• Title/Summary/Keyword: Overhead guard

Search Result 6, Processing Time 0.02 seconds

Improvement of Upstream Bandwidth Utilization Using Two-Upstream-Wavelengths TDM-PON System (상향 두 파장 TDM-PON을 이용한 전송효율의 향상)

  • Chung, Jun-Hoi;Park, Jae-Uk;Choi, Byung-Chul;Yoo, Jea-Hoon;Kim, Byoung-Whi;Park, Young-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.609-614
    • /
    • 2008
  • Upstream data frame of TDM-PON includes various types of overheads, and there exist guard bands between consecutive frames from different ONUs. Although they are indispensible in synchronization and performance, they cause bandwidth waste at the same time. To solve this problem, a new TDM-PON that uses two types of wavelengths in upstream transmission is suggested. By even distribution of two wavelengths among ONUs and overhead overlap between frames that use different wavelengths, almost 100% bandwidth efficiency could be achieved. A serializer that multiplexes signals from two wavelengths is implemented for this purpose.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

Low Power Architecture for Floating Point Adder (부동소수점 덧셈 연사기의 저전력화 구조)

  • 김윤환;박인철
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.1089-1092
    • /
    • 1998
  • Conventional floating-point adders have one data-path that is used for all operations. This paper describes a floatingpoint adder eeveloped for low power consumption, which has three data-paths one of which is selected according to the exponent difference. The first is applied to the case that the absolute exponent difference (AED) of two operands is less than 1, and the second is for 1

  • PDF

A Study on Safety Improvement of Forklift Truck (지게차 안전성 향상 방안 연구)

  • Chae, Jongmin
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.4
    • /
    • pp.91-96
    • /
    • 2013
  • Forklift truck is one of the dangerous machines which causes the fatal accidents most frequently. The causes of fatalities by forklift from 2008 to 2011 were analyzed. Crushing the operator when tipping over or falling off a truck were the major causes of death in this study. The purpose of this study is to show measures from the engineering point of view to prevent the forklift truck accidents. In order for that, the domestic requirement for forklift safety was compared with those of foreign and international standards. The manufacturers' opinion was also collected regarding to improve the forklift safety. Several measures were suggested in order to prevent fatalities caused by forklift.

A Study on Safety Improvement of Forklift truck (지게차 안전성 향상 방안 연구)

  • Chae, Jongmin
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2013.04a
    • /
    • pp.41-52
    • /
    • 2013
  • Forklift truck is one of the dangerous machines which causes the fatal accidents most frequently. The causes of fatalities by forklift from 2008 to 2011 were analyzed. Crushing the operator when tipping over or falling off a truck were the major causes of death in this study. The purpose of this study is to show measures from the engineering point of view to prevent the forklift truck accidents. In order for that, the domestic requirement for forklift safety was compared with those of foreign and international standards. The manufacturers' opinion was also collected regarding to improve the forklift safety. Several measures were suggested in order to prevent fatalities caused by forklift.

  • PDF

Performance analysis of the Resource Reservation Schemes using Mobile Cluster based H-MRSVP in Wireless Mobile Networks (무선 이동망에서 이동 클러스터 기반의 H-MRVP를 이용한 자원관리 기법의 성능 분석)

  • Ma, Gyeong-Min;Won, Jeong-Jae;Lee, Hyeong-U;Jo, Chung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.283-292
    • /
    • 2002
  • This paper develops a scheme of resource management for guaranteeing QoS of realtime traffic in wireless mobile internet environments Mobile terminal has significant impact on the QoS originating mobility provided to a real-time application. The currently proposed MRSVP is not clear the boundary of resource reservation tregion and also can give rise to signal overhead to maintain sessions. To solve above problem, we propose the new reservation protocol, mobile cluster based H-MRSVP to combine MRSVP with moving cluster concept. In this paper, we analytically design our model for guaranteeing the QoS of realtime traffic and compare the three schemes: guard channel allocation schemes, DCA and our model. The performance measures are the probabilities of new call blocking, handoff dropping, resource utilization and service completion versus the system offered Erlang load. Consequently, Simulation indicate our model is more flexible than DCA in a view pint of channel utilization and gains the advantage over guard channel scheme with respects to the mobility.