Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Improvement and development of high-frequency wireless token-ring protocol
Download
index.pdf
Date
2010
Author
Kurtuluş, Taner
Metadata
Show full item record
Item Usage Stats
171
views
84
downloads
Cite This
STANAG 5066 Edition 2 is a node-to-node protocol developed by NATO in order to communicate via HF media. IP integration is made to be able to spread the use of STANAG 5066 protocol. However, this integration made the communication much slower which is already slow. In order to get faster the speed and communicate within single-frequency multi-node network, HFTRP, which is a derivative of WTRP, is developed. This protocol is in two parts, first is a message design for management tokens exchanged by communicating nodes, and second is the algorithms used to create, maintain, and repair the ring of nodes in the network. Scope of this thesis is to find out a faster ring setup, growing procedure and to implement. Beside, finding optimum values of tuning parameters for HFTRP is also in the scope of this thesis.
Subject Keywords
Computer engineering.
,
Computer network protocols.
URI
http://etd.lib.metu.edu.tr/upload/12612757/index.pdf
https://hdl.handle.net/11511/20334
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
INtERCEDE: An algorithmic approach to networked control system design
Senol, Sinan; Leblebicioğlu, Mehmet Kemal; Schmidt, Şenan Ece (Elsevier BV, 2011-07-01)
Networked Control Systems (NCS) are distributed control systems where the sensor signals to the controllers and the control data to the actuators are enclosed in messages and sent over a communication network. On the one hand, the design of an NCS requires ensuring the stability of the control system and achieving system response that is as close as possible to that of an ideal system which demands network resources. On the other hand, these resources are limited and have to be allocated efficiently to acco...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
How many sensors for an acceptable breach detection probability?
Onur, Ertan; Delic, H (Elsevier BV, 2006-01-10)
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra's shortest path algorithm. We propose a method to determine the required number of sensors to be deployed and to gain insight about...
Implementation and evaluation of a synchronous time-slotted medium access protocol for networked industrial embedded systems
Gözcü, Ahmet Korhan; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
Dynamic Distributed Dependable Real-time Industrial communication Protocol family (D3RIP), has been proposed in the literature considering the periodic or event-based traffic characteristics of the industrial communication networks. D3RIP framework consists of two protocol families: Interface Layer (IL) protocol family, which is responsible for providing the accurate time-division multiple access (TDMA) on top of a shared-medium broadcast channel, and Coordination Layer (CL), which is defined to fulfill the...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
T. Kurtuluş, “Improvement and development of high-frequency wireless token-ring protocol,” M.S. - Master of Science, Middle East Technical University, 2010.