data link
Recently Published Documents


TOTAL DOCUMENTS

1690
(FIVE YEARS 251)

H-INDEX

33
(FIVE YEARS 4)

2022 ◽  
pp. 165-182
Author(s):  
Jun-Ho Huh

In this design unit, a design to test the performances of varying models was developed for the simulations in the PLC-base data link layer. The design includes a smart home and a Smart Grid environment where a comparison between Zigbee and WiMax-based models can be performed. The Smart Grid Test Bed has been designed using OPNET and Power Line Communication is proposed in this book. It is being designed to allow test bed experiments in four layers among OSI 7 layers. This chapter is organized as follows: The Physical Layer and Datalink Layer for Smart Grid Test Bed in Section 1; the Transport Layer for Smart Grid Test Bed in Section 2; and finally, Application Layer for Smart Grid Test Bed in Section.


2022 ◽  
pp. 635-671
Author(s):  
Jun-Ho Huh

In this chapter, a design that allows testing of the performances of various models was developed with OPNET for the simulations in the PLC-base data link layer. As the model proposed earlier, the design includes a smart home and a Smart Grid environment where a comparison between Zigbee and WiMax-based models can be performed. The Smart Grid Test Bed has been implemented using OPNET and Power Line Communication is proposed in this book. It is being designed to allow Test Bed experiments in four layers among seven OSI layers. This chapter is organized as follows: the physical layer and datalink layer for Smart Grid Test Bed in Section 1; the transport layer for Smart Grid Test Bed in Section 2; and finally, application layer for Smart Grid Test Bed in Section 3.


2021 ◽  
Vol 5 (4) ◽  
pp. 402
Author(s):  
Ulugbek Amirsaidov ◽  
Azamat Qodirov

The issues of modeling and evaluating the characteristics of the LTE data link layer functioning are considered. Transmitting packets in the data link layer are represented by a probabilistic-temporal graph consisting of two subgraphs. The first subgraph describes the operation of the HARQ protocol, and the second subgraph describes the operation of the ARQ protocol. The first subgraph is nested within the second subgraph. The probabilities of correct reception, non-error detection, and retransmission of packets in the MAC and RLC layers and generating functions of the packet service time based on the HARQ and ARQ protocols are determined. With the help of generating functions, the average value, variance, and coefficient of variation of the packet service time are determined. To calculate the average packet delay time in the LTE data link layer, the type of queuing system is selected, taking into account the coefficient of variation of the packet service time. The analysis of packets' delay time in the network's data link layer is carried out for different values of the intensity of packet arrival and the probabilities of a bit error in the physical layer of the network. For the sustainable functioning of the data link layer of the network, the limit values of the intensity of the arrival of packets are determined for a given probability of a bit error in the physical layer of the network.


2021 ◽  
Vol 4 (30) ◽  
pp. 87-98
Author(s):  
V. L. Olenev ◽  
◽  
N. Y. Chumakova ◽  
N. I. Sinyov ◽  
A. Y. Syschikov ◽  
...  

The article presents the concept of all-optical on-board networks (AOON). AOON protocol stack is described, the operation of the transport layer, data link layer and the management layer of the AOON protocol stack is considered in details. The article also describes a software model designed to check the correctness of operation of the AOON protocol stack from a functional point of view, and an example of the developed software model is provided.


2021 ◽  
Author(s):  
Logan Norman ◽  
Hermann Geppert-Kleinrath ◽  
Yong Kim ◽  
Kevin Meaney

2021 ◽  
Author(s):  
R. Ganesh Babu ◽  
S. Yuvaraj ◽  
A. VedanthSrivatson ◽  
T. Ramachandran ◽  
G. Vikram ◽  
...  

IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.


Geology ◽  
2021 ◽  
Author(s):  
Hepeng Tian ◽  
Majie Fan ◽  
Victor A. Valencia ◽  
Kevin Chamberlain ◽  
Robert J. Stern ◽  
...  

A Paleozoic arc that formed by southward subduction of the Rheic oceanic plate beneath northern Gondwana has long been inferred, but its history and geochemical signatures remain poorly understood. New U-Pb ages, juvenile εHf signatures, and trace-element composition data of young zircons from tuffs at two southern Laurentia sites indicate their derivation from a continental arc that was active from ca. 328 to ca. 317 Ma and permit correlation of sedimentary sequences 800 km apart in southern Laurentia. These include the Stanley tuffs in the Ouachita Mountains of southeastern Oklahoma and southwestern Arkansas and the newly discovered Barnett tuff in the subsurface of the Midland Basin in west Texas (USA). The Barnett tuff has a zircon chemical abrasion–isotope dilution–thermal ionization mass spectrometry U-Pb date of 327.8 ± 0.8 Ma, similar to the oldest Stanley tuff in the Ouachita Mountains. Zircon Hf isotope depleted mantle model ages further suggest that the source was a continental arc on basement with both Grenville and Pan-African affinities, pointing to northern Gondwana or peri-Gondwana terranes. The new data link the tuffs to granitoids (326 Ma) of the Maya block in southern Mexico, which was part of northern Gondwana. Correlation of the Stanley-Barnett tuffs across southern Laurentia suggests the likely presence of Mississippian tuffs over a broad region in southern Laurentia, and their usefulness for constraining absolute ages of basin fills and characterizing the Gondwanan arc.


Symmetry ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 2134
Author(s):  
Furong Li ◽  
Duan Wang

With the development of mobile network technology, the continuous increase of mobile traffic has put forward higher requirements for quality of service (QoS) issues such as asymmetric transmission delay. The paper mainly studies the energy distribution problem on the migration data link from the terminal device to the edge node in the mobile edge network. Multiple data service packages are set up at each hop on the migration data link, and these data service packages compete with each other, and ultimately only one terminal provides and stores energy for this hop. The migration strategy of the data service package is affected by the edge node, and the edge node changes the migration strategy according to the migration strategy of the data service package. The paper is based on the formation of nodes between the data service packages of different nodes on the 5G network data link to jointly control the migration strategy, coordinate the migration strategy formulated, and better coordinate the migration strategy. In this competitive game model, the optimal migration strategy of nodes is found out according to the terminal equipment access requirements. Then according to the node stability rules, the composition of nodes when the nodes are stable is obtained, the migration strategy of stable nodes and the migration and spectrum strategies of operators are obtained, and the migration strategy of joint control provides energy for edge nodes.


Sign in / Sign up

Export Citation Format

Share Document