• Tidak ada hasil yang ditemukan

Recent Trends in Communication Networks

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "Recent Trends in Communication Networks"

Copied!
264
0
0

Teks penuh

Inquiries about the use of the book should be directed to INTECHOPEN LIMITED rights and permissions department (permissions@intechopen.com). Dolores Kuzelj, the Writer Services Manager, who provided constant support throughout the editing process of the book.

121 Design Principles of 5G NR RoF-Based Fiber-Wireless Access Network

Introduction

There had been several works related to different types of coding in communication research. In the field of communication, the advent of multimedia had led to video on demand.

Figure 1 shows the communication between two hosts in its simplest form.
Figure 1 shows the communication between two hosts in its simplest form.

Conclusion

In the field of computer science, with the advent of the Internet, the topic of computer communication gained great importance. Anti-counterfeiting is one of the most challenging problems in digital cinema rights management.

Digital cinema

This creates two issues that must be considered when designing watermarking schemes for digital cinema. Solving this problem requires digital cinema watermarking schemes to be able to calculate distance and angle.

Digital watermarking

An Investigation of Piracy Protection Techniques in Digital Cinema Watermark Schemes DOI: http://dx.doi.org/10.5772/intechopen.92412. The first digital cinema system specification was published in 2005 by a consortium of six major studios.

Figure 2 shows how the character “a” can be watermarked in a video using a  simple watermarking scheme.
Figure 2 shows how the character “a” can be watermarked in a video using a simple watermarking scheme.

Survey on watermarking in digital cinema

  • Identifying the theatre
  • Locating the camcorder

Most of the methods presented in the literature avoid the audio watermark due to its complexity. In the method proposed in [50], the audio is placed on the video instead of the soundtrack.

× 1980 resolution to 1024 × 576 and then cropping to 720 × 576. Figure 4 shows this  transformation
× 1980 resolution to 1024 × 576 and then cropping to 720 × 576. Figure 4 shows this transformation

Conclusion

  • Confidentiality
  • Integrity

Codes, errors and erasures

  • Linear block codes
  • Erasures
  • Separation of errors from erasures

Low-density parity-check codes (LDPC codes) are now used in many recent high-speed communication standards, such as Digital video broadcasting-S2 (DVB-S2), WiMAX, 10GBase-T Ethernet [9]. The decoder can calculate a parity check matrix for the punctured code upon receipt of the code word.

How to build an l-separating matrix

  • Set separation Let H ¼ � h i , j �
  • Separating matrix
  • A more efficient separating matrix

If H is a parity check matrix that separates l codes of C, we can construct a parity check matrix based on H for any code punched up to a fixed number of l symbols. H can distinguish deletions from errors because H has enough parity check equations that do not check any deleted symbols and are sufficient to characterize the punched code.

Covering design

  • Approach 1
  • Approach 2

Thus, any subgroup of size t formed using these elements u�1 can be formed from any other subgroup in the column; (b) any subset of size t containing . It is easy to see that any subgroup of size 4 can be formed from the subgroups in Figure 9.

Conclusions

Another no less dangerous source of electromagnetic emission, formidable from the point of view of the possibility of conducting electromagnetic "clock", are computer laser printers [15, 16]. Such emissions are called "sensitive" or "valuable" or "compromising" emanations from the point of view of electromagnetic protection of processed information.

TEMPEST fonts 1 Introduction

  • Symmetrical safe font
  • Asymmetrical safe font
  • Simply safe font

At the same time, the correct proportions of the width of the lines and the clearance of each character of the font are preserved. At the same time, the correct proportions of the width of the lines and the clearance of each character of the font are preserved.

Sensitive emissions and possibilities of reconstruction of primary information

  • Introduction
  • VGA standard
  • DVI standard

Adequate tests were conducted to demonstrate the effectiveness of tempest fonts in protecting information from the intrusion process of electromagnetic radiation. The video signal of the VGA standard has a characteristic structure that allows distinguishing unique signatures that enable its identification, both in the time and frequency domains.

Conclusions

The mobile device used the location information consisting of Cell Identifier, Location Area Code (LAC), Mobile Network Code (MNC) and Mobile Country Code (MCC). The contributions of this chapter can be summarized as follows: we use location information for a mobile device that is always available in the cellular network.

Structural GSM/UMTS architecture

The location information collected while the mobile device is roaming between base stations connects them and the location information allows us to track the mobile device to see the historical location; the application can be used anywhere in the world covered by the GSM mobile network/. UMTS vs. location information with location APIs to provide mobile device location.

GSM/UMTS-based localization

Cell ID (ID) in combination with the MCC, the LAC and the MNC is the unique identifier of the BTS. The cell ID of the BTS has the association with certain mobile station (MS), which is known by the mobile device and can be used to evaluate the position of the mobile device [8].

Android platform

Web service

Tracking system

In this section, we propose a tracking system algorithm to develop models of the relationship between the mobile application and the server location. Note IMEI, SSN and current date and time can be retrieved from the mobile device.

Results

When a mobile phone connected to the Internet can retrieve location information from the mobile device's SQLite database, the location information is transferred to the remote server during synchronization between SQLite and MySQL. The data (latitude and longitude) is then transferred to the mobile device in the form of the JSON format and Google Maps is used which will plot the locations.

Conclusion

The application showed a low-cost tracking system using GSM/UMTS network, which is suitable for working all over the world with the combination of the Android mobile phone and web services. We demonstrated tracking using low cost hardware with open source projects and showed mapping techniques with cell tower databases to take advantage of tracking a mobile device.

Introduction to cognitive radio

In advanced wireless communication systems, an intelligence of cognitive radio helps to become aware of the environment and internal state and can adjust itself for better performance. Software-defined radio (SDR) and artificial intelligence (AI) technology enable the field of cognitive radio.

Benefits of cognitive radio

The baseband section of a communication system can be implemented by software, which is a unique platform provided by cognitive radio. Signal transmission and reception between cognitive radio mainly depends on channel and power, and they will change dynamically to improve spectrum efficiency and This process is defined as dynamic spectrum management.

Software defined radio (SDR)

  • SDR overview
  • Functions of SDR transmitter and receiver
  • Architecture of SDR
  • Introduction to complex signals
  • GNU radio

The hardware aspects of a platform consist of radio frequency (RF) elements, some baseband signal processing, and communication links to the software-based signal processing element—perhaps a DSP, FPGA, or a general-purpose processor ( GPP) (Figure 3). As the quadrature signal is added, when I and φ vary identically, the amplitude of the sum changes (Figure 8).

Signal processing blocks in GNU radio

  • Analog modulation techniques .1 Amplitude modulation (AM)
  • Digital modulation techniques .1 ASK modulation

All the following blocks in the flowchart can wait for the production sample rate. Figure 27 and 28 shows the GRC flow chart of the transmitter which is described as follows.

Background and introduction

In bit duration detection, the bit stream is self-clocking and the timing differential varies with respect to the exact timing of the bits in TRL. In bit duration detection, the binary bit stream is self-clocking and the timing differential varies with respect to the exact timing of the bits in TRL.

Related works

  • Performance modeling of PLL using random walk theory
  • Cramér–Rao bound (CRB)
  • Square-TRL using digital RWF
  • Advanced TRL using RWF

Application of the Random Walk Model for Timing Recovery in Modern Mobile SATCOM Systems DOI: http://dx.doi.org/10.5772/intechopen.90606. This independent homogeneous finite aperiodic Markov chain is shown in Figure 3. The above Markov chain is referred to as a "random walk" with the transition probabilities q and p defined in Eq. 1) and (2), respectively, and in terms of signal and noise parameters as shown in Eq.

Mathematical modeling of timing jitter using random walk process The Wiener process was introduced as a mathematical model of Brownian

  • Mathematical modeling of random time walk
  • Cramér–Rao bound (CRB) for timing jitter

In Figure 9, the steady state CRB and the performance of the trained PLL are plotted for the following system parameters: σTε¼0:5%, block length N = 500, and the PLL performance is averaged over 1000 trials [8]. As seen in the figure, the performance of the PLL is a strong function of the gain parameter α, and thus it must be optimized for each SNR.

Timing recovery using RWF

  • RWF concept for timing recovery
  • Software implementation of RWF TRL
  • Performance of RWF TRL

Converts the input baseband digital signal waveform to data transition pulses delayed by half the search window size, W. The Signal Processing Work (SPW) implementation of the proposed RWF TRL for 8-PSK modem is described in Figure 13.

Figure 12 describes the “Pulse Detection and Comparison Block”, or SWB 1.
Figure 12 describes the “Pulse Detection and Comparison Block”, or SWB 1.

Discussion and conclusion

Elaborating on the direction, in this chapter we review the worldwide progress of RoF-architected 5G NR access networks and highlight our recent simulation results on photonic millimeter-based FiWi interface design and optimization. Elaborating on the direction, in this chapter we review the worldwide progress of RoF architecture 5G NR access networks and highlight our recent simulation results on photonics-based FiWi interface design and optimization.

The distinctive features of access networks for 5G NR mobile communication systems

  • Small cell scenario
  • Radio-over-fiber concept
  • Example of a 5G NR network using small cell scenario and RoF concept Let us illustrate small cell scenario using an example of building a backhaul
  • Microwave-photonic-based approach .1 The area of microwave photonics

One of the most important examples of the introduction of radically new approaches is the upcoming 5G NR mobile network. Comparison of key parameters achieved in 4G LTE mobile networks with similar parameters to be achieved in 5G NR networks.

Figure 3 shows a typical configuration of a RoF-based communication network including central station (CS) and set of remote (base) stations (RS), which are a key element of a RoF-based fiber-wireless fronthaul network (FWFN) that
Figure 3 shows a typical configuration of a RoF-based communication network including central station (CS) and set of remote (base) stations (RS), which are a key element of a RoF-based fiber-wireless fronthaul network (FWFN) that

Design principles of fiber-wireless fronthaul network

  • Design of optical distribution network
  • Proposed models and setups for simulation experiments .1 Direct intensity modulation
  • Simulation results
  • Design of fiber-to-MMW-band wireless interface
  • Studying an optimal signal transmitting RoF-based fiber-to-MMW-band wireless interface

The simulation results for the fiber-wireless front-haul link of the 5G NR system under study are summarized in Table 6. The result, which is a dependence of EVM versus fiber length, is shown in Figure 21.

Figure 10 demonstrates VPIphotonics Design Suite’s external intensity- intensity-modulated FFL model and setup that contain the library models of EAM or MZM optically injected by C-band DFB laser
Figure 10 demonstrates VPIphotonics Design Suite’s external intensity- intensity-modulated FFL model and setup that contain the library models of EAM or MZM optically injected by C-band DFB laser

Conclusion

Proceedings of the Seventh International Conference on Advances in Computing, Communication and Information Technology—CCIT; 27–28 October 2018. Proceedings of the Eighth International Conference on Advances in Computing, Communication and Information Technology—CCIT, 23–24 April 2019, Birmingham, UK.

Implementation and methods

  • Prototyping with Altera FPGA and MATLAB Simulink
  • Reconstruction filter design and simulation
  • Using AD9852A complete DDS as clock source
  • Characterization and qualification test profile

Once the minimum order is defined, the design of the passive LPF can be done as shown in Figure 4. The output strength of the current DACs can be controlled by the design through an external resistor.

Result and analysis

  • Software simulation
  • Hardware implementation
  • Comparative result analysis

The reason for this loss may be the bandwidth of the comparator itself. The on-chip activities of any modern IC are always disabled by the appearance of power supply noise (PSN) in the chip's power line.

Figure 7 displays the overall DDS simulation model as clock generator. By setting the DAC output current to be greater at about 20 mA, the output  perfor-mance has a better slew, jitter, and phase noise perforperfor-mance
Figure 7 displays the overall DDS simulation model as clock generator. By setting the DAC output current to be greater at about 20 mA, the output perfor-mance has a better slew, jitter, and phase noise perforperfor-mance

State of art for the on-chip power supply noise problem

It should be noted that the critical path delay of the logic circuits inside the IC chip is inversely proportional to the supply voltage flow rate [3]. This current pumping occurs through the PDN inside the chip and causes a voltage drop in the circuit's electrical lines due to the presence of inductive, capacitive and resistive elements in the IC chip's power distribution network.

Discussion on the power delivery network for the chip

In ad-hoc style, the local circuit blocks are connected to the I/O pads (at the outer boundaries) using custom power/ground lines, as shown in Figure 4(a). This makes the power level insensitive to the current preconditions of the various circuit blocks.

Methodologies to suppress on-chip power supply noise

  • Circuital approaches
  • Non-circuital approaches

So, in recent days, the lattice-like structure of PDN design is pursued for all types of on-chip architectures. So, in most ideal cases, it is observed that the actual on-chip transient times are around 10%.

Challenges faced in suppressing on-chip power supply noise

The impact of PSN over on-chip circuits is suppressed by using different reduction and isolation techniques. In the earlier sections, there were discussions about problems claimed by PSN for the proper functioning of on-chip circuits within the modern ICs.

Probable solution to reduce the on-chip power supply noise

In fact, the reactance of these on-chip decaps is so high during low-frequency operation of the chip that as soon as the supply voltage fluctuates, it adversely affects the operation of the chip. The frequency scale directly affects the switching activity of the circuit nodes on the chip.

Conclusion

  • Classification of video streaming

In the case of the circuit approach, it has been pointed out that by manipulating the on-chip clock activity, the most important factors of PSN (i.e. i(t) and di/dt) can be controlled. Some of the platforms that provide multimedia content over the Internet are YouTube [1], Net TV [2], and IPTV [3], etc.

Gambar

Figure 1 shows the communication between two hosts in its simplest form.
Figure 2 shows how the character “a” can be watermarked in a video using a  simple watermarking scheme.
× 1980 resolution to 1024 × 576 and then cropping to 720 × 576. Figure 4 shows this  transformation
× 1980 resolution to 1024 × 576 and then cropping to 720 × 576. Figure 4 shows this  transformation
+7

Referensi

Dokumen terkait

Penelitin ini menelaah faktor-faktor yang melatarbelakangi konsumen dalam penggunakan Grab sebagi platform transportasi online dengan berdasarkan kegiatan social media marketing pada