communication system design
Recently Published Documents


TOTAL DOCUMENTS

214
(FIVE YEARS 27)

H-INDEX

15
(FIVE YEARS 2)

2021 ◽  
Vol 6 (2) ◽  
pp. 71-80
Author(s):  
Hairatunnisa Hairatunnisa ◽  
Hapsoro Agung Nugroho ◽  
Relly Margiono

One of the determinants of the quality of magnetic data is continuous data, so we need a data transmission system that can continuously transmit observational data. In this research, a magnetometer communication system design was carried out with the concept of the Internet of Things (IoT) using the MQTT and HTTP protocol, where measurement data in the form of the x-axis, y-axis, z-axis, horizontal components, and total magnetic field components are displayed on the dashboard in real time and continuously. Testing the performance of sending data is done using the Wireshark, it is known that the MQTT protocol has a better delivery quality compared to the HTPP protocol with an average delay value of 0.0120 seconds, an average value of packet length of 54 bytes and a packet loss value of 0.11%, while the HTTP protocol has an average delay value of 0.0257 seconds, an average packet length value of 268.1 bytes and a packet loss value of 0.5%.


2021 ◽  
Vol 13 (6) ◽  
pp. 85-103
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.


2021 ◽  
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

The microservices architecture tries to deal with the challenges posed by distributed systems, such as scalability, availability, and system deployment; by means of highly cohesive, heterogeneous, and independent microservices. However, this architecture also brings new security challenges related to communication, system design, development, and operation. The literature contains spread information regarding security related solutions for microservicesbased systems, but this spread makes difficult for practitioners to adopt novel security related solutions. In this study, we aim to present a catalogue of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, also considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 71 security solutions for the communication of microservices.


Author(s):  
Sara M. Hassan ◽  
Gihan. G. Hamza

<span>The data encryption is one of the most critical issues in the communication system design. Nowadays, many encryption algorithms are being updated to keep pace with the remarkable progress in the communication field. The advanced encryption standard (AES) is a common algorithm that has proved its efficacy. The main drawback of AES is that it uses too simple algebraic structures, since every block is always encrypted in the same way that makes the hacking process possible if the hacker captures the key and the uses S-Box in the input stage. This especially applies to the unwired communication systems where chances of hacking exceed those found in the wired systems. The paper proposes a security enhancement method that is based on utilizing concatenated AES and international data encryption algorithm (IDEA) algorithms. Upon applying the proposed algorithm, the hacking process becomes a great challenge. The paper incorporates the real-time FPGA implementation of the proposed algorithm in the encryption and the decryption stages. Besides, the paper presents a clear analysis of the system’s performance.</span>


2021 ◽  
Vol 252 ◽  
pp. 01002
Author(s):  
Congcong Li ◽  
Qing Wang ◽  
Zhen Jing ◽  
Hongxia Zhu ◽  
Pingxin Wang ◽  
...  

In order to make the operation of the line more safe and reliable, the state monitoring is needed and the remote transmission of data is realized on this basis. This paper proposes a variety of communication modes suitable for transmission line condition monitoring data transmission. The corresponding communication system design is given for different application conditions. The development and application of data transmission technology for condition monitoring of transmission lines are discussed in combination with two different schemes of typical design and distributed intelligent fault diagnosis system.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4997
Author(s):  
Mingyang Gong ◽  
Haichun Zhang ◽  
Zhenglin Liu

The Short-range-controlled communication system (RCC) based on a subscriber identity module (SIM) card is a replacement for the standard near-field communication (NFC) system to support near-field payment applications. The RCC uses both the low-frequency (LF) and high-frequency (HF) wireless communication system. The RCC communication distance is controlled under 10 cm. However, current RCCs suffer from compatibility issues, and the LF communication distance is lower than 0.5 cm in some phones with completely metallic shells. In this paper, we propose an improved LF communication system design, including an LF transmitter circuit, LF receiver chip, and LF-HF communication protocol. The LF receiver chip has a rail-to-rail amplifier and a self-correcting clock recovery differential Manchester decoder, which do not have the limitations of accurate gain and high system clock. The LF receiver chip is fabricated in a 0.18 μm CMOS technology platform, with a die size of 1.05 mm × 0.9 mm and current consumption of 41 μA. The experiments show that the improved RCC has better compatibility, and the communication distance reaches to 4.2 cm in phones with completely metallic shells.


Sign in / Sign up

Export Citation Format

Share Document