Application Layer Benefits of Redundant Disjoint Paths in a Real-Time Ethernet

Author(s):  
Stefan Farthofer ◽  
Diego Teixeira Barreto Lima ◽  
Jia Lei Du
Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7326
Author(s):  
Alper Kaan Sarica ◽  
Pelin Angin

The significant advances in wireless networks in the past decade have made a variety of Internet of Things (IoT) use cases possible, greatly facilitating many operations in our daily lives. IoT is only expected to grow with 5G and beyond networks, which will primarily rely on software-defined networking (SDN) and network functions virtualization for achieving the promised quality of service. The prevalence of IoT and the large attack surface that it has created calls for SDN-based intelligent security solutions that achieve real-time, automated intrusion detection and mitigation. In this paper, we propose a real-time intrusion detection and mitigation solution for SDN, which aims to provide autonomous security in the high-traffic IoT networks of the 5G and beyond era, while achieving a high degree of interpretability by human experts. The proposed approach is built upon automated flow feature extraction and classification of flows while using random forest classifiers at the SDN application layer. We present an SDN-specific dataset that we generated for IoT and provide results on the accuracy of intrusion detection in addition to performance results in the presence and absence of our proposed security mechanism. The experimental results demonstrate that the proposed security approach is promising for achieving real-time, highly accurate detection and mitigation of attacks in SDN-managed IoT networks.


2013 ◽  
Vol 390 ◽  
pp. 459-463
Author(s):  
Ming Zong ◽  
Qian Wang ◽  
Feng Ge Zhang

In order to online real-time monitor of underground cable tunnel environment and running state, the timely discover and preclude troubleshooting that may occur, and to ensure the safety and reliability of the cable running. This article describes the underground cable environment online monitoring system platform based on CAN bus technology, and which is in its application layer using a common international CANopen protocol. This paper focuses on the realization of analog modules. It provides timely and effective monitoring method for real-time monitoring of the underground cable environment.


2013 ◽  
Vol 431 ◽  
pp. 318-324 ◽  
Author(s):  
Chau Chung Song ◽  
Chen Fu Feng ◽  
Chieh Yao Lin ◽  
Bo Hao Yan

In this paper, an application-layer networking system is analyzed and implemented for wireless sensor network. We focus on studying the binding connection methods on the applicationlayer network to implement the universal plug in/out capability on ZigBee networks. The proposed application-layer network provides a cluster-based and plug-and-play communication functions to dynamically and automatically connect in/out the ZigBee nodes on wireless sensor networks. Moreover, the network planning and connection mechanism is achieved by the Binding link objects of ZigBee application-layer functions. By means of Binding connection method, ZigBee nodes in sensor network can obtain the real-time messages and valid information each other. In this study, the various parameters setting and system firmware program are designed to analyze and evaluate the binding methods and data packets of application-layer communication for ZigBee network. Finally, the profile cluster IDs of application-layer network are applied to build up the specific ZigBee sensor systems with Cluster In/Out functions.


2022 ◽  
Vol 355 ◽  
pp. 02040
Author(s):  
Jinxue Cui ◽  
Bin Han

The design and implementation of the MVB conformance test system is of great significance in both professional theory and practical application. Conformance test for MVB, mainly to determine whether the MVB equipment IUT is consistent with the MVB protocol standard requirements in the TCN standard. The conformance test of MVB equipment IUT covers most of the contents of the RTP real-time protocol such as the physical layer, link layer, network layer, transport layer and application layer. This subject will analyse and study the consistency test of the MVB physical layer.


2006 ◽  
Vol 18 (1) ◽  
pp. 36-43 ◽  
Author(s):  
Masahiko Narita ◽  
◽  
Makiko Shimamura ◽  
Makoto Oya ◽  

Remote-robot-control study and standardization have mainly focused on real-time mission-critical communication. As robot technology expands in non-industrial areas such as entertainment and home use, a more flexible communication is required to realize communication between robots and between robots and computers in open/public network space, which need not be real-time or mission-critical. The RoboLink Protocol, developed as a standardized protocol for such communication, is based on Web services technology to ensure flexibility. We discuss requirements for robot communication reliability, an important practical issue, especially in loosely coupled environments, wireless networks, and WANs. To ensure reliability, we propose combining two solutions: one for the transport layer using standard messaging technology and the other for the application layer implementing transaction behavior with recovery for fatal failures. We provide a guideline for developers on how to implement recovery easily in their applications. We confirmed the feasibility of our proposal using sample implementation developed as a plug-in handler for the Web server.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4221
Author(s):  
Abid Rauf ◽  
Zhaohong Wang ◽  
Hasan Sajid ◽  
Muhammad Ali Tahir

As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.


2014 ◽  
Vol 721 ◽  
pp. 603-606
Author(s):  
Hai Yan Zhang ◽  
Kai Di Zhu ◽  
Jian Zhong Wan

As an important application area of field-bus system, UPS require high reliability and real-time property. Standard CAN protocol in application layer have not been proposed in home and abroad. Based on CAN-bus 2.0 A/B, this paper designed UPS-CAN protocol which conform to general UPS parallel system and proposed a novel network management system (MSN) during development of module UPS parallel system. Experimental results proved the reliability and real-time property of UPS-CAN which meets the requirement of UPS parallel communication system.


Sign in / Sign up

Export Citation Format

Share Document