scholarly journals A Survey of Wireless Communication Technologies & Their Performance for High Speed Railways

2016 ◽  
Vol 06 (01) ◽  
pp. 15-29 ◽  
Author(s):  
Subharthi Banerjee ◽  
Michael Hempel ◽  
Hamid Sharif
Author(s):  
Diego Ragazzi

There is no doubt that wireless communication technologies have been one of the most interesting innovation fields in the telecommunications industry in recent years. The spectacular rate of innovation in this field has enforced the vision of ubiquitous connectivity: the vision of a world where every human being and every electronic device, from high-end supercomputers to tiny sensors of temperature in your car, can talk to each other through a dense web of communication links. A vision of this kind, although more “human-centric,” is proposed, for example, in the “Book of Visions” (2001) published by the Wireless World Research Forum. Of course, wireless communication technologies are instrumental in accomplishing this vision, as we cannot possibly imagine to connect everything by means of cables. Moreover, wireless communications offer the advantage of supporting mobility even at high speed.


Author(s):  
Diego Ragazzi

There is no doubt that wireless communication technologies have been one of the most interesting innovation fields in the telecommunications industry in recent years. The spectacular rate of innovation in this field has enforced the vision of ubiquitous connectivity: the vision of a world where every human being and every electronic device, from high-end supercomputers to tiny sensors of temperature in your car, can talk to each other through a dense web of communication links. A vision of this kind, although more “human-centric,” is proposed, for example, in the “Book of Visions” (2001) published by the Wireless World Research Forum. Of course, wireless communication technologies are instrumental in accomplishing this vision, as we cannot possibly imagine to connect everything by means of cables. Moreover, wireless communications offer the advantage of supporting mobility even at high speed.


Author(s):  
Rajbir Singh

Optical networks are bandwidth efficient networks are used for long haul communication providing seamless data transfer. For high speed data transmission in open space between different satellites, Inter-satellite Optical wireless communication (IsOWC) is widely used .In this paper we have evaluated the performance of IsOWC communication link for high speed data transmission .The performance of the system is evaluated on the basis of qualitative parameters such as Q-factor and BER using optisystem simulator.


Author(s):  
Michail Yu. Maslov ◽  
Yuri M. Spodobaev

Telecommunications industry evolution shows the highest rates of transition to high-tech systems and is accompanied by a trend of deep mutual penetration of technologies - convergence. The dominant telecommunication technologies have become wireless communication systems. The widespread use of modern wireless technologies has led to the saturation of the environment with technological electromagnetic fields and the actualization of the problems of protecting the population from them. This fundamental restructuring has led to a uniform dense placement of radiating fragments of network technologies in the mudflow areas. The changed parameters of the emitted fields became the reason for the revision of the regulatory and methodological support of electromagnetic safety. A fragmented structural, functional and parametric analysis of the problem of protecting the population from the technological fields of network technologies revealed uncertainty in the interpretation of real situations, vulnerability, weakness and groundlessness of the methodological basis of sanitary-hygienic approaches. It is shown that this applies to all stages of the electromagnetic examination of the emitting fragments of network technologies. Distrust arises on the part of specialists and the population in not only the system of sanitary-hygienic control, but also the safety of modern network technologies is being called into question. Growing social tensions and radio phobia are everywhere accompanying the development of wireless communication technologies. The basis for solving almost all problems of protecting the population can be the transfer of subjective methods and means of monitoring and sanitary-hygienic control of electromagnetic fields into the field of IT.


Author(s):  
A. Suresh Babu ◽  
B. Anand

: A Linear Feedback Shift Register (LFSR) considers a linear function typically an XOR operation of the previous state as an input to the current state. This paper describes in detail the recent Wireless Communication Systems (WCS) and techniques related to LFSR. Cryptographic methods and reconfigurable computing are two different applications used in the proposed shift register with improved speed and decreased power consumption. Comparing with the existing individual applications, the proposed shift register obtained >15 to <=45% of decreased power consumption with 30% of reduced coverage area. Hence this proposed low power high speed LFSR design suits for various low power high speed applications, for example wireless communication. The entire design architecture is simulated and verified in VHDL language. To synthesis a standard cell library of 0.7um CMOS is used. A custom design tool has been developed for measuring the power. From the results, it is obtained that the cryptographic efficiency is improved regarding time and complexity comparing with the existing algorithms. Hence, the proposed LFSR architecture can be used for any wireless applications due to parallel processing, multiple access and cryptographic methods.


Author(s):  
Showkat Ahmad Bhat ◽  
Amandeep Singh

Background & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm. Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.


2015 ◽  
Vol E98.C (12) ◽  
pp. 1091-1104 ◽  
Author(s):  
Minoru FUJISHIMA ◽  
Shuhei AMAKAWA ◽  
Kyoya TAKANO ◽  
Kosuke KATAYAMA ◽  
Takeshi YOSHIDA

Sign in / Sign up

Export Citation Format

Share Document