scholarly journals A Conversion Protocol for 2W Telephone Signal over Ethernet in a Private PSTN

Author(s):  
JinBeom Shin ◽  
KilSeok Cho ◽  
DongGwan Lee ◽  
TaeHyon Kim

In this paper, we proposed a protocol to convert 2W telephone analog signals to Ethernet data in a private PSTN 2W tactical voice system. There are several kinds of operational problems in the tactical telephone network where 2W telephone copper lines are installed hundreds of meters away from the PBX in a headquarter site. The reason is that it is difficult to install and maintain the 2W telephone copper cable in severe operational fields and to meet safety and stability operational requirements of the telephone line under lighting and electromagnetic environments. In order to solve these challenging demands, we proposed an efficient method that the 2W analog interface signals between a private PBX system and a 2W telephone is converted to Ethernet messages using the optical Ethernet data communication network already deployed in the tactical weapon system. Thus, it is not necessary to install an additional optic cable for the ethernet telephone line and to maintain the private PSTN 2W telephone network. Also it provides safe and secure telecommunication operation under lightning and electromagnetic environments. This paper presents the conversion protocol from 2W telephone signals over Ethernet interface between PBX systems and 2W telephones, the mutual exchange protocol of ethernet messages between two converters, and the rule to process analog signal interface. Finally, we demonstrate that the proposed technique can provide a feasible solution in the tactical weapon system by analyzing its performance and experimental results such as the bandwidth of 2W telephone ethernet network and the transmission latency of voice signal, and the stability of optic ethernet voice network along with the ethernet data network.

Author(s):  
David Brooks

Intelligent Buildings (IB) are facility-wide systems that connect, control, and monitor the plant and equipment of a facility. The aim of IB is to ensure a facility is more efficient, productive, and safe, at a reduced cost. A typical IB integrates diverse subsystems into a common and open data communication network, using both software and hardware; however, IBs suffer from diverse generic vulnerabilities. Identified vulnerabilities may include limited awareness of security threats and system vulnerabilities, physical access to parts of the system, compromise of various networks, insertion of foreign devices, lack of physical security, and reliance on utility power. IB risks are contextual and aligned with the threat exposure of the facility. Nevertheless, there are generic mitigation strategies that can be put in place to protect IB systems. Strategies include threat-driven security risk management, an understanding of system criticality, greater integration of departments, network isolation, layered protection measures, and increased security awareness.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5120 ◽  
Author(s):  
Tao Ni ◽  
Wenhang Li ◽  
Hongyan Zhang ◽  
Haojie Yang ◽  
Zhifei Kong

Autonomous vehicles can obtain real-time road information using 3D sensors. With road information, vehicles avoid obstacles through real-time path planning to improve their safety and stability. However, most of the research on driverless vehicles have been carried out on urban even driveways, with little consideration of uneven terrain. For an autonomous full tracked vehicle (FTV), the uneven terrain has a great impact on the stability and safety. In this paper, we proposed a method to predict the pose of the FTV based on accurate road elevation information obtained by 3D sensors. If we could predict the pose of the FTV traveling on uneven terrain, we would not only control the active suspension system but also change the driving trajectory to improve the safety and stability. In the first, 3D laser scanners were used to get real-time cloud data points of the terrain for extracting the elevation information of the terrain. Inertial measurement units (IMUs) and GPS are essential to get accurate attitude angle and position information. Then, the dynamics model of the FTV was established to calculate the vehicle’s pose. Finally, the Kalman filter was used to improve the accuracy of the predicted pose. Compared to the traditional method of driverless vehicles, the proposed approach was more suitable for autonomous FTV. The real-world experimental result demonstrated the accuracy and effectiveness of our approach.


2011 ◽  
Vol 361-363 ◽  
pp. 183-187
Author(s):  
Xiao Ren Mei

Heidaigou Surface Coal Mine (HSCM) is a large surfaces coal mine that first uses the throwing blasting - dragline stripping technology. Lots of new demanding prompt solution issues appears in HSCM without any successful experience in China, such as the stability of dragline stripping bench, the design and implementation of throwing blasting parameters, and the optimization of dragline stripping technology parameters. Rigid Body Limit Equilibrium Method (RBLEM) was used to study the safety and stability of dragline solid high bench and dragline stripping loosen bench under different workface parameters and influence factors. The safe operation parameters of dragline stripping bench are proposed. The dozer lowered height of the stripping bench, the width of extended bench and dragline operation parameters are optimized using the Optimization System of Dragline Stripping Technology (OSDST). The results can provide the decision support for HSCM.


Author(s):  
Arash Aziminejad ◽  
Yan He

Abstract Radio-based Communication-Based Train Control (CBTC) systems are widely utilized in major urban centers around the world to improve capacity, performance, and safety of public rail transportation systems. The system primary functionalities are performed based on the wireless mobile communication media, through which wayside-onboard communication data links are established. The focus of the presented research is to improve the performance of the CBTC wireless network by providing an efficient framework for placement optimization of the wayside transceivers aiming to maximize the radio coverage. The QoS-oriented convex optimization cost function is based on a heuristic model of radio wave propagation in the tunnel environment. The optimization engine uses the robust, efficient, and well-behaved Nelder-Mead algorithm. Furthermore, to provide reliable means for verification, numerical results are compared with measured data produced through an empirical site survey process performed for an actual CBTC system deployment.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Vaibhav Shukla ◽  
Nikunj Sharma ◽  
Dilip Kumar Choubey

AbstractRecently, in the present day’s data center systems an explosive growth has been observed in data traffic, which restricts the speed of exiting data communication network. To solve such problem, fiber optical-based optical communication system is preferred choice. In this paper, an arrayed waveguide grating (AWG)-based optical packet switch is presented in which priority among packets is implemented effectively. This switch is a recirculating loop buffer-based switch in which a hybrid buffering (optical + electrical) technique is used for storing packets into the buffer. The power budget analysis of switch is presented in various conditions, when packet passes through the optical or electronic buffers. Comparison of optical and electronic buffering is done in terms of power required for the correct operation of the switch. In this paper, a comparison is performed between our proposed switch with recently published switch designs. The result presented in this paper clearly reveals that the performance of our proposed switch is far better than other previously published switch architecture. The major beauty of our proposed switch is that in this design priority among packets implemented effectively.


Sign in / Sign up

Export Citation Format

Share Document