Explore chapters and articles related to this topic
Controlled System
Published in Christos N. Houmkozlis, George A. Rovithakis, End-to-End Adaptive Congestion Control in TCP/IP Networks, 2017
Christos N. Houmkozlis, George A. Rovithakis
The File Transfer Protocol (FTP) [185] allows transferring files between computers, using TCP/IP technology. FTP is based on the client-server architecture, and uses the reliable end to end service provided by the transport layer protocol TCP. Specifically, FTP allows the creation of a file copy from one system to another. Thus, a user, who works on a computer, can efficiently send or receive files to another computer. The system security is ensured by the implementation of control authorization for each user requesting access to the system. The authorization check is carried out using a username and password, which are assigned by the system administrator and are checked each time a user requests access to the system. Under FTP, a user has full access to the system, but permission only to copy files. When the connection to the remote system is restored, FTP allows users to copy one or more files on their own computer. The term transfer indicates that the file is transferred from one system to another, but the original file is not affected. FTP priority is the reliable data transfer.
Audio formats and data interchange
Published in Francis Rumsey, Desktop Audio Technology, 2003
The common protocol for communication on the Internet is called TCP/IP (Transmission Control Protocol/Internet Protocol). This provides a connection-oriented approach to data transfer, allowing for verification of packet integrity, packet order and retransmission in the case of packet loss. At a more detailed level, as part of the TCP/IP structure, there are high level protocols for transferring data in different ways. There is a file transfer protocol (FTP) used for downloading files from remote sites, a simple mail transfer protocol (SMTP) and a post office protocol (POP) for transferring email, and a hypertext transfer protocol (HTTP) used for interlinking sites on the world-wide web (WWW). The WWW is a collection of file servers connected to the Internet, each with its own unique IP address (the method by which devices connected to the Internet are identified), upon which may be stored text, graphics, sounds and other data.
Image space trajectory tracking of 6-DOF robot manipulator in assisting visual servoing
Published in Automatika, 2022
Megha G. Krishnan, Ashok Sankar
A remote PC installed with MATLAB 2018a is communicated with ABB robot controller IRC5 through a File Transfer Protocol (FTP). FTP server on the IRC5 responds to a request from an FTP client on a remote computer. MATLAB provides the basic platform for the programming and control algorithm implementation and acts as the client for FTP communication. MATLAB takes input from the camera and current pose from the IRC5 controller, then performs image processing and implements the proposed control algorithm to predict the new camera pose. The control output is transferred to the controller through Ethernet port as files and that is how the visual servoing task is achieved in real-time [28,29]. The experimental setup is shown in Figure 15.
Performance analysis of LT code-based HARQ error control in underwater acoustic sensor networks
Published in Journal of Marine Engineering & Technology, 2022
P. Kaythry, R. Kishore, V. Nancy Priyanka
Lately, much research has been carried out on the design and implementation of energy efficient, reliable data transfer protocol in UASN. Conventional error control schemes cannot achieve reliability in an underwater scenario (Akyildiz et al. 2005). A modified version of ARQ protocol is proposed in (Gao et al. 2009) that provides data transmission with lower end-to-end delay and high energy efficiency, but the sender must wait for acknowledgment or expiry of time out period before initiating the retransmission. Chitre and Motani (2007) studied reliability issues in data transfer from one node to another, under water. The efficiency of file transfer protocol studied using packet by packet by acknowledgment, combined acknowledgments for a cluster of packets and rateless code. Transferring the file by packet by packet acknowledgment protocol results in poor efficiency because of lesser utilisation of the channel. Channel is used efficiently using combined acknowledgments for a cluster of data packets method but at the cost of increased complexity. However, reliability is achieved with much higher efficiency using a Rateless code-based protocol for file transfer in under water.
Necessary and sufficient condition for non-concave network utility maximisation
Published in International Journal of Control, 2020
Jingyao Wang, Jinghua Guo, Qishao Wang, Zhisheng Duan, Guanrong Chen
Typical internet applications including file transfer protocol (FTP), used to generate most of the data traffic, called elastic traffic. Elastic traffic can be defined as the traffic that can adjust to changes in network conditions, such as delay, throughput, congestion, etc., and still meet the QoS requirements of its applications. Utility functions for elastic traffic are usually modelled as strictly concave functions. Algorithms that determine optimal ways of sharing link bandwidths among different traffic flows have been well developed for this type of traffic; for example, see Guo, Luo, and Li (2018, 2019), Liu, Zhao, Ren, and Chen (2018), Zhao, Liu, Wen, Ren, and Chen (2018, 2019), Beck, Nedic, Ozdaglar, and Teboulle (2014) and Lagoa, Che, and Movsichoff (2004). Nowdays, the traffic generated by real-time applications such as internet video streaming dominates internet flows, which is inelastic. Different from elastic traffic, inelastic traffic does not adapt to changes in delay, throughput, congestion, etc., across the internet. According to Cisco Inc. annual Visual Networking Index (VNI) forecast report, dated June 1st, 2016 (VN Index, 2017), intellectual-property (IP) video traffic will be 82% of all consumer internet traffic by 2020, up from 70% in 2015. Moreover, the report forecasts that the IP video traffic will grow threefold from 2015 to 2020. Consequently, developing resource allocation techniques that handle this type of traffic is imperative.