Highly reliable LDPC coded data transfer in home networks by using Canete’s PLC channel model

Author(s):  
Ibrahim Develi ◽  
Yasin Kabalci
2021 ◽  
Vol 8 (11) ◽  
pp. 96-103
Author(s):  
Ali H. Alenezi ◽  

The acoustic telemetry used the drill string as a communication channel, which allows data transfer without interrupting drilling operations. This technology suffers from stop-bands that reduce the feasible bands for transmission up to 60 percent. The stop bands come due to the structure of the drill string constructed from pipes and tool joints. In this paper, we optimized the design of the drill string main components, which are pipes and tool-joints lengths, with an aim to increase the pass-bands total bandwidth. Using the verified drill string channel model, we proved that, with optimal lengths of pipes and tool joints, we can make the whole drill string channel bandwidth available for transmission. We also investigated the effect of small deviation from the optimal lengths on the channel transmission bands. The results showed that an increase of more than 138 percent in the available transmission bandwidths compared with standard drill string dimensions.


2017 ◽  
Vol 21 (1) ◽  
pp. 8-15
Author(s):  
A. M. Belitsky ◽  
R. R. Ivanenko ◽  
A. V. Besedin ◽  
A. Y. Klochkov

Nowadays, one of the trends of information and communication networks development is the provision within the shortest time of a larger number of telecommunication services to network users. Currently, connection of subscribers to xDSL communication channels provided by public switched telephone networks (PSTN) is widespread. Providers of classic telephony make active use of these networks due to the low cost of the connection of a subscriber. An obvious disadvantage of this connection type is the limited data transfer rate. Some Internet providers rapidly develop ETTH (Ethernet To The Home) networks. The advantage of ETTH networks is the targeting of the delivery of communication services to subscribers. One of the disadvantages is the operation of a network at the Ethernet level with all typical for this protocol features. The practice of optical networking has existed for many years; however, the basic approach to optical networking is based on the use of active equipment from the access node to users. PON-based (Passive Optical Network) FTTH architecture (Fiber To The Home) is as a rule, compatible with the Ethernet Protocol. The article shows the advantages of the deployment of PON-based FTTH networks, in particular, saving of fiber-optic lines in the area from the optical splitters to the Central telephone exchange or access point by using relevant ports. The article provides the description of access networks architecture applying Ethernet FTTH and PON technologies, and also discusses the prospects for further development of the above mentioned networks.


2018 ◽  
Vol 7 (4.44) ◽  
pp. 105 ◽  
Author(s):  
Edy Budiman ◽  
Haviluddin . ◽  
Masna Wati ◽  
Medi Taruk ◽  
Hario Jati Setyadi ◽  
...  

The utilization of optical fiber cable as a data transmission medium has provided various benefits and advantages in terms of data transfer and economically because it can reduce the use of many copper cables. The purpose of this study was to evaluate the feasibility of Fiber To The Home (FFTH) networks by measuring and analyzing power losses caused by attenuation along the fiber optic cable. Measuring tools for attenuation use JDSU MTS-8000 while the power measurement uses Optical Power Meter. Feasibility specifications refer to ITU-T G.984. recommendations. The analysis results show that of the 110 customers observed, the average value of Link Power Budget is 20.58 dB, with an average power margin of 5.57dBm. If comparing the results of the ITU-T G.984 recommendation, it stated that was accepted, still in accordance with the rules specifications. Feasibility studies of FTTH networks on the issue of power loss and attenuation are needed in an effort to maintain the quality of service to customers. It also has a relationship with planning and developing system installations in the future. 


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Tamás Jursonovics ◽  
Sándor Imre

The optimal allocation of the retransmission bandwidth is essential for IPTV service providers to ensure maximal service quality. This paper highlights the relevance of the wireless transport in today’s IPTV solution and discusses how this new media affects the existing broadcast technologies. A new Markovian channel model is developed to address the optimization issues of the retransmission throughput, and a new method is presented which is evaluated by empirical measurements followed by mathematical analysis.


2018 ◽  
Vol 2018 ◽  
pp. 1-25 ◽  
Author(s):  
Uğur Coruh ◽  
Oğuz Bayat

In this paper, we analyzed Sun et al.’s scheme which proposes an M2M (Machine-to-Machine) secure communication scheme by using existing TD SCMA (Time Division-Synchronous Code Division Multiple Access) networks. They offer a password-based authentication and key establishment protocol for mutual authentication. Moreover, their proposed secure channel establishment protocol uses symmetric cryptography and one-way hash algorithms and they considered using their protected channel model for mobile users and smart home networks. In this paper, we propose to complete the missing part of Sun et al.’s scheme. This can occur by addressing privacy-preserving and message modification protection. Moreover, improvements can be made to MITM (Man-In-The-Middle) attack resistance, anomaly detection and DoS (Denial-of-Service) attacks with timing. ECDH (Elliptic Curve Diffie Hellman) cryptography based protected cipher-key exchange operation used on initial setup and key-injection operations to provide secure user registration, user password change and home gateway network join phases. We simulated both the proposed and Sun et al.’s schemes. We analyzed Sun et al.’s scheme for performance, network congestion and resource usage. Missing privacy-preserving was analyzed and compared with the GLARM scheme, and the storage cost of each phase was analyzed according to Ferrag et al.’s survey proposal. In Sun et al.’s scheme, future work for the security architecture of the home network is related to Li et al.’s protocol being implemented in our proposed design.


Author(s):  
M.F. Schmid ◽  
R. Dargahi ◽  
M. W. Tam

Electron crystallography is an emerging field for structure determination as evidenced by a number of membrane proteins that have been solved to near-atomic resolution. Advances in specimen preparation and in data acquisition with a 400kV microscope by computer controlled spot scanning mean that our ability to record electron image data will outstrip our capacity to analyze it. The computed fourier transform of these images must be processed in order to provide a direct measurement of amplitudes and phases needed for 3-D reconstruction.In anticipation of this processing bottleneck, we have written a program that incorporates a menu-and mouse-driven procedure for auto-indexing and refining the reciprocal lattice parameters in the computed transform from an image of a crystal. It is linked to subsequent steps of image processing by a system of data bases and spawned child processes; data transfer between different program modules no longer requires manual data entry. The progress of the reciprocal lattice refinement is monitored visually and quantitatively. If desired, the processing is carried through the lattice distortion correction (unbending) steps automatically.


1982 ◽  
Vol 21 (04) ◽  
pp. 181-186 ◽  
Author(s):  
M. A. A. Moussa

A drug information system (DARIS) has been created for handling reports on suspected drug reactions. The system is suitable for being run on desktop computers with a minimum of hardware requirements: 187 K read/write memory, flexible or hard disc drive and a thermal printer. The data base (DRUG) uses the QUERY and IMAGE programming capabilities for data entry and search. The data base to statistics link program (DBSTAT) enables data transfer from the data base into a file for statistical analysis and signalling suspected adverse drug reactions.The operational, medical and statistical aspects of the general population voluntary adverse drug reaction monitoring programme—recently initiated in the State of Kuwait—are described.


Author(s):  
B. G. Shadrin ◽  
◽  
D. E. Zachateyskiy ◽  
V. A. Dvoryanchikov Dvoryanchikov ◽  
◽  
...  

2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


Sign in / Sign up

Export Citation Format

Share Document