298 research outputs found
Deep Space Network information system architecture study
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies, such as the following: computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control
Future benefits and applications of intelligent on-board processing to VSAT services
The trends and roles of VSAT services in the year 2010 time frame are examined based on an overall network and service model for that period. An estimate of the VSAT traffic is then made and the service and general network requirements are identified. In order to accommodate these traffic needs, four satellite VSAT architectures based on the use of fixed or scanning multibeam antennas in conjunction with IF switching or onboard regeneration and baseband processing are suggested. The performance of each of these architectures is assessed and the key enabling technologies are identified
Space Shuttle/TDRSS communication and tracking systems analysis
In order to evaluate the technical and operational problem areas and provide a recommendation, the enhancements to the Tracking and Data Delay Satellite System (TDRSS) and Shuttle must be evaluated through simulation and analysis. These enhancement techniques must first be characterized, then modeled mathematically, and finally updated into LinCsim (analytical simulation package). The LinCsim package can then be used as an evaluation tool. Three areas of potential enhancements were identified: shuttle payload accommodations, TDRSS SSA and KSA services, and shuttle tracking system and navigation sensors. Recommendations for each area were discussed
Simulated selves
In an increasingly virtual world, new identities that exist only in cyberspace are being created. Historically rooted, role-playing has been popular long before Shakespeare, and starting in the early 1990s, has moved into the computer. Now more than ever, it serves as a form of entertainment, escape and self-exploration to hundreds of thousands of people worldwide. In interactive, text-based computer games that are designed to represent fantasy worlds, players become authors not only of text but of themselves, constructing new selves through social interaction. On a MUD (Multi User Domain) game, places and selves are completely constructed through text. Thus, the short can be tall, the plain beautiful and the shy extroverted. The anonymity of a MUD one is known on the MUD only by the name of one\u27s character or character\u27s gives people the chance to express multiple and often unexplored aspects of the self to play with their identity and to try out new ones. In MUDs one can be many. (Turkle, 10) Simulted Selves brings selected characters out of the computer and onto the printed canvas, further mixing fantasy and reality through artistic interpretation. Standing between the boundary of real and virtual, new cultures of simulations become active. Through inhabiting the virtual and the real simultaneously, questions of how to achieve a better sense of ourselves by accessing our perhaps repressed multiple identities is evident. And the possible risk of losing reality in the process is undeniable. However complex the individual outcome, life on the screen is for many, more exciting, compelling and fulfilling than real life. By articulating the boundary between real life (RL) identities and existence on a MUD, the very concept of postmodern identity acquires new meaning
The design of PABX with LAN architecture.
Ko Wing Hoi.Duplicate numbering of leave 67.Thesis (M.Sc.)--Chinese University of Hong Kong, 1992.Includes bibliographical references (leaves 71-72).Chapter 1. --- INTRODUCTION --- p.1Chapter 2. --- COMPARISONS OF LAN AND PABX --- p.3Chapter 2.1 --- Typical LAN system --- p.3Chapter 2.1.1 --- Characteristics of a LAN [1] --- p.3Chapter 2.1.2 --- Transmission medium of LAN --- p.5Chapter 2.1.3 --- LAN access control methods --- p.6Chapter 2.1.4 --- Interfacing to the LAN --- p.8Chapter 2.1.5 --- LAN topology --- p.8Chapter 2.1.6 --- Switching techniques --- p.9Chapter 2 .2 --- Applications of LAN --- p.11Chapter 2.2.1 --- Small filestore LAN's --- p.12Chapter 2.2.2 --- Wiring replacement LAN's --- p.12Chapter 2.2.3 --- Personal computer networks --- p.13Chapter 2.2.4 --- General purpose LAN's --- p.13Chapter 2 .3 --- Typical PABX system --- p.14Chapter 2.3.1 --- PABX topology --- p.15Chapter 2.3.2 --- Circuit switching --- p.15Chapter 2.3.3 --- Telephony signalling --- p.16Chapter 2.3.3.1 --- Pulsing --- p.16Chapter 2.3.3.2 --- Subscriber loop signaling [2] --- p.17Chapter 2.3.4 --- ISDN (Integrated Services Digital Network) --- p.19Chapter 2.4 --- Applications of PABX --- p.21Chapter 2.5 --- Comparisons of LAN and PABX --- p.22Chapter 3. --- INTEGRATION OF PABX WITH LAN --- p.25Chapter 3.1 --- Advantages of integration of PABX with LAN --- p.25Chapter 3.1.1. --- LAN-PABX Gateway --- p.28Chapter 3.1.2. --- Problems in interconnecting PABX and LAN [6] --- p.29Chapter 3.1.3. --- ISDN-PABX [7] --- p.30Chapter 3.2 --- Architecture of Integrated LAN and PABX --- p.31Chapter 3.3 --- Typical applications --- p.32Chapter 4. --- CALL PROCESSING --- p.35Chapter 4.1 --- Finite State Diagrams for voice calls --- p.37Chapter 4.2 --- SDL representations of voice calls --- p.39Chapter 4.3 --- Software implementations of SDL diagrams --- p.40Chapter 4.3.1 --- PABX operating system --- p.40Chapter 4.3.2 --- Trunk operating system --- p.43Chapter 4.3.3 --- Message format --- p.43Chapter 4.4 --- Pseudo codes for PABX --- p.45Chapter 4.4 --- Pseudo codes for trunks --- p.52Chapter 5. --- HARDWARE IMPLEMENTATION --- p.57Chapter 5.1 --- TRUNK INTERFACE --- p.58Chapter 5.1.1 --- PABX to CO call --- p.58Chapter 5.1.2 --- CO to PABX call --- p.59Chapter 5.2 --- Subscriber Interface Circuit --- p.59Chapter 5.4 --- PSTN Trunk Interf ace --- p.60Chapter 6. --- CONCLUSIONS --- p.62Acknowledgements --- p.64APPENDIX A --- p.65CCITT SPECIFICATION AND DESCRIPTION LANGUAGE [15] --- p.65APPENDIX B --- p.68"SIGNALLING FOR SWITCHING SYSTEMS IN HK [16],[17]" --- p.68Chapter B. 1 --- Tone plan --- p.68Chapter B. 2 --- Tone levels --- p.68Chapter B. 3 --- Ringing frequency and voltage --- p.68Chapter B. 4 --- Dial pulse --- p.68Chapter B. 5 --- DTMF (Dual-tone multi-frequency) --- p.69Chapter B. 6 --- PCM coding --- p.69REFERENCES --- p.7
Spartan Daily, November 19, 1991
Volume 97, Issue 56https://scholarworks.sjsu.edu/spartandaily/8193/thumbnail.jp
Mobile Staff Instant Interaction System
The purpose of this report to give a detail a view about the final year project that has
been developed by author which is "Mobile Staff Instant Interaction System" which is
intended for lecturers and student using Local Area Network(LAN) wireless
connectivity. The report contents background of study, problem statement, objective
and scope of study, literature review and theory, methodology, and conclusion and
recommendation. Basically, the problem of the current situation is when a frequent
consultations and appointments have to be done for learning or project purposes.
Alternatively, the LAN-Based system will replace the current systems that are such as
Yahoo Messenger and email which require anaccess of internet when the connection is
off. The scope of the project is to keep the interaction between both entities constantly
beheld. Ausercould setanappointment to theintended target users form the registered
user and consult remotely using the appointment. The methodology been used is
waterfall model because the author is dealing with a proposed and new knowledge to
the author. This will need a furtherstudies and investigation on the wireless architecture
itself, WAP system development and implementation. As for conclusions, the author
has described about the recommendation and important of the system in term of
efficiency and time which are crucial thatcould accelerate a certain task progress
- …