A novel data communication network architecture for integrated modular avionics

Author(s):  
Haotian Wang ◽  
Huagang Xiong
Author(s):  
Ziquan Liu ◽  
Xueqiong Zhu ◽  
Jingtan Ma ◽  
Hui Fu ◽  
Ke Zhao ◽  
...  

Telephone network based on IMS technology has been widely applied in power production and dispatching communication, especially in distributed power stations. Analysis and positioning failure of IMS network is arduous, because it’s dependent on IP data communication network. In this paper, we first introduced IMS switching network architecture and distributed generation communication network architecture, analyzed and summarized all kinds of network malfunction. Combining typical IMS network fault connection relations, we introduced an improved Petri net fault handling model and reasoning method. The diagnosis and positioning results could reflect the defects of equipment logic functions. This method on fault diagnosis and location of substation network has been proved to be effective through practical application.


2012 ◽  
Vol 253-255 ◽  
pp. 1427-1430
Author(s):  
Lin Na He

This paper introduces communication based train contrl (CBTC) technology, focusing on the concept of the CBTC , the CBTC system structure, and the CBTC system basic principle. This paper presents the CBTC system is composed of two parts by the train control system and wireless information transmission, the CBTC system using wireless communication technology to achieve real-time bi-directional communication in the train and the trackside equipment, through an open data communication network. Finally, data communication subsystem network architecture in the CBTC system has been studied.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4895
Author(s):  
Maurício R. Silva ◽  
Elitelma S. Souza ◽  
Pablo J. Alsina ◽  
Deyvid L. Leite ◽  
Mateus R. Morais ◽  
...  

This paper presents a communication network for a squadron of unmanned aerial vehicles (UAVs) to be used in the scanning rocket impact area for Barreira do Inferno Launch Center—CLBI (Rio Grande do Norte, Brazil), aiming at detecting intruder boats. The main features of communication networks associated with multi-UAV systems are presented. This system sends information through Wireless Sensor Networks (WSN). After comparing and analyzing area scanning strategies, it presents the specification of a data communication network architecture for a squadron of UAVs within a sensor network using XBee Pro 900HP S3B modules. A brief description is made about the initial information from the construction of the system. The embedded hardware and the design procedure of a dedicated communication antenna to the XBee modules are presented. In order to evaluate the performance of the proposed architecture in terms of robustness and reliability, a set of experimental tests in different communication scenarios is carried out. Network management software is employed to measure the throughput, packet loss and other performance indicators in the communication links between the different network nodes. Experimental results allow verifying the quality and performance of the network nodes, as well as the reliability of the communication links, assessing signal received quality, range and latency.


2000 ◽  
Vol 04 (04) ◽  
pp. 391-416 ◽  
Author(s):  
SALLY WYATT

This article examines two attempts to develop information networks by central government administrations in the UK and the US during the 1980s. These are examples of service innovations within public services, and can be viewed in the light of analyses of services innovation. They also mark a shift in public procurement, from acquiring a technology to purchasing services. The British attempted to develop a data communication network; the Americans attempted to develop an integrated voice, data and image communication network. Both networks were to be shared by different government departments and both were to be provided by a third-party supplier. The rhetoric and policy concerns behind these networks are similar to those expressed more recently in Britain by the new Labour Government. It is argued that these earlier attempts were unsuccessful because insufficient attention was paid to users, and because the systems were attempting to do too much. Not only were they expected to reduce costs and improve services, they were also intended to implement important elements of telecommunications and competition policies. Paradoxically, over-simplification of the systems, to make them comprehensible to a wide range of actors, may have contributed to their failure.


Sign in / Sign up

Export Citation Format

Share Document