scholarly journals AM-DisCNT: Angular Multi-hop DIStance Based Circular Network Transmission Protocol for WSNs

Author(s):  
A. Rao ◽  
M. Akbar ◽  
N. Javaid ◽  
S.N. Mohammad ◽  
S. Sarfraz
2014 ◽  
Vol 608-609 ◽  
pp. 435-439
Author(s):  
Xiao Lei Wu

Combined with the transmission characteristics of multi node under master-slave mode, the paper design a high speed parallel transmission network based on RS485 bus, realize sampling nodes on the bus communication data packet detection using the ring buffer technique, and use the hardware timer and system parameters in the controller, combine with a custom packet to complete point to point protocol design of broadcast communication, in order to realize the free cutting of the whole system and reliable control and stable data transmission and node. The actual field test that communication rate has no error and error operation under the condition of the cable length of 2 Mbps and 100 m.


2013 ◽  
Vol 756-759 ◽  
pp. 3669-3673
Author(s):  
Jun Chen ◽  
He Huang ◽  
Ting Wu ◽  
Bin Duan

In this paper, aiming at the characteristics of auto parts enterprises product development, the object-oriented case knowledge expression to build auto parts product development database is used, the nearest neighbor algorithm is as similarity algorithm of case retrieval, the TCP/IP network technology is as the main network transmission protocol, C/S is as the application system to build the case retrieval system, and EPS steering gear is as an example.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

This paper investigates an average secrecy rate (ASR) maximization problem for an unmanned aerial vehicle (UAV) enabled wireless communication system, wherein a UAV is employed to deliver confidential information to a ground destination in the presence of a terrestrial passive eavesdropper. By employing an artificial noise (AN) injection based secure two-phase transmission protocol, we aim at jointly optimizing the UAV’s trajectory, network transmission power, and AN power allocation over a given time horizon to enhance the ASR performance. Specifically, we divide the original non-convex problem into four subproblems, and propose a successive convex approximation based efficient iterative algorithm to solve it suboptimally with guaranteed convergence. Simulation results demonstrate significant security advantages of our designed scheme over other known benchmarks, particularly for stringent flight durations.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

This paper investigates an average secrecy rate (ASR) maximization problem for an unmanned aerial vehicle (UAV) enabled wireless communication system, wherein a UAV is employed to deliver confidential information to a ground destination in the presence of a terrestrial passive eavesdropper. By employing an artificial noise (AN) injection based secure two-phase transmission protocol, we aim at jointly optimizing the UAV’s trajectory, network transmission power, and AN power allocation over a given time horizon to enhance the ASR performance. Specifically, we divide the original non-convex problem into four subproblems, and propose a successive convex approximation based efficient iterative algorithm to solve it suboptimally with guaranteed convergence. Simulation results demonstrate significant security advantages of our designed scheme over other known benchmarks, particularly for stringent flight durations.


2021 ◽  
Vol 2093 (1) ◽  
pp. 012036
Author(s):  
Zhuomao Zhao ◽  
Yujie Yang ◽  
Xue Long ◽  
Hongwei Cui

Abstract This paper discusses the setting of transceiver based on functional programming, and decouples the differences between communication protocol and network transmission protocol from the specific business implementation. In the actual application, the service implementation is set up. When the communication protocol changes, the function can be realized only by modifying the communication protocol, which improves the readability of the program and reduces its maintenance overhead


2010 ◽  
Vol 129-131 ◽  
pp. 1291-1295
Author(s):  
Xiao Qiang Jiang

The article focuses on the research of a reliable data transmission extension protocol -- UDT based on UDP, the related implementation method and transmission control method of multimedia data real-time and reliable transmission, the improvement to algorithm of its related methods in specific applications; as well as the improvement to AIMD (Additive Increase and Multiplicative Decrease) congestion controlling algorithm, proposing DAIMD congestion controlling algorithm; the sending rate increment is changed from the constant quantity to the variable quantity which continuously reduces with the continuous increase of the sending rates, so it not only makes a more rational use of limited network bandwidth, also reduces the larger oscillation in the network data transmission; the improvement of validation mechanisms, propose validation mechanisms based on the combination of time and data packets numbers, and improve the efficiency of data transmission. When the multimedia data network transmits, the transmitter and receiver need to identify a network transmission protocol. According to the above analysis, UDP is a simple transmission level protocol, non-connection-oriented, and itself does not provide data retransmission and confirmation, therefore adopting UDP as the network transmission protocol can improve the data transmission efficiency, besides UDP supports the webcast function, suitable for multimedia data network transmission [1]. However, the characteristic of multimedia data network transmission requests the network transmission protocol can handle the phenomenon of delay and vibration in the transmission process; can handle bursting multimedia data transmission; can judge the network condition according to the reception quality of the receiver and the sender can make the appropriate response; can ensure the reliability of multimedia data network transmission and so on. Features of UDP its own design make it deal with such situations not very well, also UDP limits the sending data packet size each time; when the multimedia data network transmits, a video data often exceed this limit. Therefore, according to the previous analysis of multimedia data network transmission characteristics and technical requirements, this article studies the reliable data transmission extension protocol -- UDT based on UDP, and improves the related algorithm and control mechanism in the protocol to make it more suitable for the multimedia data network transmission in the embedded video surveillance system.


2014 ◽  
Vol E97.B (12) ◽  
pp. 2784-2789
Author(s):  
Chunguo LI ◽  
Yongping ZHANG ◽  
John M. CIOFFI ◽  
Luxi YANG

Sign in / Sign up

Export Citation Format

Share Document