ,Wearable computer ,Cloud computing ,Article ,Computer Science Applications ,Arduino ,Health care ,Cloud database ,Health monitoring ,The Internet ,Electrical and Electronic Engineering ,business ,Mobile device ,Wi-Fi ,Wearable sensor ,COVID 19 ,MySignals - Abstract
India's health infrastructure is under pressure since the daily COVID-19 cases have crossed the milestone of 4 Lakhs cases per day which surpass the previous years' peak. Patients with mild symptoms have been advised for home treatment since most of the hospitals are running out of bed. In this situation delivering healthcare to people has become revolutionizing due to the rapid advancement of embedded systems, communication, and informatics technologies. Integration of different health sensors, handheld devices, and internet can be a great potential for significant improvement of the quality of remote healthcare. This paper discusses the use of MySignals HW shield which is a hardware development platform for medical devices to build e-health monitoring system. Wearable health monitoring system prototype has been developed in this work. To conduct experiments, health vitals such as body temperature, ECG, oxygen saturation level, and pulse rate from 5 volunteers have been measured, collected, and stored in a cloud database using the system prototype. To evaluate the performance of the prototype, transmission delay has been recorded in both wired (Ethernet) and wireless (Wi-Fi) communication modes. It is observed that it takes 2.71 ms and 5.18 ms of time to collect and store the health vitals to the cloud database in wired and wireless mode respectively. Comparing the collected health vitals with the normal range of health vitals, no abnormality is found in all volunteer's health. Finally, a framework for contactless monitoring of COVID-affected patients is proposed. Contactless monitoring of health vitals can reduce the chance of community spread.
- Published
- 2021
37. Automatic Test System of the Back-End Card for the JUNO Experiment
- Author
-
Pierre-Alexandre Petitjean, Barbara Clerbaux, Yifan Yang, Peng Wang, and Shuang Hang
- Subjects
Ethernet ,Nuclear and High Energy Physics ,Physics - Instrumentation and Detectors ,Computer science ,business.industry ,Interface (computing) ,FOS: Physical sciences ,Instrumentation and Detectors (physics.ins-det) ,High Energy Physics - Experiment ,High Energy Physics - Experiment (hep-ex) ,Nuclear Energy and Engineering ,Gate array ,Electronics ,Electrical and Electronic Engineering ,System time ,Underwater ,business ,Field-programmable gate array ,Computer hardware ,Jiangmen Underground Neutrino Observatory - Abstract
The Jiangmen Underground Neutrino Observatory (JUNO) is a medium-baseline neutrino experiment under construction in China, with the goal to determine the neutrino mass hierarchy. The JUNO electronics readout system consists of an underwater front-end electronics system and an outside-water back-end electronics system. These two parts are connected by 100-m Ethernet cables and power cables. The back-end card (BEC) is the part of the JUNO electronics readout system used to link the underwater boxes to the trigger system and transmit the system clock and triggered signals. Each BEC is connected to 48 underwater boxes, and in total around 150 BECs are needed. It is essential to verify the physical layer links of the BEC before applying a real connection with the underwater system. Therefore, our goal is to build an automatic test system to check the physical link performance. The test system is based on a custom-designed field-programmable gate array (FPGA) board. In order to make the design general, only joint test action group (JTAG) is used as the interface to the PC. The system can generate and check different data patterns at different speeds for 96 channels simultaneously. The test results of 1024 continuously clock cycles are automatically uploaded to PC periodically. We describe the setup of the automatic test system of the BEC and present the latest test results.
- Published
- 2021
38. Efficient resource allocation method for hitless redundancy switching technology at multiple sites
- Author
-
Natsuki Yasuhara, Go Yazawa, Takahiro Kubo, and Shinichi Yoshihara
- Subjects
Ethernet ,Computer science ,business.industry ,Redundancy (engineering) ,Resource allocation ,business ,Computer network - Published
- 2021
39. Analysis of Ethernet Over Internet Protocol (EOIP) VPN Performance
- Author
-
Ahmad Purwana
- Subjects
Ethernet ,business.product_category ,Access network ,business.industry ,Computer science ,law.invention ,Network management ,law ,Internet Protocol ,Internet access ,business ,Energy source ,Protocol (object-oriented programming) ,Private network ,Computer network - Abstract
The need for interconnection between networks will be needed, especially in a company that has many branch offices, but companies usually demand a minimum use of resources in order to get maximum results. To overcome this problem, a Virtual Private Network (VPN) network is needed by utilizing the EOIP protocol, Ethernet Over IP (EOIP) is a protocol on Mikrotik RouterOS which functions to build a network tunnel between Mikrotik routers on a TCP / IP connection, namely by utilizing internet connection as a liaison. This study aims to analyze the performance of VPN by using the concept of Ethernet Over Internet Protocol (EOIP) on the existing network at PT. Energy Source Dempo. This analysis is needed to manage network access to connected data in each branch of the company. This is to anticipate access rights that enter the network owned by PT. Energy Source Dempo. The results of the analysis provide easy access rights and provide a sense of security from the data communication that occurs. In addition, the results of the analysis can also be used as network management control at PT. Dempo Sumber Energi so that the results of the analysis can maximize data communication performance.
- Published
- 2021
40. IoT-Based Wearable Sensors and Bidirectional LSTM Network for Action Recognition of Aerobics Athletes
- Author
-
Li Meijie, Hui Wang, Jing Ye, and Ning Wang
- Subjects
Ethernet ,Medicine (General) ,Article Subject ,Computer science ,Movement ,Biomedical Engineering ,Wearable computer ,Health Informatics ,Cloud computing ,02 engineering and technology ,Wearable Electronic Devices ,R5-920 ,Human–computer interaction ,Inertial measurement unit ,Medical technology ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,R855-855.5 ,Set (psychology) ,Exercise ,Class (computer programming) ,biology ,Athletes ,business.industry ,020206 networking & telecommunications ,biology.organism_classification ,020201 artificial intelligence & image processing ,Surgery ,business ,Wireless sensor network ,Sports ,Research Article ,Biotechnology - Abstract
Aerobics is the fusion of gymnastics, dance, and music; it is a body of a sports project, along with the development of the society. The growing demand for aerobics inevitably increases the demand for aerobics coach and teacher and has opened elective aerobics class which is an effective way of cultivating professional talents relevant to aerobics. Aerobics has extended fixed teaching mode and cannot conform to the development of the times. The motion prediction of aerobics athletes is a new set of teaching aid. In this paper, a motion prediction model of aerobics athletes is built based on the wearable inertial sensor of the Internet of Things and the bidirectional long short term memory (BiLSTM) network. Firstly, a wireless sensor network based on ZigBee was designed and implemented to collect the posture data of aerobics athletes. The inertial sensors were used for data collection and transmission of the data to the cloud platform through Ethernet. Then, the movement of aerobics athletes is recognized and predicted by the BiLSTM network. Based on the BiLSTM network and the attention mechanism, this paper proposes to solve the problem of low classification accuracy caused by the traditional method of directly summing and averaging the updated output vectors corresponding to each moment of the BiLSTM layer. The simulation experiment is also carried out in this paper. The experimental results show that the proposed model can recognize aerobics effectively.
- Published
- 2021
41. PENGEMBANGAN INFRASTRUKTUR JARINGAN BERBASIS NIRKABEL KE JARINGAN BERTEKNOLOGI GPEN (GIGABIT PASSIVE ETHERNET NETWORK) DI KAMPUS IAIN BENGKULU
- Author
-
Hari Aspriyono, Abdussalam Al Akbar, and Candra Wijaya
- Subjects
Ethernet ,Router ,Upload ,Interconnection ,business.industry ,Computer science ,Gigabit ,Bandwidth (computing) ,Wireless ,The Internet ,business ,Computer network - Abstract
The purpose of this research is to build an interconnection network using GPEN (Gigabit Passive Ethernet Network) technology so as to provide convenience for network admin users in managing, controlling, and maintaining each client, making it easy for network technicians when a breakdown occurs, and Providing easy client user authentication in the area (PUSKOM) IAIN Bengkulu. The research method used is research and development research, the research method used to aim at developing, producing products and waiting for the effectiveness of the research method. Developing a wireless-based network, namely a point-to-point radio to a network with GPEN technology (Gigabit Passive Ethernet Network) as a switch and router that supports gigabit ports and to control and monitor bandwidth on each client. Better network quality and efficiency so that activities such as browsing, uploading and downloading are faster.
- Published
- 2021
42. Temperature Control System for Heating-Holding Heater Based Arduino With Monitoring Via Webserver
- Author
-
Golfrid Gultom, Dejoi Situngkir, Manan Ginting, and Abdul Azis Rahmansyah
- Subjects
Ethernet ,Web server ,Temperature control ,Computer science ,business.industry ,Interface (computing) ,Energy consumption ,computer.software_genre ,Automotive engineering ,System requirements ,Arduino ,Internet of Things ,business ,computer - Abstract
Heat and hold method is a method with temperature containment techniques in accordance with desired temperature and time functions. This technique aims in adjusting the characteristics of microbial resistance to temperature and saving energy consumption. In this study, a tank with temperature control system was designed for heat and hold the temperature according to the system requirements. Control of the temperature in the heating tank can be done based on the Arduino microcontroller. Arduino reads data from the temperature sensor and activate the heater according to temperature set on the Arduino. Arduino Ethernet Shield acts as Arduino data communication with a database connected to the internet network. The results of this study are in the form of a prototype that shows an IoT-based temperature monitoring tool that can be accessed anywhere via Web-based monitoring system interface. The test was carried out in 2 stages, namely testing by determining target of heater and testing with Holding and Heating with a delay of 10 minutes and 20 minutes. The heating tank temperature control system maintain a temperature of 40oC, 50oC, 60oC for 10 minutes. The temperature holding condition at a certain time is called holding. Henceforth the system temperature is at 70oC.
- Published
- 2021
43. Deconstructing the Ethernet with ChokyFop
- Author
-
J Junmei, A Lukman, and G K Mohammed
- Subjects
Ethernet ,business.industry ,Computer science ,business ,Computer network - Abstract
The analysis of digital-to-analog converters is an unproven challenge. After years of confirmed research into flip-flop gates, we prove the analysis of systems, which embodies the compelling principles of programming languages. In our research we propose a novel algorithm for the refinement of multi-processors (ChokyFop), confirming that information re- trieval systems can be made relational, wireless, and constant- time.
- Published
- 2021
44. Process Control System for Producing a Silica-Based Modifying Additive
- Author
-
A. I. Karlina, Yu I. Karlina, and V. A. Ershov
- Subjects
Ethernet ,Signal processing ,business.industry ,Computer science ,Metals and Alloys ,Process (computing) ,Control engineering ,Condensed Matter Physics ,Automation ,Software ,Mechanics of Materials ,Materials Chemistry ,Process control ,Software requirements ,Polling ,business - Abstract
In this study, the authors describe the development of an automated system for controlling the technological process of obtaining a modifying concrete additive comprising spherical silicon dioxide nanostructures. The paper describes the automation object, outlines system development aims, as well as presenting the main process-specific parameters to be measured, adjusted, signaled, and / or blocked. A list of automation equipment of the field, lower, and upper levels of the automated process control system (APCS) is provided. As well as input signal processing, the automatic polling of sensors and instruments is achieved by employing a distributed system based on Siemens equipment for the collection of data, which interact via Ethernet. The paper considers software requirements for the APCS operation and analyzes its reliability. The maximum safety level of the APCS is SIL 3; the average service life is stated to be 12 years. The developed automated control system for the technological process of obtaining the silica-based modifying additive permits the development of its structure, specifically an increase in the number of measurement points using a 10% input-output margin. In addition, software and data support of the APCS allows the system configuration to be modified, as well as enabling its expansion through an upgrade and the input of new tasks (sets of tasks and algorithms).
- Published
- 2021
45. Linux and Supercomputing: How My Passion for Building COTS Systems Led to an HPC Revolution
- Author
-
David A. Bader and Alex Magoun
- Subjects
Ethernet ,History and Philosophy of Science ,General Computer Science ,Computer science ,media_common.quotation_subject ,Operating system ,Passion ,computer.software_genre ,Supercomputer ,computer ,media_common - Published
- 2021
46. Ultra-Wideband Pulse Radar Mounted on an Unmanned Aerial Vehicle for the Monitoring of Moving Objects
- Author
-
Maksis Celitans, J. Simanovichs, Vladimir Aristov, Romans Maliks, Eduard Lobanovs, S. Bondars, and R. Gailis
- Subjects
Ethernet ,Computer science ,Acoustics ,Transmitter ,Ultra-wideband ,law.invention ,Shock (mechanics) ,Pulse (physics) ,Control and Systems Engineering ,law ,Signal Processing ,Radar ,Vivaldi antenna ,Software ,Data transmission - Abstract
This article describes a classic ground-penetrating radar, which includes a transmitter on two step-recovery diodes for the shock excitation of an ultra-wideband Vivaldi antenna, a discrete sampling receiver with data transmission via Ethernet mounted on a six-blade unmanned aerial vehicle, experiments and processing results of the obtained signals for detecting the movement of small objects both in open space and behind a wall, as well as calculations to determine the thickness of the sounded walls in the case of a single measurement scenario.
- Published
- 2021
47. An Architecture for In-Vehicle Networks
- Author
-
Jean Walrand, Roy T. Myers, and Max Turner
- Subjects
Ethernet ,SIMPLE (military communications protocol) ,Computer Networks and Communications ,business.industry ,Computer science ,Mobile computing ,Aerospace Engineering ,CAN bus ,Bounded function ,Automotive Engineering ,In vehicle ,Ultrasonic sensor ,Electrical and Electronic Engineering ,Architecture ,business ,Computer network - Abstract
As vehicles get equipped with increasingly complex sensors and processors, the communication requirements become more demanding. Traditionally, vehicles have used specialized networking technologies designed to guarantee bounded latencies, such as the controller area network (CAN) bus. Recently, some have used dedicated technologies to transport signals from cameras, lidars, radars, and ultrasonic sensors. In parallel, IEEE working groups are defining Ethernet standards for time-sensitive networks (TSN). This paper describes an Ethernet-based architecture with provable guaranteed performance and simple configuration that is suitable for supporting the communication requirements of in-vehicle networks.
- Published
- 2021
48. Developing of the method for optimizing the performance of architecture-independent hardware platforms
- Author
-
Liubomyr Duda
- Subjects
bandwidth ,Ethernet ,HF5001-6182 ,ICE Tower CPU ,Computer science ,business.industry ,NVM Express ,architecture-independent platform ,Bandwidth (signal processing) ,Device file ,ARM architecture ,law.invention ,Bluetooth ,Single-board computer ,law ,T1-995 ,Business ,Raspberry Pi single-board computer ,business ,Technology (General) ,Computer hardware ,Data rate units - Abstract
The object of research is the Raspberry Pi single-board computer. The work examines the optimization of architecture-independent hardware platforms using its example. The research is based on an integrated scientific approach based on a system-analytical, structural-functional, empirical and typological approach. It is emphasized that the entire Raspberry Pi line uses APM-architecture processors. The genesis of Raspberry Pi is given, the parameters of the last build are determined. It is noted that the latest version is dated November 2020. It is equipped with wireless WiFi and Bluetooth modules (2×USB3.0 and 1×USB2.0 ports type A, 5.0, BLE), which expand the boundaries of mini-PC application in the field of Ethernet technologies and has a frequency of 1.8GHz. The appearance of one of the popular Raspberry Pi B+boards has been formed, with the separation of the main blocks. The basic principles of improving the performance of the Raspberry Pi single board computer are determined, each of which is based on a specific mechanism. The first is the addition of ZRAM as a compressed random access memory block device. The principle of ZRAM operation is described, the mechanism for activating ZRAM on the Raspberry Pi is given. To improve the performance of the Raspberry Pi single board computer, the use of an NVMe disk is justified. It is emphasized that the NVMe disk is reliable and has a high data transfer rate. Connecting it to the Raspberry Pi single board computer is the optimal solution to improve performance. The tuning sequence is presented, the numerical result of the NVMe disk operation based on the Raspberry Pi single-board computer is proposed. It is proposed, as a principle to improve performance, the installation of an ICE Tower CPU based on Raspberry Pi. It is noted that the ICE Tower CPU is a cooling system that is designed to cool the Raspberry Pi. The principles of tuning ICE Tower CPU and the result of fluctuations in temperature components using the rpi-monitor are described. As part of the study, performance improvements were obtained from 26% to 34%, which is mainly in line with the expected theoretical improvement of 34%.
- Published
- 2021
49. Implementasi Trunk Interkoneksi Multi Server menggunakan Singleboard Komputer
- Author
-
Waluyo Waluyo, Alwalid Nouvatie, and Martono Dwi Atmadja
- Subjects
Ethernet ,Prefix ,Voice over IP ,Network packet ,business.industry ,Computer science ,Server ,Codec ,General Medicine ,Telephony ,business ,Telephone line ,Computer network - Abstract
Voice over Internet Protocol (juga disebut VoIP, IP Telephony, Internet telephony atau Digital Phone) adalah teknologi yang memungkinkan percakapan suara jarak jauh melalui media internet. Data suara diubah menjadi kode digital dan dialirkan melalui jaringan yang mengirimkan paket-paket data, dan bukan lewat sirkuit analog telepon biasa. Dalam komunikasi VoIP, pemakai melakukan hubungan telepon melalui terminal yang berupa PC atau telepon biasa. Dengan bertelepon menggunakan VoIP, banyak keuntungan yang dapat diambil diantaranya adalah dari segi biaya jelas lebih murah dari tarif telepon tradisional, karena jaringan IP bersifat global. IP Phone dapat di tambah, dipindah dan di ubah. Hal ini karena VoIP dapat dipasang di sembarang ethernet dan IP address, tidak seperti telepon konvensional yang harus mempunyai port tersendiri di Sentral atau PBX (Private branch exchange). Dalam penelitian ini mengimplementasikan keterhubungan antar server menggunakan single board computer yang di install sistem operasi Elastix yang bertujuan untuk mengimplementasikan prefix untuk antar server dan menggunakan beberapa codec audio. Hasil penelitian telepon menggunakan prefix dan tanpa prefix sebanyak 6 client atau 3 pasng panggilan secara bersamaan nilai packet loss tertinggi pada codec speex dengan prefix sebesar 2,34%. Nilai bandwidth tertinggi yang digunakan adalah dengan prefix codec PCMU dengan rata-rata 82,3 Kbps dan tanpa prefix 79,3 Kbps. Kata kunci : Server, VoIP, IP Telphony, Internet telephony, Digital Phone, IP Address, PBX, Codec, Prefix.
- Published
- 2021
50. FPGA-based 10G/40G Ethernet Firmware for Pixel Detector in SHINE
- Author
-
Changge Zi, Xiaoshan Jiang, Cong He, Nian Yu, Hangxu Li, Cai Yanke, and Jie Zhang
- Subjects
Ethernet ,Nuclear and High Energy Physics ,business.industry ,Firmware ,Computer science ,computer.software_genre ,Nuclear Energy and Engineering ,Network interface controller ,Bandwidth (computing) ,System time ,Polling ,business ,Field-programmable gate array ,computer ,Computer hardware ,Communication channel - Abstract
Shanghai HIgh repetition rate XFEL aNd Extreme light facility (SHINE) is a free electron laser facility, which will provide research methods such as high-resolution imaging for many disciplines. The pixel detector, which is in the pre-research stage, is one of most important components of the facility. The current target data rate of the pixel detector in SHINE is about 100 GB/s. Considering the high data rate, the 10G/40G Ethernet firmware for pixel detector in SHINE was developed on field programmable gate array (FPGA), which will lead to more integrated electronic design and make the system smaller. The firmware converts the media independent interfaces (MII) of 10G and 40G Ethernet to each other and uses a polling method to process data from four 10G Ethernet channels. Based on the above methods, the firmware can merge four 10G Ethernet channels into one 40G Ethernet channel. The firmware successfully transmits data between the data source and the server. The bandwidth of the firmware is 36.66 Gbps when the computer equipped with 10G network interface controller (NIC) is set as the data source. Through joint test with the 1G/10G hub and SiTCP, the bandwidth of firmware is 36.3 Gbps. And 40 SiTCP nodes whose system clock frequency can exceed 125 MHz can be used as the data source of the firmware, which will provide a variety of technical solutions for pixel detector.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.