Performance of an industrial data communication protocol on ethernet network

Author(s):  
Endra Joelianto ◽  
Hosana
2012 ◽  
Vol 580 ◽  
pp. 155-159
Author(s):  
Xiang Ming Wang ◽  
Jin Chao Wang ◽  
Dong Hua Sun

In this paper, the real-time EtherCAT technology is introduced in detail, which including operating principle, communication protocol and the superiority performance of EtherCAT i.e. synchronicity, simultaneousness and high speed. To show how to design a slave system that considering the characteristics of application, the method of developing systems based no EtherCAT technology are proposed. Finally, a data acquisition system based on EtherCAT technology is designed. Application of EtherCAT technology can improve the real-time characteristics of data communication in wind power system.


Author(s):  
Richard Li ◽  
Uma S. Chunduri ◽  
Alexander Clemm ◽  
Lijun Dong

Industrial machine-type communications (e.g., industrial internet), emerging applications such as holographic type communications, IP mobile backhaul transport for 5G/B5G (beyond 5G) for ultra-reliable low latency communications and massive machine-type communications, emerging industry verticals such as driverless vehicles, and future networking use cases as called out by ITU-T's focus group on network 2030 all require new networking capabilities and services. This chapter introduces “New IP,” a new data communication protocol that extends packet networking with new capabilities to support future applications that go beyond the capabilities that are provided by internetworking protocol (IP) today. New IP is designed to allow the user to specify requirements, such as expectations for key performance indicators' (KPIs) service levels, and other guidance for packet processing and forwarding purposes. New IP is designed to interoperate with existing networks in a straightforward manner and thus to facilitate its incremental deployment that leverages existing investment.


2021 ◽  
Author(s):  
Anusha Kannan ◽  
Manikandan N ◽  
Mallikarjuna Nandi ◽  
Morsa Chaitanya ◽  
Chunduru Anilkumar

Abstract The existence of intruders is a threat factor in any network. Degradation of the network operation occur which include delay in transmission, reduced network energy level, low throughput and many. In heterogeneous networks, the threat is complex since it has several interconnected devices working with different operating systems. To solve the trust dispute in the network a Robust and Secure Data Communication Protocol for MANET termed as Software Defined networking enabled Virtual Certification Authority (SDVCA) is proposed. In MANET, the nodes forward information among them. To control the data flow in a MANET the network has to establish a controller node and forwarder nodes for transmitting or forwarding data. The forwarder node carries out the operation of router. The VCA provides authentication certificate for all the network nodes. Without this authentication, the node will be declared as an untrusted intruder. No data will be transferred to or through them. Hence a trusted network is formed and efficient safe data transfer is achieved. In the proposed scheme, the control logic of MANET is moved from forwarding plane (node) to control plane (node) for improving the network performance. A social network model in MANET is designed to create controller-based architecture. This controller node will function as a host and also as a pathway of connecting different social networks in MANET architecture. The results provide improved performances and the network has better throughput, and lesser end to end delay when compared with the existing techniques.


2018 ◽  
Vol 7 (4.11) ◽  
pp. 262
Author(s):  
M. H. Amaran ◽  
M. S. Rohmad ◽  
L. H. Adnan ◽  
N. N. Mohamed ◽  
H. Hashim

This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when developing IoT applications.   


2013 ◽  
Vol 10 (4) ◽  
pp. 395-400
Author(s):  
G. Wang ◽  
X. Luo

By selecting hardware, erecting CAN network structure and adopting appropriate software and standard communication protocol to debug the system, the system realizes the data communication between controller and Kingview based on CAN bus. At the same time?with the detailed description of the debugging process and the validation of debugging results, the system realizes the monitor to controller by programming computer through CAN bus and the CAN data have been in a state of monitoring in the whole process. Testing results show that the system has good reliability, real-time and practicality, and shows the advantages of CAN bus.


Sign in / Sign up

Export Citation Format

Share Document