synchronous data transmission channel

2021 ◽  
pp. 63-68
Author(s):  
Daniil S. Shiryaev ◽  
Olga A. Kozyreva ◽  
Ivan S. Polukhin ◽  
Sergey A. Shcheglov ◽  
Svetlana A. Degtiareva ◽  
...  

The system of intellectual lighting data transmission via visible light is developed and manufactured. Spectral characteristics of a downlink which uses the red crystal of a RGBW light emitting diode for data transfer were studied. The DALI protocol-based radiation chromaticity control system which allows us to set different lighting scenarios with constant data transmission rate was developed. The radiation chromaticity range covers almost the entire colour gamut in the colour space. The system of high-frequency matching of system component impedances was developed and frequency characteristics of the suggested scheme were studied for development of the system. Optimal parameters of the signal for visual light communication such as carrier frequency, modulation type and band were determined. Observation of the constellation diagram which represents different values of the complex amplitude of the keyed signal in the form of a complex number on a quadrature plane (cosine and sine components of the carrying signal) and of fixation of the amplitude of the error vector magnitude (EVM) was selected as a method of study of the transmission channel quality. The value of EVM in the visible light transmission channel was significantly lower for signals with amplitude modulation than for phase-manipulated signals. When implementing different lighting change scenarios, radiation of other crystals of the light emitting diode crystals not used for transmission did not lead to increase of EVM by more than one percent.


Author(s):  
Maksim Peregudov ◽  
Anatoliy Steshkovoy

Currently, centrally reserved access to the medium in the digital radio communication networks of the IEEE 802.11 family standards is an alternative to random multiple access to the environment such as CSMA/CA and is mainly used in the transmission voice and video messages in real time. Centrally reserved access to the environment determines the scope of interest in it from attackers. However, the assessment of effectiveness of centrally reserved access to the environment under the conditions of potentially possible destructive impacts was not carried out and therefore it is impossible to assess the contribution of such impacts to the decrease in the effectiveness of such access. Also, the stage establishing of centrally reserved access to the environment was not previously taken into account. Analytical model development of centrally reserved access to the environment under the conditions of destructive influences in digital radio communication networks of the IEEE 802.11 family standards. A mathematical model of centrally reserved access to the environment has been developed, taking into account not only the stage of its functioning, but also the stage of formation under the conditions of destructive influences by the attacker. Moreover, in the model the stage of establishing centrally reserved access to the medium displays a sequential relationship of such access, synchronization elements in digital radio communication networks and random multiple access to the medium of the CSMA/CA type. It was established that collisions in the data transmission channel caused by destructive influences can eliminate centrally reserved access to the medium even at the stage of its establishment. The model is applicable in the design of digital radio communication networks of the IEEE 802.11 family of standards, the optimization of such networks of the operation, and the detection of potential destructive effects by an attacker.


Author(s):  
Valentin Dzhumkov ◽  
Georgy Maltsev

Introduction: Data transmission reliability analysis when using noise-immune coding in channels with grouping of errors (in particular, in radio channels with interference and fading of the received signals) is complicated by the need to use discrete data transmission channel models which take into account the error grouping, differing from the traditional binomial model. The complexity of the analytical description of such models leads to the fact that the quality indicators of data transmission over channels with error grouping are usually analyzed by simulation methods, and the development of analytical models of data transmission discrete channels with grouping of errors is one of the modern direction in the noise-immune coding theory development. Purpose: Finding the additive boundary of a bit error probability for data transmission discrete channel with grouping of symbol errors, described by Elliot — Hilbert model. Results: For the case of data transmission using a group noise-immune code, analytical expressions are obtained for calculating the additive boundary of a bit error probability in a discrete data transmission channel with grouping of symbol errors. The obtained expressions take into account the features of data transmission over a channel with error grouping, in particular, the fact that the probabilities of various combinations of the same number of errors are not equal to each other. Examples are presented of calculating a bit error probability for the case of using noise-immune codes which correct errors. It is shown that for any code length, the use of the Elliot — Hilbert model allows you to substantially refine the results of calculating the probabilistic indicators of the reliability of data transmission in channels with error grouping, as compared to the original binomial model. The obtained results are compared to the results of the simulation. Practical relevance: The results can be used in the design and analysis of the characteristics of data transmission systems for various purposes, operating under conditions of error grouping. Using analytical expressions to calculate the probability indicators of the reliability of data transfer allows you to abandon complex simulation modeling of transmitting data in channels with error grouping at the stage of choosing a noise-immune code and its parameters.


Author(s):  
Александр Вильямович Бабурин ◽  
Лариса Александровна Глущенко ◽  
Борис Николаевич Добряков ◽  
Григорий Александрович Остапенко ◽  
Андрей Петрович Преображенский

Цель исследования состоит в разработке методов защиты от несанкционированного доступа информации, циркулирующей в беспроводных ИК-каналах передачи данных. Показаны возможные способы несанкционированного доступа к каналу передачи данных от ИК-клавиатуры к компьютеру. Основной способ несанкционированного доступа к ИК-каналу передачи данных - это регистрация диффузно-отраженного от элементов интерьера излучения. Проведены теоретические оценки, подтверждающие возможность получения информации, циркулирующей в беспроводных ИК-каналах передачи данных при несанкционированном доступе. Рассмотрен типичный случай распространения излучения в помещении при использовании ИК-канала передачи данных при несанкционированном доступе. Неуполномоченный наблюдатель может регистрировать через оконный проем диффузно-отраженное излучение, используя специальную оптико-электронную систему. Для расчетов были приняты типовые фотометрические характеристики интерьера помещения и предельно достижимые на современном уровне техники характеристики фотоприемных устройств. Размер диаметра входного зрачка оптической системы принят не слишком большим из того соображения, что он не должен привлекать внимание (служить демаскирующим признаком). Предложен метод защиты информации, циркулирующей в беспроводных ИК-каналах передачи данных, основанный на формировании засветочных помех. Приведены схемы формирования засветочных помех. Для помехи может быть использовано диффузно-отраженной излучение или специально сформированное излучение, направленное на оконный проем помещения. The purpose of the research is to develop methods of protection against unauthorized access to information circulating in wireless infrared channels of data transmission. Possible ways of unauthorized access to the data transmission channel from the IR keyboard to the computer are shown. The main method of unauthorized access to the IR data transmission channel is the registration of radiation diffusely reflected from interior elements. Theoretical estimates have been carried out confirming the possibility of obtaining information circulating in wireless infrared channels of data transmission under unauthorized access. A typical case of propagation of radiation in room when using an IR data transmission channel with unauthorized access to information is considerd. An unauthorized observer can register diffusely reflected radiation through a window opening using a special optoelectronic system. For the calculations, the standard photometric characteristics of the interior of the room and the maximum achievable at the modern level of technology characteristics of photodetectors were taken. The size of the diameter of the entrance pupil of the optical system is taken not too large for the reason that optoelectronic system should not attract attention (serve as a unmasking feature). The method for protecting of information ciculating in optical wireless channels of data transmission, based on the formation of optical intentional noise, is proposed. It provides a brief overview of methods for generating pseudorandom sequences, wich can serv as a basis for the formation of an illumination noise channel. For optical intentional noise can be used diffusely reflected radiation or specially formed radiation, directed at the window opening of the room.


2020 ◽  
Vol 153 (1) ◽  
pp. 21-36
Author(s):  
Szymon Elert ◽  
Tomasz Kuczerski

The paper presents an initial concept of a flying object trajectory recording system employing a data recording algorithm (operating on the base of the raw recorded data) and radio transmittion modules. Operation of developed system is based on microcontroller Atmega, a magnetometer module, a gyroscope and acceleration meter, and a RF miniature transmitter and SDR receiver. The initial performance of application analysing and recording the data is provided. Moreover, subunits available on the market have been reviewed to select the modules dedicated to the system. A possibility for record-ing the transmitted navigation data was studied. Application of SDR receiver in combination with a computer application monitoring the data transmission channel up to 1 kilometre is described with the configuration of the system, and the schematic of measurement transmitting and receiving modules, and the surveillance of transmitted data quality. The basic algorithm of application using the received data for reconstruction of object’s flying path and prediction of a fall point is presented. Moreover an analysis is included for possible applications of the above mentioned system.


2021 ◽  
Vol 2094 (3) ◽  
pp. 032061
Author(s):  
A A Sidorenko

Abstract The problem of adapting the degree of redundancy introduced in the process of error-correcting coding to the changing characteristics of the data transmission channel is urgent. Turbo codes, used in a variety of digital communication systems, are capable of correcting multiple errors occurring in the data transmission channel. The article compares the decoding efficiency for various options for introducing perforation into the code sequence generated by the turbo code encoder. Based on the comparison results, recommendations were made on the most appropriate option for the introduction of perforation.


2019 ◽  
pp. 152-158
Author(s):  
Emil Z. Gareev ◽  
Yuri B. Sorokin ◽  
Igor M. Antropov ◽  
Anton E. Kurako ◽  
Antonina A. Puchkovskaya ◽  
...  

We developed a navigation system based on wireless visible light data transmission channel and an algorithm for the decoding on smartphones. The work aims to create an interactive navigation system inside the Hermitage Museum for museum staff. The system was designed for using a modern smart-phone device as a receiver, a conventional LED illuminator as transmitter and a RGB diode as a navigation point in each room of the museum. We developed a modulator for data transmission, an algorithm for receiving and processing information using a stock camera of an iOS-based smart-phone, organized a point-to-point network between the LED illuminators and the server with a full back-end and front-end communication. The system allows transmitting data with rates up to 2 kbps on distance up to 1 meter.


Sign in / Sign up

Export Citation Format

Share Document