Explore chapters and articles related to this topic
Next Generation Wireless Technologies
Published in K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz, Wireless Multimedia Communication Systems, 2017
K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
Several FCS approaches such as explicit control protocol (XCP) [105] and adaptive congestion protocol (ACP) [106] have been proposed. In these protocols, a source node and network nodes exchange useful information for congestion control, and the source regulates its own window size according to the feedback from network nodes. As the window size of each flow is controlled based on the FCS theory, aggregate traffic can be stabilized and the throughput of each flow becomes steady after a reasonable time lapse. In general, FCS approaches tend to achieve better performance than AIMD approaches because they can operate according to the actual traffic conditions observed at a bottleneck node. However, in FCS approaches, there is a significant drawback involving the network nodes, which are required to handle the packet headers of the upper layers. It is not easy to read and write the corresponding TCP headers in network nodes when an IP payload is encrypted or encapsulated. Although the IP option field may be applied, such usage is generally avoided as it would substantially slow down switching.
Communications
Published in D.A. Bradley, N.C. Burd, D. Dawson, A.J. Loader, Mechatronics, 2018
D.A. Bradley, N.C. Burd, D. Dawson, A.J. Loader
Each system or interface is uniquely identified by an address, and the frames contain both the destination address – the address of the receiving system – and the source address – the address of the system transmitting the information. Fields within the frame such as the access, type and control fields contain information concerning the control and status of the MAC protocol. A frame check sequence allows the majority of errors that occur during the transmission of the data to be detected. In the token bus and token ring frames, additional fields delimit the start and end of the frame. The application data field contains the application data which is transmitted between the two systems.
Aircraft Data Networks and AFDX
Published in Mike Tooley, Aircraft Digital Electronic and Computer Systems, 2023
The last field of the ethernet frame is the 4-byte frame check sequence (FCS). The transmitting end system appends a cyclic redundancy checksum (CRC), which appears as a trailing FCS. The CRC is calculated over the entire frame and the receiving end system then uses an identical algorithm to recalculate the checksum and compare it with the received FCS. If any difference is detected the receiving end system flags an error and the entire received frame is discarded.
Mapping Obfuscation-Based PHY Security Scheme for Resource-Constrained Wireless Sensor Network
Published in IETE Technical Review, 2021
Vinita Daiya, Jemimah Ebenezer, R. Jehadeesan
The theoretical analysis for the proposed PLS technique, MO was done based on the keyspace set for MO. Based on the size of MO limited keyspace set, it was found that the short length WSN packets can be intercepted by the attacker in a few seconds. However, the simulation-based analysis reveals the peculiarity of MO. From Figure 3, it was observed that wrong mapping results increase in symbol rate rather than chip error rate. Thus, an eavesdropper gets disguise by FCS check associated with IEEE 802.15.4 frame. FCS is embedded with every frame to ensure the integrity of the packet. In the case of MO, it is the saviour against eavesdropping. For the attacker, the false FCS detection probability is approximately 30 times more than correct FCS detection probability. Thus, MO inhibits eavesdropping by disguising the eavesdropper.