845 resultados para DATA TRANSMISSION


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Quantitatively assessing the importance or criticality of each link in a network is of practical value to operators, as that can help them to increase the network's resilience, provide more efficient services, or improve some other aspect of the service. Betweenness is a graph-theoretical measure of centrality that can be applied to communication networks to evaluate link importance. However, as we illustrate in this paper, the basic definition of betweenness centrality produces inaccurate estimations as it does not take into account some aspects relevant to networking, such as the heterogeneity in link capacity or the difference between node-pairs in their contribution to the total traffic. A new algorithm for discovering link centrality in transport networks is proposed in this paper. It requires only static or semi-static network and topology attributes, and yet produces estimations of good accuracy, as verified through extensive simulations. Its potential value is demonstrated by an example application. In the example, the simple shortest-path routing algorithm is improved in such a way that it outperforms other more advanced algorithms in terms of blocking ratio

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents a study of connection availability in GMPLS over optical transport networks (OTN) taking into account different network topologies. Two basic path protection schemes are considered and compared with the no protection case. The selected topologies are heterogeneous in geographic coverage, network diameter, link lengths, and average node degree. Connection availability is also computed considering the reliability data of physical components and a well-known network availability model. Results show several correspondences between suitable path protection algorithms and several network topology characteristics

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In networks with small buffers, such as optical packet switching based networks, the convolution approach is presented as one of the most accurate method used for the connection admission control. Admission control and resource management have been addressed in other works oriented to bursty traffic and ATM. This paper focuses on heterogeneous traffic in OPS based networks. Using heterogeneous traffic and bufferless networks the enhanced convolution approach is a good solution. However, both methods (CA and ECA) present a high computational cost for high number of connections. Two new mechanisms (UMCA and ISCA) based on Monte Carlo method are proposed to overcome this drawback. Simulation results show that our proposals achieve lower computational cost compared to enhanced convolution approach with an small stochastic error in the probability estimation

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ethernet está empezando a pasar de las redes de área local a una red de transporte. Sin embargo, como los requisitos de las redes de transporte son más exigentes, la tecnología necesita ser mejorada. Esquemas diseñados para mejorar Ethernet para que cumpla con las necesidades de transporte se pueden categorizar en dos clases. La primera clase mejora solo los componentes de control de Ethernet (Tecnologías basadas en STP), y la segunda clase mejora tanto componentes de control como de encaminamiento de Ethernet (tecnologías basadas en etiquetas). Esta tesis analiza y compara el uso de espacio en las etiquetas de las tecnologias basadas en ellas para garantizar su escalabilidad. La aplicabilidad de las técnicas existentes y los estudios que se pueden utilizar para superar o reducir los problemas de escalabilidad de la etiqueta son evaluados. Además, esta tesis propone un ILP para calcular el óptimo rendimiento de las technologias basadas en STP y las compara con las basadas en etiquetas para ser capaz de determinar, dada una específica situacion, que technologia utilizar.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper proposes the full interference cancellation (FIC) algorithm to cancel the inter-relay interference (IRI) in the two-path cooperative system. Arising from simultaneous data transmission from the source and relay nodes, IRI may significantly decrease the performance if it is not carefully handled. Compared to the existing partial interference cancellation (PIC) scheme, the FIC approach is more robust yet with less complexity. Numerical results are also given to verify the proposed scheme.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper proposes a novel interference cancellation algorithm for the two-path successive relay system using network coding. The two-path successive relay scheme was proposed recently to achieve full date rate transmission with half-duplex relays. Due to the simultaneous data transmission at the relay and source nodes, the two-path relay suffers from the so-called inter-relay interference (IRI) which may significantly degrade the system performance. In this paper, we propose to use the network coding to remove the IRI such that the interference is first encoded with the network coding at the relay nodes and later removed at the destination. The network coding has low complexity and can well suppress the IRI. Numerical simulations show that the proposed algorithm has better performance than existing approaches.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cloud computing is usually regarded as being energy efficient and thus emitting less greenhouse gases (GHG) than traditional forms of computing. When the energy consumption of Microsoft’s cloud computing Office 365 (O365) and traditional Office 2010 (O2010) software suites were tested and modeled, some cloud services were found to consume more energy than the traditional form. The developed model in this research took into consideration the energy consumption at the three main stages of data transmission; data center, network, and end user device. Comparable products from each suite were selected and activities were defined for each product to represent a different computing type. Microsoft provided highly confidential data for the data center stage, while the networking and user device stages were measured directly. A new measurement and software apportionment approach was defined and utilized allowing the power consumption of cloud services to be directly measured for the user device stage. Results indicated that cloud computing is more energy efficient for Excel and Outlook which consumed less energy and emitted less GHG than the standalone counterpart. The power consumption of the cloud based Outlook (8%) and Excel (17%) was lower than their traditional counterparts. However, the power consumption of the cloud version of Word was 17% higher than its traditional equivalent. A third mixed access method was also measured for Word which emitted 5% more GHG than the traditional version. It is evident that cloud computing may not provide a unified way forward to reduce energy consumption and GHG. Direct conversion from the standalone package into the cloud provision platform can now consider energy and GHG emissions at the software development and cloud service design stage using the methods described in this research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system. This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Health monitoring technologies such as Body Area Network (BAN) systems has gathered a lot of attention during the past few years. Largely encouraged by the rapid increase in the cost of healthcare services and driven by the latest technological advances in Micro-Electro-Mechanical Systems (MEMS) and wireless communications. BAN technology comprises of a network of body worn or implanted sensors that continuously capture and measure the vital parameters such as heart rate, blood pressure, glucose levels and movement. The collected data must be transferred to a local base station in order to be further processed. Thus, wireless connectivity plays a vital role in such systems. However, wireless connectivity comes at a cost of increased power usage, mainly due to the high energy consumption during data transmission. Unfortunately, battery-operated devices are unable to operate for ultra-long duration of time and are expected to be recharged or replaced once they run out of energy. This is not a simple task especially in the case of implanted devices such as pacemakers. Therefore, prolonging the network lifetime in BAN systems is one of the greatest challenges. In order to achieve this goal, BAN systems take advantage of low-power in-body and on-body/off-body wireless communication technologies. This paper compares some of the existing and emerging low-power communication protocols that can potentially be employed to support the rapid development and deployment of BAN systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Internet protocol TV (IPTV) is predicted to be the key technology winner in the future. Efforts to accelerate the deployment of IPTV centralized model which is combined of VHO, encoders, controller, access network and Home network. Regardless of whether the network is delivering live TV, VOD, or Time-shift TV, all content and network traffic resulting from subscriber requests must traverse the entire network from the super-headend all the way to each subscriber's Set-Top Box (STB). IPTV services require very stringent QoS guarantees When IPTV traffic shares the network resources with other traffic like data and voice, how to ensure their QoS and efficiently utilize the network resources is a key and challenging issue. For QoS measured in the network-centric terms of delay jitter, packet losses and bounds on delay. The main focus of this thesis is on the optimized bandwidth allocation and smooth data transmission. The proposed traffic model for smooth delivering video service IPTV network with its QoS performance evaluation. According to Maglaris et al [5] first, analyze the coding bit rate of a single video source. Various statistical quantities are derived from bit rate data collected with a conditional replenishment inter frame coding scheme. Two correlated Markov process models (one in discrete time and one in continuous time) are shown to fit the experimental data and are used to model the input rates of several independent sources into a statistical multiplexer. Preventive control mechanism which is to be including CAC, traffic policing used for traffic control. QoS has been evaluated of common bandwidth scheduler( FIFO) by use fluid models with Markovian queuing method and analysis the result by using simulator and analytically, Which is measured the performance of the packet loss, overflow and mean waiting time among the network users.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

One of the best examples of the Information and Communication Technology (ICT) evolutions is on the high capability of storing and processing data into smaller devices, creating a new business condition, the mobility . This mobility in a deeper analysis proposes a business remodeling in many different areas (business segmentations), through the Internet anywhere at any time, allowing managers and researchers to think again their actual models that work nowadays in companies and public institutions, modifying the way internal and external clients can be attended. This thesis analyzes issues on mobile business adoption, technological evolutions and the impacts caused by this new reality the access to information anywhere at any time . This research is exploratory and shows a compilation of similar papers and thesis describing how was conducted the survey within 50 companies in the states of Rio Grande do Norte, Pernambuco and Ceará. The statistics analysis showed the different level of mobile technology usage from simple voice communications to wide band data transmission. The analysis pointed that canonic correlation was the most effective type of analysis to describe the relations among all groups of variables showing which of them are relevant, or not, for mobile technology adoption

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This dissertation aims to develop a software applied to a communication system for a wireless sensor network (WSN) for tracking analog and digital variables and control valve of the gas flow in artificial oil s elevation units, Plunger Lift type. The reason for this implementation is due to the fact that, in the studied plant configuration, the sensors communicate with the PLC (Programmable and Logic Controller) by the cables and pipelines, making any changes in that system, such as changing the layout of it, as well as inconveniences that arise from the nature of the site, such as the vicinity s animals presence that tend to destroy the cables for interconnection of sensors to the PLC. For software development, was used communication polling method via SMAC protocol (Simple Medium Access ControlIEEE 802.15.4 standard) in the CodeWarrior environment to which generated a firmware, loaded into the WSN s transceivers, present in the kit MC13193-EVK, (all items described above are owners of Freescale Semiconductors Inc.). The network monitoring and parameterization used in its application, was developed in LabVIEW software from National Instruments. The results were obtained through the observation of the network s behavior of sensors proposal, focusing on aspects such as: indoor and outdoor quantity of packages received and lost, general aspects of reliability in data transmission, coexistence with other types of wireless networks and power consumption under different operating conditions. The results were considered satisfactory, which showed the software efficiency in this communication system

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, the radio frequency identification technology (RFID) has gained great interest both industrial communities as scientific communities. Its ability to locate and monitor objects, animals and persons with active or passive tags allows easy development, with good cost-benefice and still presents undeniable benefits in applications ranging from logistics to healthcare, robotics, security, among others. Within this aspect what else comes excelling are RFID tags and the antennas used in RFID readers. Most tags have antennas omnidirectional and are usually manufactured as dipoles modified printed. The primary purpose of a project of antenna for tag is to achieve the required input impedance to perform a good marriage impedance with the load impedance of the chip. Already the objective principal in project of antennas for readers is to achieve reduced sizes and structures with good data transmission capacity. This work brings the numerical characterization of antennas for RFID applications, being these divided into tags RFID and antennas for RFID readers. Three tags RFID and two antennas for RFID readers, found in literature, are analyzed. The analysis of these structures is made using the Method of Waves - WCIP. Initial results found in the literature are compared with those obtained through simulations in WCIP with objective to show that the Method of Waves is able to analyze such structures. To illustrate the results obtained in simulations is presented the behavior of electric and magnetic fields. It also performed a literature review on the characteristics and principles of RFID technology. Suggestions for continuity to this work are presented

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Nowadays, optic fiber is one of the most used communication methods, mainly due to the fact that the data transmission rates of those systems exceed all of the other means of digital communication. Despite the great advantage, there are problems that prevent full utilization of the optical channel: by increasing the transmission speed and the distances involved, the data is subjected to non-linear inter symbolic interference caused by the dispersion phenomena in the fiber. Adaptive equalizers can be used to solve this problem, they compensate non-ideal responses of the channel in order to restore the signal that was transmitted. This work proposes an equalizer based on artificial neural networks and evaluates its performance in optical communication systems. The proposal is validated through a simulated optic channel and the comparison with other adaptive equalization techniques

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The effect of confinement on the magnetic structure of vortices of dipolar coupled ferromagnetic nanoelements is an issue of current interest, not only for academic reasons, but also for the potential impact in a number of promising applications. Most applications, such as nano-oscillators for wireless data transmission, benefit from the possibility of tailoring the vortex core magnetic pattern. We report a theoretical study of vortex nucleation in pairs of coaxial iron and Permalloy cylinders, with diameters ranging from 21nm to 150nm, and 12nm and 21nm thicknesses, separated by a non-magnetic layer. 12nm thick iron and Permalloy isolated (single) cylinders do not hold a vortex, and 21nm isolated cylinders hold a vortex. Our results indicate that one may tailor the magnetic structure of the vortices, and the relative chirality, by selecting the thickness of the non-magnetic spacer and the values of the cylinders diameters and thicknesses. Also, the dipolar interaction may induce vortex formation in pairs of 12nm thick nanocylinders and inhibit the formation of vortices in pairs of 21nm thick nanocylinders. These new phases are formed according to the value of the distance between the cylinderes. Furthermore, we show that the preparation route may control relative chirality and polarity of the vortex pair. For instance: by saturating a pair of Fe 81nm diameter, 21nm thickness cylinders, along the crystalline anisotropy direction, a pair of 36nm core diameter vortices, with same chirality and polarity is prepared. By saturating along the perpendicular direction, one prepares a 30nm diameter core vortex pair, with opposite chirality and opposite polarity. We also present a theoretical discussion of the impact of vortices on the thermal hysteresis of a pair of interface biased elliptical iron nanoelements, separated by an ultrathin nonmagnetic insulating layer. We have found that iron nanoelements exchange coupled to a noncompensated NiO substrate, display thermal hysteresis at room temperature, well below the iron Curie temperature. The thermal hysteresis consists in different sequences of magnetic states in the heating and cooling branches of a thermal loop, and originates in the thermal reduction of the interface field, and on the rearrangements of the magnetic structure at high temperatures, 5 produce by the strong dipolar coupling. The width of the thermal hysteresis varies from 500 K to 100 K for lateral dimensions of 125 nm x 65 nm and 145 nm x 65 nm. We focus on the thermal effects on two particular states: the antiparallel state, which has, at low temperatures, the interface biased nanoelement with the magnetization aligned with the interface field and the second nanoelement aligned opposite to the interface field; and in the parallel state, which has both nanoelements with the magnetization aligned with the interface field at low temperatures. We show that the dipolar interaction leads to enhanced thermal stability of the antiparallel state, and reduces the thermal stability of the parallel state. These states are the key phases in the application of pairs of ferromagnetic nanoelements, separated by a thin insulating layer, for tunneling magnetic memory cells. We have found that for a pair of 125nm x 65nm nanoelements, separated by 1.1nm, and low temperature interface field strength of 5.88kOe, the low temperature state (T = 100K) consists of a pair of nearly parallel buckle-states. This low temperature phase is kept with minor changes up to T= 249 K when the magnetization is reduced to 50% of the low temperature value due to nucleation of a vortex centered around the middle of the free surface nanoelement. By further increasing the temperature, there is another small change in the magnetization due to vortex motion. Apart from minor changes in the vortex position, the high temperature vortex state remains stable, in the cooling branch, down to low temperatures. We note that wide loop thermal hysteresis may pose limits on the design of tunneling magnetic memory cells