Statistical Multiplexing of Video Sources for Packet Switching Networks

Total Page:16

File Type:pdf, Size:1020Kb

Statistical Multiplexing of Video Sources for Packet Switching Networks New Jersey Institute of Technology Digital Commons @ NJIT Theses Electronic Theses and Dissertations Spring 5-31-1989 Statistical multiplexing of video sources for packet switching networks Krishna Kancherla New Jersey Institute of Technology Follow this and additional works at: https://digitalcommons.njit.edu/theses Part of the Electrical and Electronics Commons Recommended Citation Kancherla, Krishna, "Statistical multiplexing of video sources for packet switching networks" (1989). Theses. 1368. https://digitalcommons.njit.edu/theses/1368 This Thesis is brought to you for free and open access by the Electronic Theses and Dissertations at Digital Commons @ NJIT. It has been accepted for inclusion in Theses by an authorized administrator of Digital Commons @ NJIT. For more information, please contact [email protected]. Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment of the order would involve violation of copyright law. Please Note: The author retains the copyright while the New Jersey Institute of Technology reserves the right to distribute this thesis or dissertation Printing note: If you do not wish to print this page, then select “Pages from: first page # to: last page #” on the print dialog screen The Van Houten library has removed some of the personal information and all signatures from the approval page and biographical sketches of theses and dissertations in order to protect the identity of NJIT graduates and faculty. ABSTRACT tl f h Stttl Mltplxn f d Sr r t Sthn tr Krhn Knhrl Mtr f Sn n Eltrl Ennrn 199 h rtd b r Cntntn Mnpl At rfr Cntn ntr r ft vlvn trd trl ntrtd ntr hn- dln ll tp f trff h pl ntrtd thn thnl fr v vd nd dt Stttl r nhrn t dvn ltplxn f fll - tn vd r n ntl tp trd ptzd vd ntr h n l t tlz th n ntn hnnl ffntl tht ln lt t th rvr h r d th npt f n tttl lt- plxn fr pt vd ntn h tpl f nl ntrnl pt ntr t pprt ISDN rv h bn dptdf Sltn hv bn r- rd t t dntrt th tttl thn fft f ptzd vd n th ntr hvn hh pd ln lt ndt tht th hnnl rt pr r drd n n xpnntl nnr th nbr f r nrd An xprn fr th vr t t f th hnnl h bn drvd n tr f hnnl rt pr r nd th nbr f r ltplxd Al th vr t f th hnnl hhr fr bffrd dt thn tht f th ltplxd dt h hh pd ntn ln n th ntrnl ntr r lhtl ldd hh ndt tht th ln n dt r dt STATISTICAL MULTIPLEXING OF VIDEO SOURCES FOR PACKET SWITCHING NETWORKS b Krhn Knhrl h bttd t th lt f Grdt Shl f th r Inttt f hnl n prtl flfllnt f th rrnt fr th dr f Mtr f Sn n Eltrl Ennrn 199 AOA SEE tl f h Stttl Mltplxn f d Sr r t Sthn tr f Cnddt Krhn Knhrl Mtr f Sn n Eltrl Ennrn 199 h Abtrt Apprvd b th Exnn Ctt r Cntntn Mnpl Advr t At rfr prtnt f Eltrl nd Cptr Ennr rn Anr t Atnt rfr prtnt f Eltrl nd Cptr Ennrn r Irvn W t Atnt rfr prtnt f Eltrl nd Cptr Ennrn r Inttt f hnl r r IA Krhn Knhrl rnt ddr r nd dt t b nfrrd MSEE 199 t f brth l f brth Sndr Edtn K Wn Cll Ind 191 Cllt ntttn ttndd t r t f r Andhr Unvrt 191-5 SEE 195 r Inttt f hnl 197-9 MSEE 199 Mjr Eltrl Ennrn tn hld Grdt Atnt nr rr I Anldnt I h t xpr nr thn t r Cntntn Mnpl fr h vlbl dn nd nrnt thrht th r f th th I pll ndbtd t h fr h nhtfl nd ntrtv rt t vr t f th th tht hh th th ld nvr hv bn pltd I l xpr thn t r Irvn Wn nd r rn Anr h rvd n th th tt nd d pprprt tn I l xpr nr thn t Mr dh nn fr h hlpfl dn f tr 115 ltn p t vr t f th r t bt nt th lt I ld l t thn ll th h hv hlpd n n r th thr drn th ntr r f th th Chptr 1 Intrdtn 1 Chptr 2 2. t Sthn tr 1 Intrdtn Attrtv tr f t Sthn 5 3 Stttl Mltplxn 31 Intrdtn 7 3 Stttl Mltplxn prd th M nd M f 1 33 Un n Mltpl Chnnl 13 tr Arhttr 1 5 Cnln 19 Chptr 3 t d Cntn 31 Intrdtn 3 Mdln nd Anl Aptn 3 33 Sr Mdl 331 Mdl A Cntn-Stt rt- Mrv Mdl 33 Qn Sltn Un Mdl A 9 333 Mdl rt-Stt Cntn- Mrv r 3 33 Qn Anl Un Mdl 37 3 Cnln Chptr 4 Sltn Mdl 1 St Chrtrt 1 Sltn lt 3 Cnln 5 Chptr 5Cnln 59 Appndx 1 blrph 66 t f r 1 Stttl Mltplxn 9 rnn Spd l 11 3 r f t t 15 tr Arhttr 17 31 Stttl Mltplxr f Sr 3 t rt htr 7 33 n Spln & Qntztn f Sr rt 31 3 Stt rntn r - Mdl 33 35 Mnr Mdl 3 1 Sltn Mdl % Utlztn f h Spd Chnl 5 3 Chnl rt/r f Sr 3b λ(n f Sr 47 3 Chnl rt/r drvd fr (7 Avr U f h Spd Chnl f Sr 5 b λ(n-t f Sr 51 5 Chnl rt/r f Sr Mbt bffr 53 5b Chnl rt/r f Sr 39Mbt bffr 5 Avr U f Chnnl th tht bffr 55 t f bl bl 1 % Utlztn f ln n th tr 5 bl % Utlztn f t Sth n th tr 57 Chptr Intrdtn h nrn pplrt f pt thn t hndl dt v nd vd ntrtd rv h rltd n rt nrn fr hh ntr ntn lv- l nd pt l d t bffr dl A vd xptd t b jr trff pnnt n Intrtd Srv tl tr (IS t vr prtnt t trnt f ntnt lt th vrbl trnn rt h pt hv bn d pbl b th nrn f ptl fbr ln nd th dvlpnt f hhl phttd SI ntn dv t r bnddth b vlbl d t th f ptl fbr ln r rv r dnd t th p d ldn th ntn ln thd brd-bnd rv p lr ld n th th; th f rt nrn f th thn n ntr f ftr ll n ntrtd flxbl thnl h ft pt thn fr v vd nd dt l h hh trff ntn xptd n th ntxt f ntr rvn lr nbr 1 f dntl ndpndnt tttl r h r d th npt f n tttl ltplxn fr pt thn ntr t pprt IS rv prtlrl fr vd r S- ltn td h bn dn t td th ntr prfrn ndr nrn ld ndtn Al th trnn ffn f th hh pd ln h bn tdd th nbr f r nr t thn f vrbl bt-rt rl-t vd r n fr th ffnt hrn f ntn r hl ntnn nfr ptr lt rbl bt-rt vd dn xhbt th tp f tttl vrtn tht d pt thn ttrtv fr brt trff Advnt f pt thn vr nvntnl rt thn nd th trnn ffn f pt thn d t tttl ltplxn fr vd ntn r x- plnd n dtl n hptr II Al ntr rhttr tht pprt ntrtd rv n hh pd trnn ln nd hh prfrn pt th h bn drbd Chptr III xpln t prfrn dl f tttl ltplxn n pt vd ntn h dn bt rt f nl vd r fntn f t bd n xprntl dt [1] f vd tlphn rrltd Mrv pr dl (n n drt t nd n n ntn t r xplnd t ft th xprntl dt tht r d t dl th npt rt f vrl ndpndnt vd r nt tttl ltplxr h dl f vrbl bt rt r drvd fr hptr III r d fr 2 r ltn prp h ltn dlth bt rt dt nd th ntr ndr ndrtn r xplnd n dtl n hptr I nd fnll th rlt r prntd Or rlt h tht th nbr f r nr fr 1 t 1 t th tttl ltplxr th hnnl rt pr r drd xpnntll fr 75 Mbt pr nd t 19 Mbt pr nd hl ntnn th hnnl tlztn t 5% An pprxt xprn fr th vr t t h bn drvd n tr f hnnl rt pr r λ(n nd th nbr f r ltplxd n Al t h bn ntd tht th vr t drd th nbr f r ltplxd nrd r th dt rt hv t bffr f z Mbt t t th vlnt fft t tttl ltplxn h bffrn fft h bn fnd t b nlbl th nbr f r nr bnd 5 h vr t f th hnnl hhr fr th bffrd dt thn tht f th ltplxd dt h ln nd th pt th f th ntrnl pt ntr r lhtl ldd vn fr lr nbr f r ndtn tht th prfrn d 3 Chptr 2 t Sthn tr 2.
Recommended publications
  • Vision-Based Mobile Free-Space Optical Communications Kyle Cavorley, Wayne Chang, Jonathan Giordano, Taichi Hirao Advisor: Prof
    Vision-Based Mobile Free-Space Optical Communications Kyle Cavorley, Wayne Chang, Jonathan Giordano, Taichi Hirao Advisor: Prof. Daut Abstract Methodology The implementation of a free-space optical (FSO) communication system capable of interfacing with moving receivers such as unmanned ground or aerial vehicles. Two way communication Inexpensive laser diodes are used to transmit data at rates of up to 1 Mbps. A computer vision and tracking system controls a pan-tilt platform for target Transmit side Receive side acquisition and tracking. Complex package components, suchs as a laser driver and photo receiver, are avoided when possible to study the design of low-level system components. A two way communication system is made possible utilizing a reflective optical chopper (ROC) at the receiver end. Motivations and Objectives Motivations: -High power efficiency with high throughput Fig. 2: Photodiode Amplifier and Comparator Circuit. Fig. 4: Laser Diode Driver Circuit. -Increased security Objectives: -Construct optical communication link capable of 1 Mbps at thirty feet range -Form and maintain two way optical communication channel -Build computer vision tracking system and platform Fig. 6: Boston Micromachines Reflective Optical Chopper (ROC); used in two-way communication Fig. 3: Output Response of photodiode Fig. 5: Schmitt Trigger Circuit. Only one end of the communication link amplifier/comparator. requires a visual tracking/laser targeting system. Results ❑ 2 Mhz signal successfully transmitted 14 feet using 5 mW 670 nm laser. ❑ AD8030 Op-amp used to amplify photodiode response signal from a range [60 mV, 1 V] to 5V before entering comparator that generates a TTL output. Fig. 1: Vision Based FSO Communication Block Diagram.
    [Show full text]
  • Unit 7: Choosing Communication Channels
    UNIT 7: CHOOSING COMMUNICATION CHANNELS Unit 7 highlights the importance of selecting an appropriate channel mix for a communication response and describes five categories of communication channels: mass media, mid media, print media, social and digital media and interpersonal communication (IPC). For each of these channels, advantages and disadvantages have been listed, as well as situations in which different channels may be used. Although this Unit has attempted to differentiate the channels and their uses for simplicity, there is recognition that channels frequently overlap and may be effective for achieving similar objectives. This is why the match between channel, audience and communication objective is important. This unit provides some tools to help assess available and functioning channels during an emergency, as well as those that are more appropriate for reaching specific audience segments. Once you have completed this unit, you will have the following tools to support the development of your SBCC response: • Worksheet 7.1: Assessing Available Communication Channels • Worksheet 7.2: Matching Communication Channels to Primary and Influencing Audiences What Is a Communication Channel? A communication channel is a medium or method used to deliver a message to the intended audience. A variety of communication channels exist, and examples include: • Mass media such as television, radio (including community radio) and newspapers • Mid media activities, also known as traditional or folk media such as participatory theater, public talks, announcements through megaphones and community-based surveillance • Print media, such as posters, flyers and leaflets • Social and digital media such as mobile phones, applications and social media • IPC, such as door-to-door visits, phone lines and discussion groups Different channels are appropriate for different audiences, and the choice of channel will depend on the audience being targeted, the messages being delivered and the context of the emergency.
    [Show full text]
  • Modeling and Simulation of an Asynchronous Digital Subscriber Line Transceiver Data Transmission Subsystem
    Modeling and Simulation of an Asynchronous Digital Subscriber Line Transceiver Data Transmission Subsystem Elmustafa Erwa ABSTRACT Recently, there has been an increase in demand for digital services provided over the public telephone line network. Asymmetric digital subscriber line (ADSL) transmit high bit rate data in the forward direction to the subscriber, and lower bit rate data in the reverse direction to the central office, both on a single copper telephone loop. I implemented a Synchronous Dataflow (SDF) model for an ADSL transceiver’s data transmission subsystem in LabVIEW. My implementation enables designers to simulate and optimize different ADSL transceiver designs. The overall implementation is compliant with the European Telecommunications Standards Institute’s ADSL specification. 1. INTRODUCTION With the emergence of the Internet as the cornerstone of communications in this age, the demand for high speed Internet access has only been increasing. Asymmetric digital subscriber lines (ADSL) is one of the technologies that provide high-speed Internet access in residences and offices [1]. It facilitates the use of normal telephone services, Integrated Services Digital Network (ISDN), and high-speed data transmission simultaneously. Hence, bandwidth-demanding technologies, such as video-conferencing and video-on-demand, are enabled over ordinary telephone lines. ADSL standards use discrete multi-tone (DMT) modulation [2]. DMT divides the effectively bandlimited communication channel into a larger number of orthogonal narrowband subchannels. This allows for maximizing the transmitted bit rate and adapting to changing line conditions. Designing ADSL systems is inherently complex. However, advances in the digital signal processor (DSP) technology allowed programmable DSP based solutions to replace application-specific integrated circuit based implementations.
    [Show full text]
  • Spread Spectrum and Wi-Fi Basics Syed Masud Mahmud, Ph.D
    Spread Spectrum and Wi-Fi Basics Syed Masud Mahmud, Ph.D. Electrical and Computer Engineering Dept. Wayne State University Detroit MI 48202 Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 1 Spread Spectrum Spread Spectrum techniques are used to deliberately spread the frequency domain of a signal from its narrow band domain. These techniques are used for a variety of reasons such as: establishment of secure communications, increasing resistance to natural interference and jamming Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 2 Spread Spectrum Techniques Frequency Hopping Spread Spectrum (FHSS) Direct -Sequence Spread Spectrum (DSSS) Orthogonal Frequency-Division Multiplexing (OFDM) Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 3 The FHSS Technology FHSS is a method of transmitting signals by rapidly switching channels, using a pseudorandom sequence known to both the transmitter and receiver. FHSS offers three main advantages over a fixed- frequency transmission: Resistant to narrowband interference. Difficult to intercept. An eavesdropper would only be able to intercept the transmission if they knew the pseudorandom sequence. Can share a frequency band with many types of conventional transmissions with minimal interference. Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 4 The FHSS Technology If the hop sequence of two transmitters are different and never transmit the same frequency at the same time, then there will be no interference among them. A hopping code determines the frequencies the radio will transmit and in which order. A set of hopping codes that never use the same frequencies at the same time are considered orthogonal .
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Research on the System Structure of IPV9 Based on TCP/IP/M
    International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 Research on the System Structure of IPV9 Based on TCP/IP/M Wang Jianguo Xie Jianping 1. State and Provincial Joint Engineering Lab. of 1. Chinese Decimal Network Working Group Advanced Network, Monitoring and Control Shanghai, China 2. Xi'an, China Shanghai Decimal System Network Information 2. School of Computer Science and Engineering Technology Ltd. Xi'an Technological University e-mail: [email protected] Xi'an, China e-mail: [email protected] Wang Zhongsheng Zhong Wei 1. School of Computer Science and Engineering 1. Chinese Decimal Network Working Group Xi'an Technological University Shanghai, China Xi'an, China 2. Shanghai Decimal System Network Information 2. State and Provincial Joint Engineering Lab. of Technology Ltd. Advanced Network, Monitoring and Control e-mail: [email protected] Xi'an, China e-mail: [email protected] Abstract—Network system structure is the basis of network theory, which requires the establishment of a link before data communication. The design of network model can change the transmission and the withdrawal of the link after the network structure from the root, solve the deficiency of the transmission is completed. It solves the problem of original network system, and meet the new demand of the high-quality real-time media communication caused by the future network. TCP/IP as the core network technology is integration of three networks (communication network, successful, it has shortcomings but is a reasonable existence, broadcasting network and Internet) from the underlying will continue to play a role. Considering the compatibility with structure of the network, realizes the long-distance and the original network, the new network model needs to be large-traffic data transmission of the future network, and lays compatible with the existing TCP/IP four-layer model, at the a solid foundation for the digital currency and virtual same time; it can provide a better technical system to currency of the Internet.
    [Show full text]
  • 2 the Wireless Channel
    CHAPTER 2 The wireless channel A good understanding of the wireless channel, its key physical parameters and the modeling issues, lays the foundation for the rest of the book. This is the goal of this chapter. A defining characteristic of the mobile wireless channel is the variations of the channel strength over time and over frequency. The variations can be roughly divided into two types (Figure 2.1): • Large-scale fading, due to path loss of signal as a function of distance and shadowing by large objects such as buildings and hills. This occurs as the mobile moves through a distance of the order of the cell size, and is typically frequency independent. • Small-scale fading, due to the constructive and destructive interference of the multiple signal paths between the transmitter and receiver. This occurs at the spatialscaleoftheorderofthecarrierwavelength,andisfrequencydependent. We will talk about both types of fading in this chapter, but with more emphasis on the latter. Large-scale fading is more relevant to issues such as cell-site planning. Small-scale multipath fading is more relevant to the design of reliable and efficient communication systems – the focus of this book. We start with the physical modeling of the wireless channel in terms of elec- tromagnetic waves. We then derive an input/output linear time-varying model for the channel, and define some important physical parameters. Finally, we introduce a few statistical models of the channel variation over time and over frequency. 2.1 Physical modeling for wireless channels Wireless channels operate through electromagnetic radiation from the trans- mitter to the receiver.
    [Show full text]
  • F. Circuit Switching
    CSE 3461: Introduction to Computer Networking and Internet Technologies Circuit Switching Presentation F Study: 10.1, 10.2, 8 .1, 8.2 (without SONET/SDH), 8.4 10-02-2012 A Closer Look At Network Structure: • network edge: applications and hosts • network core: —routers —network of networks • access networks, physical media: communication links d. xuan 2 1 The Network Core • mesh of interconnected routers • the fundamental question: how is data transferred through net? —circuit switching: dedicated circuit per call: telephone net —packet-switching: data sent thru net in discrete “chunks” d. xuan 3 Network Layer Functions • transport packet from sending to receiving hosts application transport • network layer protocols in network data link network physical every host, router network data link network data link physical data link three important functions: physical physical network data link • path determination: route physical network data link taken by packets from source physical to dest. Routing algorithms network network data link • switching: move packets from data link physical physical router’s input to appropriate network data link application router output physical transport network data link • call setup: some network physical architectures require router call setup along path before data flows d. xuan 4 2 Network Core: Circuit Switching End-end resources reserved for “call” • link bandwidth, switch capacity • dedicated resources: no sharing • circuit-like (guaranteed) performance • call setup required d. xuan 5 Circuit Switching • Dedicated communication path between two stations • Three phases — Establish (set up connection) — Data Transfer — Disconnect • Must have switching capacity and channel capacity to establish connection • Must have intelligence to work out routing • Inefficient — Channel capacity dedicated for duration of connection — If no data, capacity wasted • Set up (connection) takes time • Once connected, transfer is transparent • Developed for voice traffic (phone) g.
    [Show full text]
  • Designing Asymmetric Digital Subscriber Line with Discrete Multitone Modulator
    ISSN (Online) 2321-2004 IJIREEICE ISSN (Print) 2321-5526 International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering Vol. 7, Issue 11, November 2019 Designing Asymmetric Digital Subscriber Line with Discrete Multitone Modulator Attiq Ul Rehman1, Maninder Singh2 M. Tech., Student, ECE Department, Haryana Engineering College, Jagadhri, Haryana, India1 Assistant Professor, ECE Department, Haryana Engineering College, Jagadhri, Haryana, India2 Abstract: The objective of Digital Subscriber Line (DSL) is to propagate signal from the transmitter to the receiver over telephone lines. In communication industry Asymmetric Digital Subscriber Line (ADSL) is widely used because it can handle both phone services and internet access services at same time. As the communication industry develops, its main concern is to maximize the user handling capacity of communication systems. For this purpose, ADSL uses Discrete Multitone (DMT) modulator with QAM bank. But as the number of users increases the system complexity and interference also increases. The communication channel is not free from the effects of channel impairments such as noise, interference and fading. These channel impairments caused signal distortion and Signal to Ratio (SNR) degradation. One method that can be implemented to overcome this problem is by introducing channel coding. Channel encoding is applied by adding redundant bits to the transmitted data. The redundant bits increase raw data used in the link and therefore, increase the bandwidth requirement. So, if noise or fading occurred in the channel, some data may still be recovered at the receiver. While at the receiver, channel decoding is used to detect or correct errors that are introduced to the channel.
    [Show full text]
  • The Wireless Communication Channel Objectives
    9/9/2008 The Wireless Communication Channel muse Objectives • Understand fundamentals associated with free‐space propagation. • Define key sources of propagation effects both at the large‐ and small‐scales • Understand the key differences between a channel for a mobile communications application and one for a wireless sensor network muse 1 9/9/2008 Objectives (cont.) • Define basic diversity schemes to mitigate small‐scale effec ts • Synthesize these concepts to develop a link budget for a wireless sensor application which includes appropriate margins for large‐ and small‐scale pppgropagation effects muse Outline • Free‐space propagation • Large‐scale effects and models • Small‐scale effects and models • Mobile communication channels vs. wireless sensor network channels • Diversity schemes • Link budgets • Example Application: WSSW 2 9/9/2008 Free‐space propagation • Scenario Free-space propagation: 1 of 4 Relevant Equations • Friis Equation • EIRP Free-space propagation: 2 of 4 3 9/9/2008 Alternative Representations • PFD • Friis Equation in dBm Free-space propagation: 3 of 4 Issues • How useful is the free‐space scenario for most wilireless syst?tems? Free-space propagation: 4 of 4 4 9/9/2008 Outline • Free‐space propagation • Large‐scale effects and models • Small‐scale effects and models • Mobile communication channels vs. wireless sensor network channels • Diversity schemes • Link budgets • Example Application: WSSW Large‐scale effects • Reflection • Diffraction • Scattering Large-scale effects: 1 of 7 5 9/9/2008 Modeling Impact of Reflection • Plane‐Earth model Fig. Rappaport Large-scale effects: 2 of 7 Modeling Impact of Diffraction • Knife‐edge model Fig. Rappaport Large-scale effects: 3 of 7 6 9/9/2008 Modeling Impact of Scattering • Radar cross‐section model Large-scale effects: 4 of 7 Modeling Overall Impact • Log‐normal model • Log‐normal shadowing model Large-scale effects: 5 of 7 7 9/9/2008 Log‐log plot Large-scale effects: 6 of 7 Issues • How useful are large‐scale models when WSN lin ks are 10‐100m at bt?best? Fig.
    [Show full text]
  • Telecommunication Through Broadband Services of Bsnl: a Bird’S Eye View
    International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 2 (may-june 2013), PP. 37-41 TELECOMMUNICATION THROUGH BROADBAND SERVICES OF BSNL: A BIRD’S EYE VIEW Dr Shilpi Verma Assistant Professor Deptt. of Library & information Science (School for Information Science & Technology) Babasaheb Bhimrao Ambedkar University (A Central University) Vidya Vihar, Rai-bareli Road Lucknow-226025 (UP) Abstract: In the cut throat competition every country telecommunication technologies are playing very vital want to be information equipped, the role. The consumers or users are demanding for faster and telecommunication is helping a lot in achieving the reliable bandwidth for purpose of e-commerce, same. Integrated communication is emerged as a boom videoconferencing, information retrieval and such other in communication world. The growth of data, applications. Broadband seems as a answer to these communication market and the networking questions. Broadband provides means of accessing technology trend has amplified the importance of technologies to bridge the customer & the service telecommunication in the field of information provider throughout the world. It basically provides high communication. Telecommunication has become one speed internet access, whereas the dial up connections of the very important part that is very essential to the was having their limitations and low speed. These socio-economic well being of any nation. The paper broadband services allow the user to send or receive video deals with concept of Broad band services of BSNL, or audio digital content and having real time features also. technology options for broadband services. Bharat It is able to provide interactive services.
    [Show full text]
  • Circuit-Switching
    Welcome to CSC358! Introduction to Computer Networks Amir H. Chinaei, Winter 2016 Today Course Outline . What this course is about Logistics . Course organization, information sheet . Assignments, grading scheme, etc. Introduction to . Principles of computer networks Introduction 1-2 What is this course about? Theory vs practice . CSC358 : Theory . CSC309 and CSC458 : Practice Need to have solid math background . in particular, probability theory Overview . principles of computer networks, layered architecture . connectionless and connection-oriented transports . reliable data transfer, congestion control . routing algorithms, multi-access protocols, . delay models, addressing, and some special topics Introduction 1-3 Overview: internet protocol stack application: supporting network applications . FTP, SMTP, HTTP application transport: process-process data transfer transport . TCP, UDP network network: routing of datagrams from source to destination link . IP, routing protocols link: data transfer between physical neighboring network elements . Ethernet, 802.111 (WiFi), PPP physical: bits “on the wire” Introduction 1-4 Logistics (1/3) Prerequisite knowledge . Probability theory is a must . Mathematical modeling . Data structures & algorithms Course components . Lectures: concepts . Tutorials: problem solving . Assignments: mastering your knowledge . Readings: preparing you for above . Optional assignments: things in practice, bonus Introduction 1-5 Logistics (2/3) Text book . Computer Networking A Top-Down Approach Featuring the Internet 5th Edition, J. F. Kurose and K. W. Ross Lecture slides . Many slides are (adapted) from the above source . © All material copyright . All rights reserved for the authors Introduction 1-6 Logistics (3/3) For important information on . Lecture and tutorial time/location . Contact information of course staff (instructor and TAs) . Office hour and location . Assignments specification and solution .
    [Show full text]