scholarly journals A Survey on Emulation of Communication Protocols in Microcontrollers

Author(s):  
Ashok Rathish S ◽  
Dr. Paramasivam K

Basic emulation of communication protocols involves the emulation or replicating the frames of the communication protocols using the port pins. This is useful when there is a particular need for a protocol inside a microcontroller where the required communication protocol is not present. The survey on emulation is suitable for the users to have a brief knowledge about the emulation before proceeding. This survey on emulation of communication protocols gives a brief information regarding the parameters, timing, and also the issues and problems faced during the emulation. A brief comparison was made with some different communication protocol emulation using a simple timer module. This will be helpful in concluding the behavior of each communication protocol on a simple timer module using which the protocol will be emulated.

2019 ◽  
Vol 49 (1) ◽  
pp. 383-404
Author(s):  
Marcin Bednarek ◽  
Tadeusz Dąbrowski ◽  
Wiktor Olchowik

Abstract Industrial networks combine elements of distributed control systems: process stations, operator stations and engineering stations. DCS stations often communicate using a dedicated, closed communication protocol. The industrial networks can be also used to manage communication between the stations of various systems, separate in terms of configuration. The process station communicates here with an external operator station, that is the SCADA system. For this purpose, the process stations and the SCADA systems can also communicate according to standard communication protocols, e.g. Modbus TCP. The paper examines the selected variants of diagnosing the communication status between the process station and the external operator station conducted according to the Modbus TCP protocol. The practical methods of finding the communication system unfitness causes are discussed.


Author(s):  
Carlos Caloca ◽  
J. Antonio Garcia Macias

The potential for vehicular applications is rapidly increasing. However this variety also demands a flexible multihop communication protocol supporting different communications needs and adapting to the network environment and to context elements specified by the application itself. We think that adaptive solutions, recently starting to be applied to VANET routing and dissemination protocols, have a great potential for solving the problems stated above. The objective of this chapter is to introduce the reader to these kinds of solutions, show their benefits and also mention the challenges involved. Because one important aspect of adaptive solutions (in this case a common communication protocol for all applications), is having in-depth knowledge of the problem to solve, we first review these different vehicular applications and their classification, followed by their communication needs.


2021 ◽  
Vol 50 (1) ◽  
pp. 28-44
Author(s):  
Yaser Chaaban

Communication protocols are used in telecommunication systems. These protocols are defined as rules, which enable the entities of communicating systems to transfer information usually as packages. Additionally, each standard communication protocol has uniquely-defined structure and consequently a special pattern of network packets. Here, it is worth mentioning that communication protocols are implemented in different ways, in the system software layer or in hardware layer (silicon chipsets). This paper presents the implementation of a special communication protocol called "Packet Analysis", which is used in the Hardware project "Minimax machine". This implementation is a software that can be written using a special simulator "Minimax simulator", which is the target execution environment. That simulator was successfully developed for micro programming and hardware simulations. In this regard, this study develops an algorithm that represents a step toward simulating communication protocols using micro-programming. The flow chart designed here gives an overview of how the "Packet Analysis" algorithm works (designed protocol), which in turn describes all steps in details. As a result, the entire system of this research paper was implemented and tested with various input values. Additionally, the implemented proposed solution (implemented protocol) was evaluated by two metrics (quantitative measures) using test-benches so that its statistics will be trustworthy for research. Other results of this study showed that there is a lot of scope for optimization in the solution presented in this research paper. This leads in turn to optimize the proposed implementation and to consider implementation alternatives.


Constrained devices are commonly used in the Internet of Things systems. Since these devices have limited communication and computation resources, communication protocols which are lightweight are needed. A lightweight protocol called Message Queue Telemetry Transport, which is a publish/subscribe messaging protocol, is utilized with the constrained devices. Hence, this paper is aimed at monitoring data by using machine-to-machine communication protocol with the help of an IoT device, Raspberry Pi.


Author(s):  
José Manuel García-Campos ◽  
Daniel Gutiérrez ◽  
Jesús Sánchez-García ◽  
Sergio Toral Marn

The need for a Mobile Ad-Hoc Network (MANET) in environments where there is a lack of communication infrastructure, such as disaster or emergency scenarios, is critical to save lives. MANETs can be used as an alternative network that solves the problem of communications. The selection of an appropriate MANET communication protocol is crucial for the good performance of the whole network. Due to the great variety of communication protocols available for MANETs such as routing and broadcasting protocols, the selection of the most suitable one for disaster scenarios is a relevant task. Routing protocols and broadcasting algorithms are normally evaluated and compared using simulation-based studies. However, conducting reliable and repeatable simulation studies is not a trivial task because many simulation parameters should be correctly configured. In this paper, we propose a methodology for conducting reliable simulations of MANET broadcasting algorithms in disaster scenarios. The proposed methodology is focused on the source nodes selection based on different metrics.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1687
Author(s):  
Pallavi Srivastava ◽  
Edwin Chung ◽  
Stepan Ozana

Addition is the key operation in digital systems, and floating-point adder (FPA) is frequently used for real number addition because floating-point representation provides a large dynamic range. Most of the existing FPA designs are synchronous and their activities are coordinated by clock signal(s). However, technology scaling has imposed several challenges like clock skew, clock distribution, etc., on synchronous design due to presence of clock signal(s). Asynchronous design is an alternate approach to eliminate these challenges imposed by the clock, as it replaces the global clock with handshaking signals and utilizes a communication protocol to indicate the completion of activities. Bundled data and dual-rail coding are the most common communication protocols used in asynchronous design. All existing asynchronous floating-point adder (AFPA) designs utilize dual-rail coding for completion detection, as it allows the circuit to acknowledge as soon as the computation is done; while bundled data and synchronous designs utilizing single-rail encoding will have to wait for the worst-case delay irrespective of the actual completion time. This paper reviews all the existing AFPA designs and examines the effects of the selected communication protocol on its performance. It also discusses the probable outcome of AFPA designed using protocols other than dual-rail coding.


2006 ◽  
Vol 04 (06) ◽  
pp. 925-934 ◽  
Author(s):  
JIAN WANG ◽  
QUAN ZHANG ◽  
CHAOJING TANG

Most of the quantum secure direct communication protocols need a pre-established secure quantum channel. Only after ensuring the security of quantum channel can the sender encode the secret message and send it to the receiver through the secure channel. In this paper, we present a quantum secure direct communication protocol using Einstein–Podolsky–Rosen pairs and teleportation. It is unnecessary for the present protocol to ensure the security of the quantum channel before transmitting the secret message. In the present protocol, all Einstein–Podolsky–Rosen pairs are used to transmit the secret message except those chosen for eavesdropping check. We also discuss the security of our protocol under several eavesdropping attacks.


2020 ◽  
Vol 34 (05) ◽  
pp. 7244-7252
Author(s):  
Munindar Singh ◽  
Amit Chopra

Engineering a decentralized multiagent system (MAS) requires realizing interactions modeled as a communication protocol between autonomous agents. We contribute Clouseau, an approach that takes a commitment-based specification of an interaction and generates a communication protocol amenable to decentralized enactment. We show that the generated protocol is (1) correct—realizes all and only the computations that satisfy the input specification; (2) safe—ensures the agents' local views remain consistent; and (3) live—ensures the agents can proceed to completion.


2020 ◽  
Vol 69 ◽  
pp. 1351-1393
Author(s):  
Amit K Chopra ◽  
Samuel H Christie V ◽  
Munindar P. Singh

Communication protocols are central to engineering decentralized multiagent systems. Modern protocol languages are typically formal and address aspects of decentralization, such as asynchrony. However, modern languages differ in important ways in their basic abstractions and operational assumptions. This diversity makes a comparative evaluation of protocol languages a challenging task. We contribute a rich evaluation of diverse and modern protocol languages. Among the selected languages, Scribble is based on session types; Trace-C and Trace-F on trace expressions; HAPN on hierarchical state machines, and BSPL on information causality. Our contribution is four-fold. One, we contribute important criteria for evaluating protocol languages. Two, for each criterion, we compare the languages on the basis of whether they are able to specify elementary protocols that go to the heart of the criterion. Three, for each language, we map our findings to a canonical architecture style for multiagent systems, highlighting where the languages depart from the architecture. Four, we identify design principles for protocol languages as guidance for future research.


1995 ◽  
Vol 34 (01/02) ◽  
pp. 75-78 ◽  
Author(s):  
R. D. Appel ◽  
O. Golaz ◽  
Ch. Pasquali ◽  
J.-C. Sanchez ◽  
A. Bairoch ◽  
...  

Abstract:The sharing of knowledge worldwide using hypermedia facilities and fast communication protocols (i.e., Mosaic and World Wide Web) provides a growth capacity with tremendous versatility and efficacy. The example of ExPASy, a molecular biology server developed at the University Hospital of Geneva, is striking. ExPASy provides hypermedia facilities to browse through several up-to-date biological and medical databases around the world and to link information from protein maps to genome information and diseases. Its extensive access is open through World Wide Web. Its concept could be extended to patient data including texts, laboratory data, relevant literature findings, sounds, images and movies. A new hypermedia culture is spreading very rapidly where the international fast transmission of documents is the central element. It is part of the emerging new “information society”.


Sign in / Sign up

Export Citation Format

Share Document