872 resultados para DATA TRANSMISSION


Relevância:

60.00% 60.00%

Publicador:

Resumo:

目前分布式体系结构的研究重点是提高系统的可扩展性、互操作性和可重用性,而对于实时性要求高的分布式仿真系统,还需要在HLA体系结构基础上,考虑如何提高系统的数据传输效率,以满足实时性要求。本文从应用层角度出发,从以下两个方面研究了改进策略: 一,从数据交互方面考虑,为了提高分布式仿真系统内部有效数据传输效率,满足系统实时性要求,以车辆定位仿真系统为问题原型,提出一种基于运行时间支撑系统数据分发管理(RTI-DDM)和套接字(Socket)的双层数据传输模型:一方面利用RTI-DDM来限定传输数据的范围,依据待交互的数据值域对数据的发送和接收进行过滤,有效降低系统内部冗余数据的传输;另一方面,利用Socket技术在仿真实体之间建立点对点的直接传输,从而提高系统的运行效率。对比实验结果表明,在相同的仿真交互数据量下,该模型相对于传统单层RTI数据传输模型,数据传输延时平均缩短70%。 二,从时间管理方面考虑,本文通过实验验证的方法,分析不同时间管理策略对仿真系统的数据传输和运行控制的影响,并针对车辆定位仿真系统中联邦成员之间的数据交互和逻辑控制关系特点,选择合适的时间管理策略,保证数据因果关系的正确性,进一步提高了系统的数据传输性能。 实验和应用结果表明,本文提出的改进策略简单有效,提高了系统数据传输效率,较好的解决了基于HLA/RTI的定位仿真系统的实时性问题。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Polyelectrolyte complexes (PECs) were prepared by mixing aqueous solutions of chitosan (CS) and poly(L-glutamic acid) (PLGA) at various pH. It was found that the stoichiometry of the PECs depends on pH.An investigation of the PECs using Fourier transform infrared spectroscopy proved that the formation of the complexes is due to electrostatic interaction between –NH3 + groups of CS and –COO− groups of PLGA. The solid PECs were characterized using wide-angle X-ray diffraction, which suggested that a strong interaction occurs between the two polymers at pH = 4 or 5 and relatively weak interaction at pH = 3. These results were further confirmed by thermogravimetric analysis data. Transmission electron microscopy showed that the complexes have a spherical shape. The effect of ionic strength on the size of the PECs was also studied using dynamic light scattering. It was found that the size of the PECs is dependent on pH.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

为了缩短深海载人潜器控制系统的开发周期,测试系统性能,根据载人潜器的自身特点,构建和实现了载人潜器所有传感器、执行器设备模拟,以及潜器在海底实景的运动状态的半物理虚拟仿真系统。首先,以仿真系统的硬件架构和数据流程为基础,重点介绍了潜器设备模拟的软件体系结构;其次,在仿真平台上测试了各种网络数据的传输延迟,分析了其整体性能;最后,得出了潜器控制器设计的时间约束。现阶段整个系统已经开发成功,并投入运行到潜器控制系统的安装调试中。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

根据具体的需求,为载人潜器设计了一种基于工业以太网的内部数据通讯和控制系统,其数据通讯的实时性是衡量控制系统的一个重要指标,因此,为了分析串行数据通信系统的实时性能,据其选用的传感器和网络架构的特点,建立了串口数据包传送时间延迟的数学模型;并在潜器平台上,以实测数据试验误差验证了该模型的准确性和普遍性,从而为开发人员对各种串口设备的参数设置提供理论指导;最后用该模型分析了载人潜器串行数据传送的实时性。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

提出了一种基于信道估计的RS纠错编码改进算法,该算法可以自适应地根据外界条件和环境对传输信道的干扰变化实时地调节编码系统的数据冗余量。仿真与完整的分析结果证实了该改进算法有效地改善了RS编码算法的传输效率;并且通过实际应用表明:良好的性能,高容错性适应于该通信系统的多种传输信道,具有很强的实用性。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

结合目前我国高速公路通信传输网络的建设现状和收费系统数据通信的需求,从 结构、性能等方面分析了适应高速公路通信的3种网络技术SDH、ATM和宽带IP技术,以及这 3 种技术的综合集成模型ATM Over SDH、IP Over ATM、IP Over SDH、IP Over WDM。提出 比 较适合于高速公路收费系统联网的技术方案,并设计了网络通信管理和维护的具体内容 。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

An increasing number of applications, such as distributed interactive simulation, live auctions, distributed games and collaborative systems, require the network to provide a reliable multicast service. This service enables one sender to reliably transmit data to multiple receivers. Reliability is traditionally achieved by having receivers send negative acknowledgments (NACKs) to request from the sender the retransmission of lost (or missing) data packets. However, this Automatic Repeat reQuest (ARQ) approach results in the well-known NACK implosion problem at the sender. Many reliable multicast protocols have been recently proposed to reduce NACK implosion. But, the message overhead due to NACK requests remains significant. Another approach, based on Forward Error Correction (FEC), requires the sender to encode additional redundant information so that a receiver can independently recover from losses. However, due to the lack of feedback from receivers, it is impossible for the sender to determine how much redundancy is needed. In this paper, we propose a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the message overhead due to NACK requests, (2) reduce the amount of data transmission, and (3) reduce the time it takes for all receivers to receive the data intact (without loss). During data transmission, the sender periodically informs the receivers of the number of packets that are yet to be transmitted. Based on this information, each receiver predicts whether this amount is enough to recover its losses. Only if it is not enough, that the receiver requests the sender to encode additional redundant packets. Using ns simulations, we show the superiority of our hybrid ARQ-FEC protocol over the well-known Scalable Reliable Multicast (SRM) protocol.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The power consumption of wireless sensor networks (WSN) module is an important practical concern in building energy management (BEM) system deployments. A set of metrics are created to assess the power profiles of WSN in real world condition. The aim of this work is to understand and eventually eliminate the uncertainties in WSN power consumption during long term deployments and the compatibility with existing and emerging energy harvesting technologies. This paper investigates the key metrics in data processing, wireless data transmission, data sensing and duty cycle parameter to understand the system power profile from a practical deployment prospective. Based on the proposed analysis, the impacts of individual metric on power consumption in a typical BEM application are presented and the subsequent low power solutions are investigated.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:

• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.

• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.

• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Multiuser diversity (MUDiv) is one of the central concepts in multiuser (MU) systems. In particular, MUDiv allows for scheduling among users in order to eliminate the negative effects of unfavorable channel fading conditions of some users on the system performance. Scheduling, however, consumes energy (e.g., for making users' channel state information available to the scheduler). This extra usage of energy, which could potentially be used for data transmission, can be very wasteful, especially if the number of users is large. In this paper, we answer the question of how much MUDiv is required for energy limited MU systems. Focusing on uplink MU wireless systems, we develop MU scheduling algorithms which aim at maximizing the MUDiv gain. Toward this end, we introduce a new realistic energy model which accounts for scheduling energy and describes the distribution of the total energy between scheduling and data transmission stages. Using the fact that such energy distribution can be controlled by varying the number of active users, we optimize this number by either i) minimizing the overall system bit error rate (BER) for a fixed total energy of all users in the system or ii) minimizing the total energy of all users for fixed BER requirements. We find that for a fixed number of available users, the achievable MUDiv gain can be improved by activating only a subset of users. Using asymptotic analysis and numerical simulations, we show that our approach benefits from MUDiv gains higher than that achievable by generic greedy access algorithm, which is the optimal scheduling method for energy unlimited systems. © 2010 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Modern wireless systems are expected to operate in multiple frequency bands and support diverse communications standards to provide the high volume and speed of data transmission. Today's major limitations of their performance are imposed by interference, spurious emission and noise generated by high-power carriers in antennas and passive components of the RF front-end. Passive Intermodulation (PIM), which causes the combinatorial frequency generation in the operational bands, presents a primary challenge to signal integrity, system efficacy and data throughput. © 2013 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider a collision-sensitive secondary system that intends to opportunistically aggregate and utilize spectrum of a primary system to achieve higher data rates. In such opportunistic spectrum access, secondary transmission can collide with primary transmission. When the secondary system aggregates more channels for data transmission, more frequent collisions may occur, limiting the performance obtained by the opportunistic spectrum aggregation. In this context, dynamic spectrum aggregation problem is formulated to maximize the ergodic channel capacity under the constraint of collision tolerable level. To solve the problem, we develop the optimal spectrum aggregation approach, deriving closed-form expressions for the collision probability in terms of primary user traffic load, secondary user transmission interval, and the random number of sub-channels aggregated. Our results show that aggregating only a subset of sub-channels will be a better choice, depending on the ratio of collision sensitivity requirement to the primary user traffic.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.