scholarly journals Data Transmission Model with Lost Fragments Recovery Based on Application Layer ARQ

2021 ◽  
Vol 24 (3) ◽  
pp. 104-111
Author(s):  
A.V. Abilov ◽  
A.V. Chunaev ◽  
A.I. Nistyuk ◽  
I.A. Kaisina

Wireless networks in difficult conditions of signal receiving are characterized by a high level of burst data losses, at which a large number of data fragments can be lost in a row. In this case, to recover the lost data, the use of forward error correction methods (FEC) in most cases does not give a sufficient effect. The use of standard data loss recovery methods based on automatic retransmission request (ARQ) at the data link and transport layers of the OSI model can lead to significant delays, which is often unacceptable for real-time streaming services. In such a case, it may be preferable to skip the piece of data rather than delay waiting for the piece to be delivered on retransmissions. The use of ARQ-based techniques on application layer of OSI model for data streaming allows for a more efficient recovery of lost data chunks in wireless networks with a high level of burst losses. The known models of a discrete channel for wireless networks allow for analytically assessing the probability of data loss, however, they do not take into account cases with retransmission of lost data. The study proposes a mathematical model of data transmission in a wireless communication channel based on the Gilbert model, which takes into account the loss recovery by the ARQ method and allows you to calculate the data loss ratio. To check the adequacy of the proposed model, a software was developed that ensures the transmission of data streaming in a wireless communication network with recovery of fragment losses at the application level, and a corresponding experimental study was carried out. It is shown that the mathematical model takes into account the burstiness of transmitted data losses and their recovery by the ARQ method.

2017 ◽  
Vol 17 (1) ◽  
pp. 126-134
Author(s):  
Zhigang Ma ◽  
Wenyi Liu

Abstract Several methods, such as polling, multithread, timing, and so on, can be used in data receiving course. Low-efficiency and high level of system resource consumption may bring about data loss in polling and multithread methods when the data transmission rate is very high. Software timing methods are discussed and analyzed in Visual C++. Timing method would improve the system resource availability and decrease the risk of data loss. According to the demand ofatesting system,areal-time monitoring system based on memory sharing and multimedia timer is presented. After testing, the average timing error of the multimedia timer in the given instance is not bigger than 0.05%, so the continuity and integrity of data receiving can be assured under the conditions of high-speed data transmission.


Author(s):  
Rajbir Singh

Optical networks are bandwidth efficient networks are used for long haul communication providing seamless data transfer. For high speed data transmission in open space between different satellites, Inter-satellite Optical wireless communication (IsOWC) is widely used .In this paper we have evaluated the performance of IsOWC communication link for high speed data transmission .The performance of the system is evaluated on the basis of qualitative parameters such as Q-factor and BER using optisystem simulator.


2010 ◽  
Vol 455 ◽  
pp. 206-210
Author(s):  
Jun Li Liu ◽  
Yan Yan Yan ◽  
G.Q. He

It discusses the reasons of the data transmission time delay and packets loss based on the theory of net data transmission. Aimed to the question of the time delay of data transmission and packets loss, the control system models are set up to analyze their influence to the performance of the control system. Based on the synchronous control model analysis with wireless data transmission, a method to control the system is reached with the state prediction when the communication error or data loss appears. It can control constantly when communication errors appear, and also it can get the most error period by numerical analysis.


2020 ◽  
pp. 57-68
Author(s):  
V. A. Sidorov ◽  
E. V. Osowska

The article is devoted to the history of foundry production-casting of bells. This art was passed down from generation to generation, there were successful variants, but there were also defective bells. The authors analyzed in detail the different production of slotted bells. Bells are unique single products. They confirm the high level of skill of the master. The loss of sound properties of slotted bells depends on the ratio of the main dimensions, the size of the slits and their locations. The use of complementary methods for measuring mechanical and visualizing sound vibrations allows us to obtain initial data for the development of a mathematical model of sound vibrations of a bell. A continuation of the material about the art of manufacturing and the secrets of production will be published in the next issue of the magazine.


Author(s):  
Е.Е. Девяткин ◽  
Д.Н. Федоров ◽  
Я.М. Гасс ◽  
М.В. Иванкович

Рассмотрены и классифицированы существующие узкополосные беспроводные сети связи (УБСС), реализованные с использованием конвергентных решений. Показано, что появление нового объекта регулирования УБСС интернета вещей усиливает необходимость перехода от локальных корректировок законодательства в сфере связи к созданию инфо- коммуникационного кодекса Российской Федерации. Existing narrowband wireless communication networks using convergent solutions are reviewed and classified. It is shown that the emergence of narrowband wireless networks of Internet of things increases the need for transition from local adjustments of legislation in the field of communications to the creation of the Infocommunication Code of the Russian Federation.


2012 ◽  
Vol 19 (2) ◽  
pp. 5-17
Author(s):  
Bartosz Czaplewski ◽  
Krzysztof Czaplewski

Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.


Sign in / Sign up

Export Citation Format

Share Document