116 research outputs found

    Quantum packet for the next generation network/ISDN3

    Full text link

    Space station data system analysis/architecture study. Task 2: Options development, DR-5. Volume 3: Programmatic options

    Get PDF
    Task 2 in the Space Station Data System (SSDS) Analysis/Architecture Study is the development of an information base that will support the conduct of trade studies and provide sufficient data to make design/programmatic decisions. This volume identifies the preferred options in the programmatic category and characterizes these options with respect to performance attributes, constraints, costs, and risks. The programmatic category includes methods used to administrate/manage the development, operation and maintenance of the SSDS. The specific areas discussed include standardization/commonality; systems management; and systems development, including hardware procurement, software development and system integration, test and verification

    Characterization of wavelength tunable lasers for use in wavelength packet switched networks

    Get PDF
    The telecom industry's greatest challenge, and the optical systems and components vendors' biggest opportunity is enabling providers to expand their data services. The solution lies in making optical networks more responsive to customer needs, i.e., making them more rapidly adaptable. One possible technique to achieve this is to employ wavelength tunable optical transmitters. The importance of tunability grows greater every year, as the average number of channels deployed on DWDM platforms increases. By deploying tunable lasers it is much easier to facilitate forecasting, planning and last minute changes in the network. This technology provides with solution for inventory reduction. It also offers solution for fast switching at packet level. The conducted research activities of the project was divided in two work packages: 1. Full static characterization-the laser used in the experiment was a butterfly-packaged Sampled Grating DBR laser with four electrically tunable sections. LabView programme was developed for distant control of the equipment and the laser itself. The parameters required for creating a look-up table with the exact currents for the four sections of the laser, namely wavelength, side mode suppression ratio and output power, were transferred to tables. Based on those tables the currents were defined for each of the 96 different accessible channels. The channel allocation is based on the 50 GHz spacing grid. A detailed analysis of the tuning mechanisms is provided. 2. Dynamic characterization and BER performance in wavelength packet switched WDM systems-a commercially available module was used supplied with the software package for controlling the wavelength channels and setting the laser to switch between any accessible channel. The laser is DBR laser without SOA integration so the dynamic tunability can be investigated. As the switching in the nanosecond regime is executed in the electrical domain, analysis of the switching parameters concerning the electrical circuit as well as laser structure is provided. The actual switching time was defined. The degradation in system performance due to spurious wavelength signals emitted from the tunable module during the switching event and their interference with other active channels was demonstrated by examining the presence of an error floor in the BER rate against received power measurements

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    A Modular Approach to Adaptive Reactive Streaming Systems

    Get PDF
    The latest generations of FPGA devices offer large resource counts that provide the headroom to implement large-scale and complex systems. However, there are increasing challenges for the designer, not just because of pure size and complexity, but also in harnessing effectively the flexibility and programmability of the FPGA. A central issue is the need to integrate modules from diverse sources to promote modular design and reuse. Further, the capability to perform dynamic partial reconfiguration (DPR) of FPGA devices means that implemented systems can be made reconfigurable, allowing components to be changed during operation. However, use of DPR typically requires low-level planning of the system implementation, adding to the design challenge. This dissertation presents ReShape: a high-level approach for designing systems by interconnecting modules, which gives a ‘plug and play’ look and feel to the designer, is supported by tools that carry out implementation and verification functions, and is carried through to support system reconfiguration during operation. The emphasis is on the inter-module connections and abstracting the communication patterns that are typical between modules – for example, the streaming of data that is common in many FPGA-based systems, or the reading and writing of data to and from memory modules. ShapeUp is also presented as the static precursor to ReShape. In both, the details of wiring and signaling are hidden from view, via metadata associated with individual modules. ReShape allows system reconfiguration at the module level, by supporting type checking of replacement modules and by managing the overall system implementation, via metadata associated with its FPGA floorplan. The methodology and tools have been implemented in a prototype for a broad domain-specific setting – networking systems – and have been validated on real telecommunications design projects

    Adaptation of the IEEE 802.11 protocol for inter-satellite links in LEO satellite networks

    Get PDF
    Knowledge of the coefficient of thermal expansion (CTE) of a ceramic material is important in many application areas. Whilst the CTE can be measured, it would be useful to be able to predict the expansion behaviour of multiphase materials.. There are several models for the CTE, however, most require a knowledge of the elastic properties of the constituent phases and do not take account ofthe microstructural features of the material. If the CTE could be predicted on the basis of microstructural information, this would then lead to the ability to engineer the microstructure of multiphase ceramic materials to produce acceptable thermal expansion behaviour. To investigate this possibility, magnesia-magnesium aluminate sp~el (MMAS) composites, consisting of a magnesia matrix and magnesium aluminate s~ne'l (MAS) particles, were studied. Having determined a procedure to produce MAS fr alumina and magnesia, via solid state sintering, magnesia-rich compositions wit ~ various magnesia contents were prepared to make the MMAS composites. Further, the l\.1MAS composites prepared from different powders (i.e. from an alumina-magnesia mixture ahd from a magnesia-spinel powder) were compared. Com starch was added into the powder mixtures before sintering to make porous microstructures. Microstructural development and thermal expansion behaviour ofthe MMAS composites were investigated. Microstructures of the MAS and the MMAS composites as well as their porous bodies were quaritified from backscattered electron micrographs in terms of the connectivity of solids i.e. solid contiguity by means of linear intercept counting. Solid contiguity decreased with increasing pore content and varied with pore size, pore shape and pore distribution whereas the phase contiguity depended strongly on the chemical composition and was less influenced by porosity. ' The thermal expansion behaviour of the MAS and the MMAS composites between 100 and 1000 °C was determined experimentally. Variation in the CTE ofthe MAS relates to the degree of spinel formation while the thermal expansion of the MMAS composites depends strongly on phase content. However, the MMAS composites with similar phase compositions but made from different manufacturing processes showed differences in microstructural features and thermal expansion behaviour. Predictions of the CTE values for composites based on a simple rule-of-mixtures (ROM) using volume fraction were compared with the measured data. A conventional ROM accurately predicted the effective CTE of a range of dense alumina-silicon carbide particulate composites but was not very accurate for porous multiphase structures. It provided an upper bound prediction as all experimental values were lower. Hence, the conventional ROM was modified to take account of quantitative microstructural parameters obtained from solid contiguity. The modified ROM predicted lower values and gave a good agreement with the experimental data. Thus, it has been shown that quantitative microstructural information can be used to predict the CTE of multiphase ceramic materials with complex microstructures.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Telecommunications Networks

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    ATM optical wireless networks

    Get PDF
    The aim of the research is to propose, design and evaluate a new wireless communication, local area network (LAN). Such a LAN will be able to extend the asynchronous transfer mode (ATM) wireline technology into indoor optical wireless networks
    • …
    corecore