Exploring Data Communication at System Level through Reverse Engineering

2014 ◽  
Vol 687-691 ◽  
pp. 3809-3811
Author(s):  
Yan Lin Gao ◽  
Wen Peng Wang ◽  
Chuan Sheng Wu

In the interaction of the operating system, drivers and peripheral equipment, for the user of the system at a low level, understand the importance of the system architecture of data communication, hardware programming. In this paper, we through the research and development ofa USB device driver for the underlying data communication and resource management. The method of reverse engineering in this study, we focus on exploring the use of Linux operating system USB protocol and the development of device driver. We must from the evaluation of differentdevice drivers for a variety of experiments and the test results are verygood. We believe, can offer the theoretical basis for the user a clearunderstanding of the actual data communication from the hardware to the user space application and any unsupported peripheral hardware device for the reproduction of the work.

2011 ◽  
Vol 216 ◽  
pp. 261-265
Author(s):  
Biao Liu ◽  
Can Ping Li

TCP/IP is a typical layered protocol suite, and network protocol layering is the widely accepted rule. As studying TCP/IP, conceptually protocol layering is easy to understand, but TCP/IP stack usually is implemented in the kernel of Linux operating system, thus how layering protocol works is hard to know. After studying the IP fragment and defragment process in Linux kernel, a layered protocol defined in application level is designed, and a program based on this application layered protocol to simulate IP fragment and defragment is implemented in this paper. With this program, not only is the process of IP fragmentation and defragmentation in Linux kernel clearly displayed, but also the complete handling of a layered protocol is showed.


2020 ◽  
Vol 3 (2) ◽  
pp. 103-113
Author(s):  
Rachmad Ikhsan ◽  
Effendi Effendi

Roasting coffee manually is widely applied by coffee producers. This process takes a very long time and is less efficient in terms of productivity for industry standards. This machine  is equipped with a thermocouple sensor as a temperature sensor that will measure the temperature in the roasting cylinder, then equipped with a timer as a reminder of roasting time that ranges from 15 minutes at a temperature of 200 degrees Celsius, this machine  is also equipped with android as a timer controller on the coffee roaster machine. This machine is also equipped with a microcontroller and Bluetooth as a media transmitter and data receiver. From the test results obtained data that Bluetooth can be used for data communication between the microcontroller and Android with a distance of 30 meters in the room, and 12 meters outside the room. If it exceeds that distance, then Bluetooth will not respond back


2017 ◽  
Vol 13 (05) ◽  
pp. 56
Author(s):  
Yan Chen

With the progress of the times, the network has grown into the people's work and life. The limitations of the traditional wireless sensor network (WSN) have become increasingly prominent, and it is obviously unable to meet the requirements of Internet access. Therefore, the 4G mobile Android system is used as a carrier, to design an application layer gateway system for realizing wireless communication between wireless sensor networks and heterogeneous cellular networks, so as to build wireless sensor cellular network. The design and implementation of the AP module, data receiving and forwarding module, network packet loss management and retransmission of the gateway systemis the focus, and then the implemented gateway system is tested. The test results show that the design of the Android platform wireless sensor network gateway system can connect the sensor network to the cellular network, so as to realize data communication, and to ensure that the data loss rate is less than 0.1%. Through testing, it is concluded that the system can meet the actual demand


Author(s):  
Nurul I. Sarkar

Motivating students to learn TCP/IP network fundamentals is often difficult because students find the subject rather technical when it is presented using a lecture format. To overcome this problem we have prepared some hands-on exercises (practicals) that give students a practical learning experience in TCP/IP networking. The practicals are designed around a multi-user, multi-tasking operating system and are suitable for classroom use in undergraduate TCP/IP networking courses. The effectiveness of these practicals has been evaluated both formally by students and informally in discussion within the teaching team. The implementation of the practicals was judged to be successful because of the positive student feedback and that students improved their test results. This chapter describes the practicals and their impact on student learning and comprehension, based on the author’s experiences in undergraduate computer networking courses.


Micromachines ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 1075
Author(s):  
Tao Cai ◽  
Qingjian He ◽  
Dejiao Niu ◽  
Fuli Chen ◽  
Jie Wang ◽  
...  

The non-volatile memory (NVM) device is a useful way to solve the memory wall in computers. However, the current I/O software stack in operating systems becomes a performance bottleneck for applications based on NVM devices, especially for key–value stores. We analyzed the characteristics of key–value stores and NVM devices and designed a new embedded key–value store for an NVM device simulator named PMEKV. The embedded processor in NVM devices was used to manage key–value pairs to reduce the data transfer between NVM devices and key–value applications. Meanwhile, it also cut down the data copy between the user space and the kernel space in the operating system to alleviate the I/O software stacks on the efficiency of key–value stores. The architecture, data layout, management strategy, new interface and log strategy of PMEKV are given. Finally, a prototype of PMEKV was implemented based on PMEM. We used YCSB to test and compare it with Redis, MongDB, and Memcache. Meanwhile, the Redis for PMEM named PMEM-Redis and PMEM-KV were also used to test and compared with PMEKV. The results show that PMEKV had the advantage of throughput and adaptability compared with the current key–value stores.


2013 ◽  
Vol 11 ◽  
pp. 177-182
Author(s):  
S. Miropolsky ◽  
S. Frei

Abstract. Many investigations have been published on the transferability of RF immunity test results between system and IC-levels. The RF signal level at DUT (Device under Test) inputs, i.e. either RF voltage amplitude or RF input current, is used as a reference value for the load on the DUT. Existing approaches analyze the DUT response as a function of the RF signal level at a single input pin, e.g. supply voltage. Sufficient accuracy of such an approach could be shown in several cases, but results are not sufficient as a general solution for complex DUT. This paper proposes both theoretical analysis and practical implementation of a DPI setup, where a disturbance, equivalent to system-level BCI setup, can be delivered to multiple DUT input ports.


Sign in / Sign up

Export Citation Format

Share Document