The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were develope...The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were developed but, it still lacks formal and standardized solutions being able to help in their configuration. The configuration management that responds to this concern is very important in this type of network. It consists of the definition of data models to configure and is very necessary for the good network performance. Tangible results were obtained in traditional networks with the emergence of NETCONF and YANG standards, but on the best of our humble knowledge there are none yet in WSNs. We propose in this paper wsn-routing-protocol, a YANG data model for routing protocols configuration in WSNs. Following our model, we propose two YANG configuration data models based on the latter: they are respectively aodv for AODV and rpl for RPL.展开更多
We suggest event collection protocol in a specific region where sensors are deployed to detect and collect events.In the traditional multi-hop routing in wireless sensor networks reporting events to a sink node or bas...We suggest event collection protocol in a specific region where sensors are deployed to detect and collect events.In the traditional multi-hop routing in wireless sensor networks reporting events to a sink node or base-station will cause imbalanced energy consumption of static sensors.To solve this problem,we use mobile sink.In this paper,we study the design of efficiency routing protocol for supporting efficient data collecting in mobile sink wireless sensor networks(mWSNs).We suggest the following two main ideas.First,we use reactive protocol to cut off unnecessary delay.Mobile sink makes a path to access to sensor node.Second,we model mobile sink movement depending on data frequency,so we can reduce moving distance efficiently.We simulate this protocol and compare it with the traditional method.Simulation results show this protocol reduces distance significantly and is suitable for mWSNs with heavy traffic.展开更多
This research paper describes the design and implementation of the Consultative Committee for Space Data Systems (CCSDS) standards REF _Ref401069962 \r \h \* MERGEFORMAT [1] for Space Data Link Layer Protocol (SDLP). ...This research paper describes the design and implementation of the Consultative Committee for Space Data Systems (CCSDS) standards REF _Ref401069962 \r \h \* MERGEFORMAT [1] for Space Data Link Layer Protocol (SDLP). The primer focus is the telecommand (TC) part of the standard. The implementation of the standard was in the form of DLL functions using C++ programming language. The second objective of this paper was to use the DLL functions with OMNeT++ simulating environment to create a simulator in order to analyze the mean end-to-end Packet Delay, maximum achievable application layer throughput for a given fixed link capacity and normalized protocol overhead, defined as the total number of bytes transmitted on the link in a given period of time (e.g. per second) divided by the number of bytes of application data received at the application layer model data sink. In addition, the DLL was also integrated with Ground Support Equipment Operating System (GSEOS), a software system for space instruments and small spacecrafts especially suited for low budget missions. The SDLP is designed for rapid test system design and high flexibility for changing telemetry and command requirements. GSEOS can be seamlessly moved from EM/FM development (bench testing) to flight operations. It features the Python programming language as a configuration/scripting tool and can easily be extended to accommodate custom hardware interfaces. This paper also shows the results of the simulations and its analysis.展开更多
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco...As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.展开更多
为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理...为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑.展开更多
Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has de...Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.展开更多
Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in ter...Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems(CCSDS) developed CCSDS File Delivery Protocol(CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement(NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a ter-restrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay.展开更多
A 16 kV/20 A power supply was developed for the extraction grid of prototype radio frequency(RF) ion source of neutral beam injector. To acquire the state signals of extraction grid power supply(EGPS) and control ...A 16 kV/20 A power supply was developed for the extraction grid of prototype radio frequency(RF) ion source of neutral beam injector. To acquire the state signals of extraction grid power supply(EGPS) and control the operation of the EGPS, a data acquisition and control system has been developed. This system mainly consists of interlock protection circuit board, photoelectric conversion circuit, optical fibers, industrial compact peripheral component interconnect(CPCI) computer and host computer. The human machine interface of host computer delivers commands and data to program of the CPCI computer, as well as offers a convenient client for setting parameters and displaying EGPS status. The CPCI computer acquires the status of the power supply. The system can turn-off the EGPS quickly when the faults of EGPS occur. The system has been applied to the EGPS of prototype RF ion source. Test results show that the data acquisition and control system for the EGPS can meet the requirements of the operation of prototype RF ion source.展开更多
In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side a...In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side application. Towards this goal, we first develop an analytical model that formulates the incast probability as a function of connection variables and network environment settings. We combine the model with the optimization theory and derive some insights into minimizing the incast probability through tuning connection variables related to applications. Then,enlightened by the analytical results, we propose an adaptive application-layer solution to the TCP incast.The solution equally allocates advertised windows to concurrent connections, and dynamically adapts the number of concurrent connections to the varying conditions. Simulation results show that our solution consistently eludes incast and achieves high goodput in various scenarios including the ones with multiple bottleneck links and background TCP traffic.展开更多
Today’s network industry needs highly qualified engineers to understand, configure, develop and upgrade switches that can build scalable high performance and ultra-low latency networks. This paper describes a new net...Today’s network industry needs highly qualified engineers to understand, configure, develop and upgrade switches that can build scalable high performance and ultra-low latency networks. This paper describes a new networking laboratory that has been set up to provide hands-on experience on datacenter network switches, such as ARISTA, programming and monitoring the traffic. This paper explains the networking laboratory coursework that students carry out during the course of a semester. The laboratory consists of six hands on experiments on the latest datacenter switches from Arista Networks, two programming assignments that teaches some of the protocols used at data link layer and routing protocols used at the network layer of OSI reference model. The final two laboratory experiments use the Wireshark software tool for traffic monitoring and peeking into details of some of the protocols in TCP/IP such as ARP protocol, Ethernet and so forth. The coursework details include the switch basics, switch hardware, Extensible Operating System (EOS), configuration of Link Aggregation Control Protocol, Multi-chassis Link Aggregation Protocol, Access Control Lists, and Open Short Path First version 2 on Arista switches 7050T-64 and 7048T-4S. The programming tasks cover High-level Data Link Control (HDLC) and Routing Algorithms.展开更多
文摘The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were developed but, it still lacks formal and standardized solutions being able to help in their configuration. The configuration management that responds to this concern is very important in this type of network. It consists of the definition of data models to configure and is very necessary for the good network performance. Tangible results were obtained in traditional networks with the emergence of NETCONF and YANG standards, but on the best of our humble knowledge there are none yet in WSNs. We propose in this paper wsn-routing-protocol, a YANG data model for routing protocols configuration in WSNs. Following our model, we propose two YANG configuration data models based on the latter: they are respectively aodv for AODV and rpl for RPL.
基金MKE(the Ministry of Knowledge Economy),Korea,under the Convergence-ITRC(Convergence Infor mation Technology Research Center)support program(NIPA-2011-C6150-1101-0004)supervised by the NIPA(National IT Industry Pro-motion Agency)
文摘We suggest event collection protocol in a specific region where sensors are deployed to detect and collect events.In the traditional multi-hop routing in wireless sensor networks reporting events to a sink node or base-station will cause imbalanced energy consumption of static sensors.To solve this problem,we use mobile sink.In this paper,we study the design of efficiency routing protocol for supporting efficient data collecting in mobile sink wireless sensor networks(mWSNs).We suggest the following two main ideas.First,we use reactive protocol to cut off unnecessary delay.Mobile sink makes a path to access to sensor node.Second,we model mobile sink movement depending on data frequency,so we can reduce moving distance efficiently.We simulate this protocol and compare it with the traditional method.Simulation results show this protocol reduces distance significantly and is suitable for mWSNs with heavy traffic.
文摘This research paper describes the design and implementation of the Consultative Committee for Space Data Systems (CCSDS) standards REF _Ref401069962 \r \h \* MERGEFORMAT [1] for Space Data Link Layer Protocol (SDLP). The primer focus is the telecommand (TC) part of the standard. The implementation of the standard was in the form of DLL functions using C++ programming language. The second objective of this paper was to use the DLL functions with OMNeT++ simulating environment to create a simulator in order to analyze the mean end-to-end Packet Delay, maximum achievable application layer throughput for a given fixed link capacity and normalized protocol overhead, defined as the total number of bytes transmitted on the link in a given period of time (e.g. per second) divided by the number of bytes of application data received at the application layer model data sink. In addition, the DLL was also integrated with Ground Support Equipment Operating System (GSEOS), a software system for space instruments and small spacecrafts especially suited for low budget missions. The SDLP is designed for rapid test system design and high flexibility for changing telemetry and command requirements. GSEOS can be seamlessly moved from EM/FM development (bench testing) to flight operations. It features the Python programming language as a configuration/scripting tool and can easily be extended to accommodate custom hardware interfaces. This paper also shows the results of the simulations and its analysis.
基金partially supported by the National Natural Science Foundation of China(61571004)the Shanghai Natural Science Foundation(No.17ZR1429100)+1 种基金the National Science and Technology Major Project of China(No.2018ZX03001017-004)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(No.YJKYYQ20170074).
文摘As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN.
文摘为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑.
基金Supported by the National High Technology Research and Development Program of China(No.2006AA12Z210)
文摘Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.
文摘Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems(CCSDS) developed CCSDS File Delivery Protocol(CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement(NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a ter-restrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay.
基金supported by National Natural Science Foundation of China(Contract Nos.11505225&11675216)Foundation of ASIPP(Contract No.DSJJ-15-GC03)the Key Program of Research and Development of Hefei Science Center,CAS(2016HSC-KPRD002)
文摘A 16 kV/20 A power supply was developed for the extraction grid of prototype radio frequency(RF) ion source of neutral beam injector. To acquire the state signals of extraction grid power supply(EGPS) and control the operation of the EGPS, a data acquisition and control system has been developed. This system mainly consists of interlock protection circuit board, photoelectric conversion circuit, optical fibers, industrial compact peripheral component interconnect(CPCI) computer and host computer. The human machine interface of host computer delivers commands and data to program of the CPCI computer, as well as offers a convenient client for setting parameters and displaying EGPS status. The CPCI computer acquires the status of the power supply. The system can turn-off the EGPS quickly when the faults of EGPS occur. The system has been applied to the EGPS of prototype RF ion source. Test results show that the data acquisition and control system for the EGPS can meet the requirements of the operation of prototype RF ion source.
基金supported by the Fundamental Research Fundsfor the Central Universities under Grant No.ZYGX2015J009the Sichuan Province Scientific and Technological Support Project under Grants No.2014GZ0017 and No.2016GZ0093
文摘In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side application. Towards this goal, we first develop an analytical model that formulates the incast probability as a function of connection variables and network environment settings. We combine the model with the optimization theory and derive some insights into minimizing the incast probability through tuning connection variables related to applications. Then,enlightened by the analytical results, we propose an adaptive application-layer solution to the TCP incast.The solution equally allocates advertised windows to concurrent connections, and dynamically adapts the number of concurrent connections to the varying conditions. Simulation results show that our solution consistently eludes incast and achieves high goodput in various scenarios including the ones with multiple bottleneck links and background TCP traffic.
文摘Today’s network industry needs highly qualified engineers to understand, configure, develop and upgrade switches that can build scalable high performance and ultra-low latency networks. This paper describes a new networking laboratory that has been set up to provide hands-on experience on datacenter network switches, such as ARISTA, programming and monitoring the traffic. This paper explains the networking laboratory coursework that students carry out during the course of a semester. The laboratory consists of six hands on experiments on the latest datacenter switches from Arista Networks, two programming assignments that teaches some of the protocols used at data link layer and routing protocols used at the network layer of OSI reference model. The final two laboratory experiments use the Wireshark software tool for traffic monitoring and peeking into details of some of the protocols in TCP/IP such as ARP protocol, Ethernet and so forth. The coursework details include the switch basics, switch hardware, Extensible Operating System (EOS), configuration of Link Aggregation Control Protocol, Multi-chassis Link Aggregation Protocol, Access Control Lists, and Open Short Path First version 2 on Arista switches 7050T-64 and 7048T-4S. The programming tasks cover High-level Data Link Control (HDLC) and Routing Algorithms.