12 research outputs found

    차세대 자동차용 카메라 데이터 통신을 위한 비대칭 동시 양방향 송수신기의 설계

    Get PDF
    학위논문(박사) -- 서울대학교대학원 : 공과대학 전기·정보공학부, 2022.2. 정덕균.본 학위 논문에서는 차세대 자동차용 카메라 링크를 위해 높은 속도의 4레벨 펄스 진폭 변조 신호와 낮은 속도의 2레벨 펄스 진폭 변조 신호를 통신하는 비대칭 동시 양방향 송수신기의 설계 기술에 대해 제안하고 검증되었다. 첫번째 프로토타입 설계에서는, 10B6Q 직류 밸런스 코드를 탑재한 4레벨 펄스 진폭 변조 송신기와 고정된 데이터와 참조 레벨을 가지는 4레벨 펄스 진폭 변조 적응형 수신기에 대한 내용이 기술되었다. 4레벨 펄스 진폭 변조 송신기에서는 교류 연결 링크 시스템에 대응하기 위한 면적 및 전력 효율성이 좋은 10B6Q 코드가 제안되었다. 이 코드는 직류 밸런스를 맞추고 연속적으로 같은 심볼을 가지는 길이를 6개로 제한 시킨다. 비록 여기서는 입력 데이터 길이 10비트를 사용하였지만, 제안된 기술은 카메라의 다양한 데이터 타입에 대응할 수 있도록 입력 데이터 길이에 대한 확장성을 가진다. 반면, 4레벨 펄스 진폭 변조 적응형 수신기에서는, 샘플러의 옵셋을 최적으로 제거하여 더 낮은 비트에러율을 얻기 위해서, 기존의 데이터 및 참조 레벨을 조절하는 대신, 이 레벨들은 고정시키고 가변 게인 증폭기를 적응형으로 조절하도록 하였다. 상기 10B6Q 코드 및 고정 데이터 및 참조레벨 기술을 가진 프로토타입 칩들은 40 나노미터 상호보완형 메탈 산화 반도체 공정으로 제작되었고 칩 온 보드 형태로 평가되었다. 10B6Q 코드는 합성 게이트 숫자는 645개와 함께 단 0.0009 mm2 의 면적 만을 차지한다. 또한, 667 MHz 동작 주파수에서 단 0.23 mW 의 전력을 소모한다. 10B6Q 코드를 탑재한 송신기에서 8-Gb/s 4레벨 펄스 진폭 변조 신호를 고정 데이터 및 참조 레벨을 가지는 적응형 수신기로 12-m 케이블 (22-dB 채널 로스) 을 통해서 보낸 결과 최소 비트 에러율 108 을 달성하였고, 비트 에러율 105 에서는 아이 마진이 0.15 UI x 50 mV 보다 크게 측정되었다. 송수신기를 합친 전력 소모는 65.2 mW (PLL 제외) 이고, 성과의 대표수치는 0.37 pJ/b/dB 를 보여주었다. 첫번째 프로토타입 설계을 포함하여 개선된 두번째 프로토타입 설계에서는, 12-Gb/s 4레벨 펄스 진폭 변조 정방향 채널 신호와 125-Mb/s 2레벨 펄스 진폭 변조 역방향 채널 신호를 탑재한 비대칭 동시 양방향 송수신기에 대해 기술되고 검증되었다. 제안된 넓은 선형 범위를 가지는 하이브리드는 gmC 저대역 통과 필터와 에코 제거기와 함께 아웃바운드 신호를 24 dB 이상 효율적으로 감소시켰다. 또한, 넓은 선형 범위를 가지는 하이브리드와 함께 게인 감소기를 형성하게 되는 선형 범위 증폭기를 통해 4레벨 펄스 진폭 변조 신호의 선형성과 진폭의 트레이드 오프 관계를 깨는 것이 가능하였다. 동시 양방향 송수신기 칩은 40 나노미터 상호보완형 메탈 산화 반도체 공정으로 제작되었다. 상기 설계 기술들을 이용하여, 4레벨 펄스 진폭 변조 및 2레벨 펄스 진폭 변조 송수신기 모두 5m 채널 (채널 로스 15.9 dB) 에서 1E-12 보다 낮은 비트 에러율을 달성하였고, 총 78.4 mW 의 전력 소모를 기록하였다. 종합적인 송수신기는 성과 대표지표로 0.41 pJ/b/dB 와 함께 동시 양방향 통신 아래에서 4레벨 펄스 진폭 변조 신호 및 2레벨 펄스 진폭 변조 신호 각각에서 아이 마진 0.15 UI 와 0.57 UI 를 달성하였다. 이 수치는 성과 대표지표 0.5 이하를 가지는 기존 동시 양방향 송수신기와의 비교에서 최고의 아이 마진을 기록하였다.In this dissertation, design techniques of a highly asymmetric simultaneous bidirectional (SB) transceivers with high-speed PAM-4 and low-speed PAM-2 signals are proposed and demonstrated for the next-generation automotive camera link. In a first prototype design, a PAM-4 transmitter with 10B6Q DC balance code and a PAM-4 adaptive receiver with fixed data and threshold levels (dtLevs) are presented. In PAM-4 transmitter, an area- and power-efficient 10B6Q code for an AC coupled link system that guarantees DC balance and limited run length of six is proposed. Although the input data width of 10 bits is used here, the proposed scheme has an extensibility for the input data width to cover various data types of the camera. On the other hand, in the PAM-4 adaptive receiver, to optimally cancel the sampler offset for a lower BER, instead of adjusting dtLevs, the gain of a programmable gain amplifier is adjusted adaptively under fixed dtLevs. The prototype chips including above proposed 10B6Q code and fixed dtLevs are fabricated in 40-nm CMOS technology and tested in chip-on-board assembly. The 10B6Q code only occupies an active area of 0.0009 mm2 with a synthesized gate count of 645. It also consumes 0.23 mW at the operating clock frequency of 667 MHz. The transmitter with 10B6Q code delivers 8-Gb/s PAM-4 signal to the adaptive receiver using fixed dtLevs through a lossy 12-m cable (22-dB channel loss) with a BER of 1E-8, and the eye margin larger than 0.15 UI x 50 mV is measured for a BER of 1E-5. The proto-type chips consume 65.2 mW (excluding PLL), exhibiting an FoM of 0.37 pJ/b/dB. In a second prototype design advanced from the first prototypes, An asymmetric SB transceivers incorporating a 12-Gb/s PAM-4 forward channel and a 125-Mb/s PAM-2 back channel are presented and demonstrated. The proposed wide linear range (WLR) hybrid combined with a gmC low-pass filter and an echo canceller effectively suppresses the outbound signals by more than 24dB. In addition, linear range enhancer which forms a gain attenuator with WLR hybrid breaks the trade-off between the linearity and the amplitude of the PAM-4 signal. The SB transceiver chips are separately fabricated in 40-nm CMOS technology. Using above design techniques, both PAM-4 and PAM-2 SB transceivers achieve BER less than 1E-12 over a 5-m channel (15.9 dB channel loss), consuming 78.4 mW. The overall transceivers achieve an FoM of 0.41 pJ/b/dB and eye margin (at BER of 1E-12) of 0.15 UI and 0.57 UI for the forward PAM-4 and back PAM-2 signals, respectively, under SB communication. This is the best eye margin compared to the prior art SB transceivers with an FoM less than 0.5.CHAPTER 1 INTRODUCTION 1 1.1 MOTIVATION 1 1.2 DISSERTATION ORGANIZATION 4 CHAPTER 2 BACKGROUND ON AUTOMOTIVE CAMERA LINK 6 2.1 OVERVIEW 6 2.2 SYSTEM REQUIREMENTS 10 2.2.1 CHANNEL 10 2.2.2 POWER OVER DIFFERENTIAL LINE (PODL) 12 2.2.3 AC COUPLING AND DC BALANCE CODE 15 2.2.4 SIMULTANEOUS BIDIRECTIONAL COMMUNICATION 18 2.2.4.1 HYBRID 18 2.2.4.2 ECHO CANCELLER 20 2.2.5 ADAPTIVE RECEIVE EQUALIZATION 22 CHAPTER 3 AREA AND POWER EFFICIENT 10B6Q ENCODER FOR DC BALANCE 25 3.1 INTRODUCTION 25 3.2 PRIOR WORKS 28 3.3 PROPOSED AREA- AND POWER-EFFICIENT 10B6Q PAM-4 CODER 30 3.4 DESIGN OF THE 10B6Q CODE 33 3.4.1 PAM-4 DC BALANCE 35 3.4.2 PAM-4 TRANSITION DENSITY 35 3.4.3 10B6Q DECODER 37 3.5 IMPLEMENTATION AND MEASUREMENT RESULTS 40 CHAPTER 4 PAM-4 TRANSMITTER AND ADAPTIVE RECEIVER WITH FIXED DATA AND THRESHOLD LEVELS 45 4.1 INTRODUCTION 45 4.2 PRIOR WORKS 47 4.3 ARCHITECTURE AND IMPLEMENTATION 49 4.2.1 PAM-4 TRANSMITTER 49 4.2.2 PAM-4 ADAPTIVE RECEIVER 52 4.3 MEASUREMENT RESULTS 62 CHAPTER 5 ASYMMETRIC SIMULTANEOUS BIDIRECTIONAL TRANSCEIVERS USING WIDE LINEAR RANGE HYBRID 68 5.1 INTRODUCTION 68 5.2 PRIOR WORKS 70 5.3 WIDE LINEAR RANGE (WLR) HYBRID 75 5.3 IMPLEMENTATION 78 5.3.1 SERIALIZER (SER) DESIGN 78 5.3.2 DESERIALIZER (DES) DESIGN 79 5.4 HALF CIRCUIT ANALYSIS OF WLR HYBRID AND LRE 82 5.5 MEASUREMENT RESULTS 88 CHAPTER 6 CONCLUSION 97 BIBLIOGRAPHY 99 초 록 106박

    Propuesta De Diseño De Red De Datos Para La Empresa Bata En El Distrito De Miraflores

    Get PDF
    El proyecto tiene como objetivo diseñar un “Modelo de Red de Datos” como apoyo a las dependencias administrativas de la Empresa BATA, y la necesidad de aplicar políticas de seguridad y administración a todos los usuarios de la red LAN, lo cual resulta una tarea compleja en la tecnología actual pero se puede resolver aplicando diversas tecnologías y equipos de red ideales para el diseño que se quiere lograr, el presente modelo de red se propone para cumplir con los requerimientos de la Empresa en cuanto a Costo y Fidelidad. En la actualidad la necesidad de las empresas de contar con un diseño de Red confiable, seguro y eficiente para la transmisión de datos es un tema de mucha importancia debido a que las empresas requieren la interconectividad de todos sus dispositivos de red dentro de un determinado lugar y también al exterior a través de Internet, teniendo más facilidades y beneficios para la empresa. La estructura que hemos seguido en este proyecto se compone de 3 capítulos. El Primer Capítulo comprende el Planteamiento del Problema, el Segundo Capítulo el Desarrollo del marco teórico y el tercer capítulo corresponde al desarrollo del Proyecto.Trabajo de suficiencia profesiona

    Diseño De Red De Comunicación De Datos Para La Institución Educativa Privada Emilio Soyer Cabero Ubicado En El Distrito De Chorrillos, Lima, Perú

    Get PDF
    El presente trabajo de investigación lleva por título “DISEÑO DE RED DE COMUNICACIÓN DE DATOS PARA LA INSTITUCIÓN EDUCATIVA PRIVADA EMILIO SOYER CABERO UBICADA EN EL DISTRITO DE CHORRILLOS, LIMA, PERÚ”, para optar el título de Ingeniero Electrónico y Telecomunicaciones, presentado por el alumno Jhaset Raúl Ortega Cubas. En primer lugar se aborda la realidad problemática observada relacionada con la importancia y necesidad de diseñar una Red de Comunicación de Datos con el fin de dotar a la Institución Educativa Privada Emilio Soyer Cabero de un sistema de transmisión de información mediante la comunicación de todos los dispositivos de red que ésta maneje para ventaja de los trabajadores, docentes y alumnos. La estructura que hemos seguido en este proyecto se compone de 3 capítulos. El primer capítulo comprende el planteamiento del problema, el segundo capítulo el desarrollo del marco teórico y el tercer capítulo corresponde al desarrollo del diseño

    Rediseño de la red de datos y optimización de la seguridad perimetral para el Gobierno Autónomo Descentralizado Municipal de San Miguel de Urcuquí.

    Get PDF
    Mejorar la red de datos y optimizar la seguridad perimetral del Gobierno Autónomo Descentralizado Municipal de San Miguel de Urcuquí, mediante un análisis de los problemas existentes en la red, logrando así mejorar su desempeño y seguridad de la información.El presente trabajo de titulación consiste en el rediseño de la red de datos y optimización de la seguridad perimetral en el ¿Gobierno Autónomo Descentralizado Municipal de San Miguel de Urcuquí¿ (GADMU) este permite mejorar el desempeño mediante la aplicación de un modelo jerárquico basado en el estudio por capas y la microsegmentación a nivel lógico de la red. Se comenzó con la recopilación de la información en base a aspectos relacionados a redes como: medios de transmisión, topologías de red, modelos de referencia, direccionamiento IP y tipo de vulnerabilidades, conjuntamente se obtuvo información sobre infraestructura del edificio principal (GADMU), sobre el cableado horizontal, cableado vertical, cuarto de telecomunicaciones, áreas de trabajo, puesta a tierra con la finalidad de determinar el estado de la red. Luego se planteó la utilización de un modelo jerárquico basado en dos capas: acceso y núcleo colapsado con el cual se estructura la nueva red, cada capa con las configuraciones respectivas para solucionar problemas en aspectos de: dominios de broadcast, fallos de enlace físicos, control de tráfico entre departamentos, logrando mejorar el rendimiento, flexibilidad y facilitando la administración. Para la parte lógica se hizo la microsegmentación se basa en: funciones de cada departamento, recursos que comparten los usuarios y se utilizó VLSM basado en la cantidad de usuarios, con lo cual se pretende mejorar la administración de la red. Para prolongar con la continuidad del servicio de red se utilizó dos equipos para tener redundancia y permite estar disponible en caso de tener fallas el enlace físicos o equipos de red. Para verificar su funcionamiento se realiza las simulaciones respectivas en GNS3 con el cual se pretende validar las configuraciones realizadas demostrando su operatividad. Se realizó un análisis de riesgos y vulnerabilidades mediante la metodología Margerit conjuntamente con la elección de equipo seguridad perimetral comparando JUNIPER y CISCO y determinando la mejor opción para su implementación. Mediante la norma ISO/IEC/IEEE 29148 se determina el sistema operativo para los servidores FTP y PROXY SQUID. Para determinar si el proyecto es factible se realiza un análisis costo/beneficio.Ingenierí

    Development, Characterization, and Analysis of Silicon Microstrip Detector Modules for the CBM Silicon Tracking System

    Get PDF
    The future Facility for Antiproton and Ion Research (FAIR) at GSI, Germany, will enable scientists to create tiny droplets of cosmic matter in the laboratory—matter subject to extreme conditions usually found in the interior of stars or during stellar collisions. The Compressed Baryonic Matter (CBM) experiment at FAIR aims to explore the quantum chromodynamics (QCD) phase diagram at high densities and moderate temperatures. By colliding heavy ions at relativistic beam energies, the conditions inside these supermassive objects can be recreated for an exceptionally short amount of time. The CBM detector is a fixed-target multi-purpose detector designed for measuring hadrons, electrons and muons in elementary nucleon and heavy-ion collisions over the full FAIR beam energy range delivered by the SIS100 synchrotron. One of the core detectors of CBM is the Silicon Tracking System (STS), responsible for measuring the momentum and tracks of up to 700 charged particles produced in a central nucleus-nucleus collisions. Due to the required momentum resolution, the material budget of the STS must be minimized. Therefore, the readout electronics and the cooling and mechanical infrastructure are placed out of the detector acceptance. The double-sided silicon microstrip sensors are connected to the self-triggering frontend electronics using low-mass flexible microcables with a length of up to 50 cm. The main goal of this thesis was to develop a high-density interconnection technology based on copper microcables. We developed a low-mass double-layered copper microcable at the edge of modern fabrication technology. Based on the copper microcable, we developed a novel high-density interconnection technology, comprising fine-grain solder paste printing on the microcable and gold stud bumping on the die. The gold stud--solder technology combines a high automation capability with good mechanical and electrical properties, making it an interesting technology also for future detector systems. Building on the gold stud--solder technology, a fully customized bonder machine was developed and constructed in hardware and software. Its main purpose is the realization of the challenging interconnection between the microcable and the sensor. Key components of the machine are four step motors with a sub-micron step resolution, a dual-camera pattern recognition system, a heatable, temperature-controlled bond head and sensor plate, as well as tailor-made mechanical supports for the STS detector modules. With the help of this bonder machine, a full-scale STS detector module in the copper technology was built. The noise performance of the copper module was evaluated in a bias voltage scan. Very low noise levels were observed. Measurements of the absolute value of the signal with a radioactive source allowed us to estimate the signal-to-noise ratio of the module. The results of these measurements give us confidence that STS modules based on the copper technology can achieve a satisfying performance comparable to the modules built in the aluminium technology. Another essential component of the STS detector module is the frontend electronics chip. During this work, the version 2.1 of the STS-XYTER readout ASIC was extensively characterized. Noise discrepancies between odd and even channels and increasingly higher noise towards the higher channel numbers had been observed in the predecessor chip. Our measurements of the STS-XYTER2.1 verified that both issues were successfully resolved. Furthermore, the noise behavior of the ASIC with respect to input load capacitance was studied. This is essential to parametrize expected noise levels for the many kinds of detector modules employed in the STS, to which the measured noise levels can then be compared. Measurements of the noise levels as a function of shaping time showed that the overall noise level is practically independent of shaper peaking time. Radiation tests with 50 MeV protons were performed with copper microcables connected to the ASIC in a non-powered state. No indications of damage to the chip and interconnects could be observed. Finally, a complete STS detector module in aluminium technology was subjected to a pencil-like monochromatic beam of 2.7 GeV/c protons at the Cooling Synchrotron at the research center Jülich. Several essential performance criteria of the detector module were evaluated. The best coincidence between the STS and the reference fiber hodoscopes was established based on time information. An excellent time resolution of a few nanoseconds could be demonstrated. Based on the best coincidence, the spatial resolution of the full system was determined to be a few hundred microns. This is in line with expectations, as the resolution is limited by the fiber hodoscope resolution. Charge distributions of 1-strip clusters showed a clear separation between the noise and the proton signal peak, with a signal-to-noise ratio above 20 for the p-- and n-side. The charge collection efficiency of the module was estimated to be 96%96 \%. The COSY beamtime enabled a first-time evaluation of the full analysis software chain with real data and the evaluation of the full electronic readout chain of STS. The experience gained at COSY is immensely helpful for commissioning and data analysis in more complex beam environments such as mCBM, where a subsample of the CBM detectors is exposed to the particles created in a heavy-ion collision in run-time scenarios closely resembling the final CBM environment

    An investigation into computer and network curricula

    Get PDF
    This thesis consists of a series of internationally published, peer reviewed, journal and conference research papers that analyse the educational and training needs of undergraduate Information Technology (IT) students within the area of Computer and Network Technology (CNT) Education. Research by Maj et al has found that accredited computing science curricula can fail to meet the expectations of employers in the field of CNT: “It was found that none of these students could perform first line maintenance on a Personal Computer (PC) to a professional standard with due regard to safety, both to themselves and the equipment. Neither could they install communication cards, cables and network operating system or manage a population of networked PCs to an acceptable commercial standard without further extensive training. It is noteworthy that none of the students interviewed had ever opened a PC. It is significant that all those interviewed for this study had successfully completed all the units on computer architecture and communication engineering (Maj, Robbins, Shaw, & Duley, 1998). The students\u27 curricula at that time lacked units in which they gained hands-on experience in modern PC hardware or networking skills. This was despite the fact that their computing science course was level one accredited, the highest accreditation level offered by the Australian Computer Society (ACS). The results of the initial survey in Western Australia led to the introduction of two new units within the Computing Science Degree at Edith Cowan University (ECU), Computer Installation & Maintenance (CIM) and Network Installation & Maintenance (NIM) (Maj, Fetherston, Charlesworth, & Robbins, 1998). Uniquely within an Australian university context these new syllabi require students to work on real equipment. Such experience excludes digital circuit investigation, which is still a recommended approach by the Association for Computing Machinery (ACM) for computer architecture units (ACM, 2001, p.97). Instead, the CIM unit employs a top-down approach based initially upon students\u27 everyday experiences, which is more in accordance with constructivist educational theory and practice. These papers propose an alternate model of IT education that helps to accommodate the educational and vocational needs of IT students in the context of continual rapid changes and developments in technology. The ACM have recognised the need for variation noting that: There are many effective ways to organize a curriculum even for a particular set of goals and objectives (Tucker et al., 1991, p.70). A possible major contribution to new knowledge of these papers relates to how high level abstract bandwidth (B-Node) models may contribute to the understanding of why and how computer and networking technology systems have developed over time. Because these models are de-coupled from the underlying technology, which is subject to rapid change, these models may help to future-proof student knowledge and understanding of the ongoing and future development of computer and networking systems. The de-coupling is achieved through abstraction based upon bandwidth or throughput rather than the specific implementation of the underlying technologies. One of the underlying problems is that computing systems tend to change faster than the ability of most educational institutions to respond. Abstraction and the use of B-Node models could help educational models to more quickly respond to changes in the field, and can also help to introduce an element of future-proofing in the education of IT students. The importance of abstraction has been noted by the ACM who state that: Levels of Abstraction: the nature and use of abstraction in computing; the use of abstraction in managing complexity, structuring systems, hiding details, and capturing recurring patterns; the ability to represent an entity or system by abstractions having different levels of detail and specificity (ACM, 1991b). Bloom et al note the importance of abstraction, listing under a heading of: “Knowledge of the universals and abstractions in a field” the objective: Knowledge of the major schemes and patterns by which phenomena and ideas arc organized. These are large structures, theories, and generalizations which dominate a subject or field or problems. These are the highest levels of abstraction and complexity\u27\u27 (Bloom, Engelhart, Furst, Hill, & Krathwohl, 1956, p. 203). Abstractions can be applied to computer and networking technology to help provide students with common fundamental concepts regardless of the particular underlying technological implementation to help avoid the rapid redundancy of a detailed knowledge of modem computer and networking technology implementation and hands-on skills acquisition. Again the ACM note that: “Enduring computing concepts include ideas that transcend any specific vendor, package or skill set... While skills are fleeting, fundamental concepts are enduring and provide long lasting benefits to students, critically important in a rapidly changing discipline (ACM, 2001, p.70) These abstractions can also be reinforced by experiential learning to commercial practices. In this context, the other possibly major contribution of new knowledge provided by this thesis is an efficient, scalable and flexible model for assessing hands-on skills and understanding of IT students. This is a form of Competency-Based Assessment (CBA), which has been successfully tested as part of this research and subsequently implemented at ECU. This is the first time within this field that this specific type of research has been undertaken within the university sector within Australia. Hands-on experience and understanding can become outdated hence the need for future proofing provided via B-Nodes models. The three major research questions of this study are: •Is it possible to develop a new, high level abstraction model for use in CNT education? •Is it possible to have CNT curricula that are more directly relevant to both student and employer expectations without suffering from rapid obsolescence? •Can WI effective, efficient and meaningful assessment be undertaken to test students\u27 hands-on skills and understandings? The ACM Special Interest Group on Data Communication (SJGCOMM) workshop report on Computer Networking, Curriculum Designs and Educational Challenges, note a list of teaching approaches: ... the more \u27hands-on\u27 laboratory approach versus the more traditional in-class lecture-based approach; the bottom-up approach towards subject matter verus the top-down approach (Kurose, Leibeherr, Ostermann, & Ott-Boisseau, 2002, para 1). Bandwidth considerations are approached from the PC hardware level and at each of the seven layers of the International Standards Organisation (ISO) Open Systems Interconnection (OSI) reference model. It is believed that this research is of significance to computing education. However, further research is needed
    corecore