Future Communication Technology and Engineering Proceedings of the 2014 International Conference on Future Communication Technology and Engineering FCTE 2014 Shenzhen China 16 17 November 2014 1st Edition Kennis Chan (Editor) pdf download
Future Communication Technology and Engineering Proceedings of the 2014 International Conference on Future Communication Technology and Engineering FCTE 2014 Shenzhen China 16 17 November 2014 1st Edition Kennis Chan (Editor) pdf download
https://ebookgate.com/product/applied-engineering-sciences-
proceedings-of-the-2014-aasri-international-conference-on-
applied-engineering-sciences-hollywood-la-usa-1st-edition-wei-
deng-editor/
https://ebookgate.com/product/international-gear-
conference-2014-26th-28th-august-2014-lyon-1st-edition-philippe-
velex/
https://ebookgate.com/product/11th-international-conference-on-
turbochargers-and-turbocharging-13-14-may-2014-1st-edition-
imeche/
Future Communication
Editor
Chan
Editor
Kennis Chan
Advanced Science and Industry Research Center, Hong Kong
CRC Press/Balkema is an imprint of the Taylor & Francis Group, an informa business
© 2015 Taylor & Francis Group, London, UK
Typeset by MPS Limited, Chennai, India
Printed and bound in the UK and the US
All rights reserved. No part of this publication or the information contained herein may be
reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, by photocopying, recording or otherwise, without written prior
permission from the publishers.
Although all care is taken to ensure integrity and the quality of this publication and the
information herein, no responsibility is assumed by the publishers nor the author for any
damage to the property or persons as a result of operation or use of this publication
and/or the information contained herein.
Published by: CRC Press/Balkema
P.O. Box 11320, 2301 EH Leiden, The Netherlands
e-mail: [email protected]
www.crcpress.com – www.taylorandfrancis.com
ISBN: 978-1-138-02777-0 (Hardback)
ISBN: 978-1-315-69045-2 (eBook PDF)
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
Table of contents
Preface IX
Organizing Committee XI
V
An adaptive virtual machine management system for cloud computing 77
B. Li & Y.L. Shang
A comparison of free and open source technologies suitable for future authoring tools in education 83
V. Maněna, R. Špilka & K. Rybenská
Key technology research into the resource access framework of the Internet of Things (IoT) 87
C. Li & C.C. Liu
A cucumber leaf disease classification system based on an embedded system 91
Y.W. Tian & X. Chen
A study of the humanistic education of Chinese college teaching from the aspect of
computer science and technology 95
S.Z. Liu
Cryptanalysis and improvement of a directed digital signature scheme using a non-interactive
public-key distribution system 99
J.R. Sun, S.C. Lin & M.S. Hwang
Cryptanalysis and improvement of the Li-Liu-Wu user authentication scheme 103
T.H. Feng, M.S. Hwang & W.Y. Chao
Evaluation of publish/subscribe-based routing over Software-Defined Networking (SDN) 107
S.J. Wang & Y. Zhang
An adaptive web-based learning system based on ontology 113
Q.L. Diao & F.H. Qiu
Solving of an erythrometry problem using a specialized Hough transform 117
A.S. Potapov, O.V. Shcherbakov & I.N. Zhdanov
Fast reconstruction of Go board grids using the modified Hough transform 121
A.S. Potapov, O.V. Shcherbakov & I.N. Zhdanov
Strategies and modeling of rumors defense and privacy protection on complex networks 125
Z.L. Sun, M.M. Tang & X.C. Fu
Container multimodal transport system model study based on the RFID technology 131
C.H. Pan & H.M. Fan
Design of an OAM radio beam generator using microstrip patch array 135
F.C. Mao, J.J. Yang, M. Huang, S. Yan & Y. Feng
Research and design of a forest management mobile service cloud platform for the natural
forest protection project 139
F. Li, Y. Ma, X. Zhang, X.W. Yu, P.F. Feng & M.B. Zhang
Design of miniaturized microstrip antenna using metamaterials 143
Y. Zhang, X.C. Ma, S. Yan, J.J. Yang & M. Huang
A ZigBee wireless network factory monitoring system design 147
W.K. Huang, F.J. Wu, Z. Xiao & H.B. Wu
A VaR (Value-at-Risk) model based on GARCH approach and EVT 151
J. Yang & S.Z. Zhang
Laser signal attenuation due to sand and dust particle scattering 157
Y.G. Wang, H.Q. Wang & M.H. Cao
Research on the innovation and development of electronic commerce based on
centralized procurement 163
L.Z. Zhang
The simulation of cluster bombs’ damage efficiency and analysis of damage factor 167
S. Liu, X.J. Zhao, F. Zhao, X. Wei & W.F. Li
The virtual display of a modern printing press 171
X.H. Wang, L.K. Luo, Y.S. Qi & Z.Y. Sun
VI
Language model for assessing author similarity 175
J.Y. Chen, Z.C. Wang & J.L. Wang
Emergency simulation for a drill system of a roller coaster in a virtual environment 179
X.Y. He, H.W. He & Z.Y. Hu
Temperature state and residual deformations in a welding conditions study 183
A.B. Ivanchenko, L.V. Belyaev, A.V. Zhdanov & V.V. Morozov
VII
Impact assessment of the processes occurring in tailing dumps of a Krasnorechenskaya
concentrating mill on the hydrosphere of Dalnegorsky District, according to modelling evidence 287
V.P. Zvereva, A.M. Kostina & A.I. Lysenko
Space monitoring of the earth and Haar wavelet transform 291
M.L. Kazaryan, M.A. Schahramanian & A. Richter
Environmental problems of coal mining in the Southern Far East of Russia and soil remediation
on mining dumps 295
L.T. Krupskaya, L.P. Gul, V.P. Zvereva & M.S. Onishchenko
Nonylphenol, benzophenones and benzotriazoles in different environmental matrices and foods 299
A. Careghini, A. Mastorgio, S. Saponaro & E. Sezenna
Lombardy region (Italy) priorities list of contaminated sites: A new relative risk
assessment procedure 307
A. Careghini, A. Mastorgio, S. Saponaro, E. Sezenna, M. Bellotti, S. Anelli & A. Trozzi
Research on an evaluation approach of environmental flow for rivers 315
J.J. Tu, X.S. Ai, Z.Y. Gao & J. Zhu
Productivity of a five-spot mixed well pattern in a dual porosity reservoir 319
J.J. Li, H.Q. Jiang, Y.X. Wang & H.X. Liu
Removal of volatile organic compounds from water using a novel adsorbent 325
P. Zhang, A. Smith, R. Ding & T.J. Bandosz
Bioecology of Hyla japonica (Gunther, 1859) in Priamurye, Russia 329
V.T. Tagirova
Prediction of organ donation after irreversible brain damage 333
L. Torres, H. Vicente, P. Novais, A. Abelha & J. Neves
Interactivity for facilitating and promoting traditional handicraft design 339
D. Shi
VIII
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
Preface
On November 16 to 17, 2014 in Shenzhen, one of the most developed and beautiful cities in China, the 2014
International Conference on Future Communication Technology and Engineering (FCTE2014) was successful
held. It is a great pleasure for me to see so many people come together for the advance of and progress of the
technology in a specific field.
From hand-written mails to telegraphs, fixed-line telephones and today’s mobile phones which could basically
provide a connection to any one at any place in the world, we humans have made tremendous progress in
communications technology.
Instead of coming to an end of development, communication technologies are actually at its fast growing stage;
there are more possibilities for future communication technologies provided by the achievements we have made
rather than limits. For this reason, we have decided to organize this international conference on communication
technologies. It is intended that the innovative ideas and inspiring studies presented at FCTE2014 will benefit
other researches in the future by other people. With the publication of this book, I am sure that this purpose will
be within our reach.
On November 16–17 at the convention, some innovative and inspiring ideas were presented; certain contro-
versial topics were discussed like what the most efficient/convenient methods for information communication
are and what the most possible prospect for future communication technology is. It is truly a difficulty to make
any definite conclusions from those presentations and discussions, but the desire and passion for improvement
and development shown by our participants are surely remarkable and respectable.
In this book, 70 inspiring papers are included, which were chosen from hundreds of submissions contributed
by people from various countries and regions after careful reading and discussing by our diligent reviewers. These
carefully selected papers studied almost every possible aspect of communication technology; the depth of the
researches’ is also thorough and complete. The discussed aspects include communication systems, automation
and control engineering, electrical engineering, AI algorithms, signal processing, data mining, knowledge-based
systems and so on.
Finally, the successful opening of FCTE2014 and publishing of this book is the collective work of many
people’s. As a member of the organizing committee, I would like specially thank these people with all my heart,
including all our participants and contributors, the reviewing committee, the CRC Press and other people who
have shown their kindness to FCTE2014. I earnestly look forward to another chance to work with these people
again in the future.
Kennis Chan
IX
This page intentionally left blank
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
Organizing Committee
Honor Chair
M. Pal, Center for Advanced Materials Processing, India
J. Yeh, Tallinn University of Technology, Estonia
General Chair
Q. Rajesh, National Institute of Technology, India
Program Chair
K. Chan, Advanced Science and Industry Research Center, Hong Kong
XI
This page intentionally left blank
Communication systems and network technologies
This page intentionally left blank
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
K.J. Hou
School of Computer & Communication Engineering, University of Science & Technology Beijing, Beijing, China
F.Y. Hou
School of Information Technology, Deakin University, Melbourne, Australia
ABSTRACT: Radio Frequency (RF) communication is widely used in various fields such as remote control,
data exchanges, and sensor network. It greatly expands the application fields of computing and brings more
facilities to various applications, especially in the consumer electronics filed. As one kind of widely used
technology, the low-cost radio frequency communication system plays an important role. This paper describes the
scheme of low-cost radio frequency communication, including its hardware and software architecture, analyses
the important design issues, such as circuit, protocol, code, security, power consumption, and provides a reference
implementation built from typical radio frequency communication chips.
1 INTRODUCTION
3
processing system. For instance, the main data pro- probability of data error is inevitable, error correct-
cessing system is a computer, and there are several ing code should be appended to ensure the validity of
selective solutions to implement such interfacing. Dif- data transmission. Sometimes, special data code may
ferent solutions bring different cost, complexity and be required due to the characters of the under-layer
data rate. The traditional RS-232 provides the most circuit. For example, a Direct Current (DC) balance
simple and the cheapest interfacing solution to both coding may be required for some RF transceiver
high-end modern computers and low-end embedded chips. Otherwise, the RF circuit cannot work prop-
devices. However, if the required data rate is much erly. Although DC balance coding can be fulfilled
high, the USB interface may be necessary. Other inter- easily through Manchester’s code, it will decrease the
face manners are also possible, for example the plug-in data speed by half. Therefore, other ways like some
PCI card. However, this is more complex. customized coding solutions should be applied to over-
Control Unit does the necessary processing work come such problem (Hou & Dai 2002). Collision
for data preparation, packet assemble, protocol man- detection must be considered for protocol, because
agement and other control work. Usually, it is made most of the low-cost RF system cannot transmit sig-
with an embedded microprocessor with restricted nals together with others during the same period and
memory capacity. The traditional MCS-51 series by using the same frequency. Usually, a simple car-
single-chip controller is more widely used than other rier sensing and random delay is an available way to
microcontrollers. However, if a big computing abil- resolve the problem of collision.
ity or a fast computing speed is required, another
advanced microcontroller such as an ARM based 32-
bit microcontroller should be used to undertake the 2.3 Security
required tasks.
RF communication makes data signal exposed to wide
An RF Transceiver is the core component of the
space, which implies that it is easier to be inter-
RF data communication system. It converts the base
cepted or snooped by others. If sensitive information
band data signals into wave band signals and trans-
is contained in the data packet, corresponding mea-
mits the signals through an antenna. It also undertakes
sures should be applied to prevent adversaries from
the task of wave band signals receiving, converting
understanding the meaning of the data. Methods like
the signals into base band signals to be recognized by
Chaffing and winnowing can be used to realize such
back-end data processing parts. Usually, a low-cost RF
purpose (Rivest 1998). However, the real safe way
Transceiver is built from single-chip RF transceiver,
is to encrypt the data through cryptograph opera-
together with a small quantity of peripheral circuit ele-
tions (Boncella 2002, Denis 2006). Data integrity
ments. There are many such single-chip RF transceiver
should also be protected for secure purpose besides
solutions. Range, modulation mode, transfer speed, a
data privacy. That is to say, data confidentiality and
working frequency, and other considerations will play
integrity must be assured through cryptograph method
a part in making a selection from the options avail-
when security is required for RF communication
able. For example, the Frequency Modulation (FM)
system.
can provide a more reliable link than an Amplitude
Based on cryptography operations, encryption can
Modulation (AM) for mobile applications, because
convert the transferred plaintext data into its cipher
the device may experience a lot of sudden drops in
text form to maintain confidentiality, while Mes-
amplitude. Frequency modulation is not as sensitive
sage Authentication Code (MAC) can be attached to
as amplitude modulation to such influences.
check data integrity. Although there are many mature
and reliable cryptography algorithms, they all have
the property of intensive computing. This property
2.2 Protocol
requires the processing unit for cryptography exe-
Protocol is indispensable for any communication sys- cution must have powerful computing ability, which
tem. Usually, data to be transferred are assembled into is un-available for low-end microcontrollers like the
separate packets. Protocol is used by both the trans- MCS-51 series single chip microcomputers. If the RF
mitter and the receiver to establish and maintain the system is attached to a powerful computer (e.g., a lap-
wireless data link. Hand shaking, data length, data top computer), data encryption and related integrity
speed, data code, error control, flow control, as well code calculation can be executed in the main proces-
as any other details to understand and control the data sor of the computer. If data has to be processed in tiny
packets, are all the content of communication protocol. microcontroller, complicated cryptography algorithms
There are several common points that should be with high encryption intensity cannot be executed
carefully considered for protocol design: the packet smoothly. In such situations, systems may enhance
length, data speed, data code, error verification, and the encryption intensity through other remedial ways.
collision detection. Considering the RF working envi- For example, Data Encryption Standard (DES) can
ronment, the data packet should not be very long. run in MCS-51 series single chip microcomputers.
Besides, as for how the data speed can be reached, the So designers can set multiple secret keys and run
working environment should be taken into account. DES for multiple times. Although such measures can-
Generally, a short data length and a slow data speed not reach complete cryptography security, they can
are helpful to establish a stable RF data link. If a high actually create greater difficulties for attackers.
4
TR3000 chip. Among these peripheral components,
Automatic Gain Control (AGC) and threshold sen-
sitivity adjustment will affect the quality of the RF
demodulation. When long distance communication is
required, threshold sensitivity can be adjusted to much
higher SNR to get bigger receiving gain. But this
will incur more data errors, which should be removed
by other applications such as Error Correction Code
(ECC).
An RF signal is radiated and received through an
Figure 2. An instance of RF communication system. antenna. No matter what kind of antenna is chosen,
filter, matching and amplification should be deployed
between the antenna and the transceiver chip. A Sur-
2.4 Low power consumption face Acoustic Wave (SAW) filter provides receiver
out-of-band rejection and suppresses output harmon-
More and more consumer electronics and embedded ics for transmitter. Impedance matching must be prop-
devices are mobile devices, and their attached RF units erly set for antenna. If necessary, such as long distance
are also mobile. One of the most important factors is required (Chow et al. 2013), radio amplifier or high
for a mobile device is its power consumption, which frequency amplifier will be installed to improve the
is a decisive factor in the feasibility of the devices. emissive radio wave power.
To decrease the power consumption, measures can If the RF communication system should be attached
be applied on circuit level or system level. Circuit to other computers, such as being attached to a laptop
level means to choose those circuit components with computer, the traditional RS-232 interface can link
power save abilities. For example, a chip with SLEEP them together. However, due to the problem of volt-
(or IDLE, POWER DOWN) working modes can sig- age matching, the UART signals must convert their
nificantly save power when it enters into idle status. voltage before connecting with the laptop computer.
System level measures mean that hardware and soft- Otherwise, damages may occur. Such converting can
ware measures should be comprehensively applied. be finished by special single chip dual driver/receivers
For example, a signal amplification circuit can be that include capacitive voltage generators, such as the
turned off by a software instruction to minimize the MAX232.
static current, when there is no data signal to be
transmitted.
3.2 Software realizations
2.5 Antennae Most of the related control work is executed through
programs, such as packet buffering, flow control, and
An antenna is often a neglected factor. However, it
error detection, which run by the microcontroller of
is very important for the quality of RF communica-
AT89C4051. It is an 8-bit microcontroller with 4
tion. The design and fabrication of antennae is a very
kbytes flash memory. If necessary, the off-chip mem-
professional task, which is beyond the skill of com-
ory should be installed to extend its memory space.
mon computer and communication researchers and
Control work is various. Here we only describe packet
engineers. Different antennae have different gains and
formatting, error detection, DC balance coding and
directionalities. For example, a whip antenna has good
data encrypting.
gain and is omnidirectional, but it has a certain length
For packet formatting, the total packet length should
which makes it difficult to be contained into small
not be too long. A preamble bit stream should be
devices. Some special integrated antennae are small,
applied, but its content needs to be specified according
omnidirectional, and good at signal gains. However,
to specific requirements. For the TR3000 transceiver,
they may increase the cost of the final product.
the preamble bit stream takes the effect of slicing sym-
metry. Besides the effect of slicing symmetry, maybe
the starting of a new packet need to be indicated by
3 IMPLEMENTATIONS
the preamble bit stream. To realize such a purpose, a
barker code with sharp single peak characteristic of
3.1 Hardware realizations
self-correlation function is much helpful.
An RF communication system based on TR3000 [5] In most wireless applications, error detection, even
single chip transceiver and AT89C2051 microcon- error correction must be applied to improve the
troller is implemented as in Figure 2. data exchange reliability. To detect errors, the simple
In Figure 2, TR3000 is the single chip RF even-odd check is not very appropriate, because the
transceiver, which provides both On-Off Keyed (OOK) probability of error may be much higher in wireless
and amplitude-shift keyed (ASK) modulations. The situations. To enhance the ability of error detection,
OOK modulation is better for power conservation a Cyclic Redundancy Check (CRC) based checking
and link reliability, while ASK allows more fast data result should be calculated and attached to the packet.
rates. Several circuit components are installed around Fortunately, CRC calculation is not strong enough
5
Table 1. Dynamically DC balanced coding. related transformations. To enhance encryption secu-
rity, more rounds with different secret keys can be
Original half-byte of 4 bits 6 bits coding result applied to make a remedy for the weakness of a DES
algorithm.
0000 010101
0001 110001
0010 110010
0011 100011 4 CONCLUSION
…………
1111 011100 As wireless data exchange gets more and more pop-
ular for consumer electronics devices and various
embedded devices, building a low-cost RF commu-
nication has great application value. A low cost RF
for low-end microcontrollers. But CRC based check- communication system has its special characteris-
ing cannot reach the level of cryptograph security. tics, which restrict their designs and realizations. It
It should only be used for the purpose to detect the also faces special problems, which need different
data link error, not for the purpose of resistance against solutions from wired data linking. Key techniques
malicious data hackers. involving transceiver chip, controller, protocol man-
Due to the characteristics of the inner circuit of agement, coding, security, and others, are analysed.
TR3000 chip, the bit stream to be transmitted should Corresponding solutions or measures are described.
maintain DC balance. Although Manchester’s coding Also, a specific instance of a low-cost RF communica-
is perfect at DC balance, it will reduce the data speed tion system is implemented. With deeper applications
by half. As the DC balance requirement is not very and further demands emerging, further research work
strict for the chip (that is, it need not to be 1-0-1-0-by should be dedicated to improving the quality of com-
turns strictly; it just need to be equal in the number munication links and enhancing the security of data
of bit “1” and the number of bit “0”, during one bits protection.
slicing), a dynamically DC balanced coding can be
applied as in Table 1.
This coding scheme replaces each one 8-bit byte REFERENCES
with a 12-bit result. Although it is not strictly overturn
each next bit, the total number of bit of ‘1’ is equal E.Y. Chow, M.M. Morris & P.P. Irazoqui. 2013. Implantable
to the total number of bit of ‘0’, if they are counting RF Medical Devices: The Benefits of High-Speed Com-
munication and Much Greater Communication Distances
during the slicing of sequential 12 bits. In such way,
in Biomedical Applications. Microwave Magazine, IEEE
the requirement of DC balance is fulfilled, while the 14 (4): 64–73.
data speed is also maintained. D.P. Agrawal & Q.-A. Zeng. 2011. Introduction to Wireless
With the low-end microcontroller as the main pro- and Mobile Systems (3rd Edition). Stamford: Cengage
cessor for data processing, encryption is difficult to Learning
be implemented, especially for those advanced crypto- F.Y. Hou & K. Dai. 2002. The Design and Realization
graphic algorithms like the AES Advanced Encryption of Computer RF-communication System. Application
Standard (AES) or RSA public key encryption. With- Research of Computers 19(12).
out a high performance processor or co-processor, Jeffrey S. Beasley. 2008. Computer Networking (2nd Edi-
tion). Upper Saddle River: Prentice Hall.
only relatively simple encryption algorithms can be
Jeffrey S. Beasley & Gary M. Miller. 2007. Modern Elec-
implemented. Here, a DES based encryption can be tronic Communication (9th ed.). Upper Saddle River:
programmed into AT89C4051 using assemble lan- Prentice Hall.
guage of MCS-51 series instructions. DES uses 56 bits Robert J. Boncella. 2002. Wireless Security: An Overview.
key sizes and operates on 64 bits block size. Although Communications of the Association for Information
it is not very secure due to the short length of the Systems 9 (Article 15): 269–282.
secret key, it can still provide confidentiality protec- R.L. Rivest. 1998. Chaffing and winnowing: Confidentiality
tion for many situations. The entire DES realization without encryption. CryptoBytes 4(1): 12–17.
involves many procedures, such as block expansion Theodore S. Rappaport. 2011. Wireless Communications:
Principles and Practice (2nd Edition). Upper Saddle River:
and key mixing. Among these procedures, the con-
Prentice Hall.
struction and the storage of the s-box of DES are Tom St Denis. 2006. Cryptography for Developers. Rockland:
crucial to the realization optimizing. To obtain fine Syngress.
performance, program can use more memory space TR3000 hybrid transceiver. 2014. http://www.rfm.com.
to facilitate the storing, looking and fetching of the XE1202 FSK transceiver. 2014. http://www.semtech.com.
6
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
A link evaluator: A channel quality estimator for Voice over Internet Protocol
(VoIP) communications
ABSTRACT: VoIP telephony has grown more and more widespread over the years, but it’s still a relatively
young technology which has not yet reached the maturity of traditional telephony, owing to several unresolved
challenges. One major issue stems from the underlying UDP/IP protocol stack, which lacks an adequate QoS
policy. This paper proposes an algorithm, named Link Evaluator, which evaluates channel quality, and analyses
statistical parameters that are important to VoIP applications.
7
are delivered sequentially and in a timely manner, since There are also attempts to objectively evaluate the
they all travel in a specific dedicated circuit, and many conversational or listening quality.
of these issues are not present. Data consistency in A relatively new algorithm regarding this approach
packet switched networks can be still guaranteed using is Perceptual Objective Listening Quality Assessment
application level protocols, but due to the time-critical (POLQA (ITU-T, 2011). It was standardized by ITU-T
nature of the payload, if it is not delivered in a timely in 2011 as the successor of the more obsolete Per-
manner, several side effects might degrade the audio ceptual Evaluation of Speech Quality (PESQ ITU-T,
stream quality. 2001), resolving a few issues with higher-bandwidth
Recommendations concerning network conditions encoded audio and providing higher accuracy with
have been formulated in the past. A one-way end- modern mobile networks evaluation.
to-end delay larger than 300 ms, according to ITU-T POLQA is a full-reference algorithm, which means
recommendation G.114 (ITU-T, 2003a), is considered it works by comparing the degraded audio signal to the
not acceptable for most user applications. Interarrival original. This means it can only be used in a planned
jitter compensated by jitter buffers must not be higher test environment, and it cannot be integrated into
than 100 ms (Cisco Systems, 2001). measurement tools that operate in real life situations.
Assuming a pre-set hardware set cannot be changed
(which is often the case with embedded devices with
VoIP capability, such as VoIP phones or smartphones), 4 LINK EVALUATOR
choosing the appropriate codec for the available net-
work is therefore essential. In certain scenarios it is important to know whether a
It is also very important how the VoIP client con- VoIP call results in acceptable quality before such call
nects to the access point providing internet access. is started. For example, knowing the network condi-
Ideally, a cable provides the most reliable bridge tions before the call is initiated allows the setting up
between the client and the access point, but it is of more efficiently certain audio codecs. It can also
not always possible to use wires, most notably in avoid the frustration of attempting a VoIP call with
the mobile VoIP domain. At best, the mobile device bad network conditions.
is connected to an access point via 802.11, but in As already stated, available solutions either are
more realistic scenarios a mobile phone obtains inter- unsuitable for real-life applications, or operate while
net access via 3G/pre-4G networks. Older generation the call is ongoing. In order to satisfy the need to
networks like HDSPA/HUSPA, were proven to be evaluate network conditions before call initiation, an
unsuitable for VoIP (Arjona, 2009), but with the advent algorithm named Link Evaluator was developed.
of LTE, the scenario is different. An approach con- Link Evaluator was not designed to evaluate audio
sists in using the traditional VoIP technologies on quality, as it does not inspect the packets’ payload.
top of LTE networks, with the same issues and con- It is tailored to work in conjunction with the well-
straints, but there is a new technology named Voice known G.729 audio codec: it may not be as accurate
over LTE (VoLTE) which defines a real-time pro- as other codecs without proper adjustments, but such
tocol built from scratch, tailored for mobile pre-4G adjustments are relatively trivial once the structure of
networks. the audio frame is known.
The evaluation consists of two sequential steps: ini-
tially, statistical data is acquired using Quality Check
3 RELATED WORK Protocol (QCP), which is part of the link evalua-
tor specification, and then an evaluation algorithm
There are at least two existing technologies which can analyses the data and determines link quality.
be used to evaluate the VoIP QoS. The first one is
RTPC, which is part of the RTP (IETF, 2003a) protocol
4.1 Quality Check Protocol
defined in the same RFC. Its purpose is to provide
statistical information relevant to QoS while the real- Quality Check Protocol (QCP) is the name given to
time data is being transmitted. the network protocol responsible for the acquisition
Information transmitted in the protocol payload of all the QoS parameters involved into the evaluation
includes means for estimating one-way delay, inter- phase. Its design revolves around the idea that a QCP
arrival jitter, and packet loss, valuable parameters for packet must also be an RTP packet, implying that all
any kind of QoS estimation. the QCP data is encapsulated inside an RTP packet as
There also exists an extension of RTPC, named payload.
RTPC XR (IETF, 2003b), which further extends the This makes the QCP packet appear like it was an
range of estimated network parameters by adding RTP packet, which is essential since statistical data
packet loss ratio, call quality evaluation in terms of is collected by analysing dummy traffic sent in QCP
an MOS score, round trip time, and SNR information. packets.
RTPC evaluates network conditions while the call is In order to make the estimations reasonably accu-
ongoing, and it is not possible to evaluate network rate, this traffic must resemble as much as possible
conditions beforehand. Currently, no RTP extension the application traffic. Resemblance is also impor-
provides such service to the user. tant if the packets must traverse certain nodes which
8
determined after empirical tests that were conducted
on a real network.
It is worth noting that once the client enters the
‘completed’ state, all subsequently received DATA
packets are discarded because the state expects anACK
packet. This can cause an approximation error in the
calculation of the packet loss ratio if the network is so
slow that is unable to send all his DATA packets before
the client changes state.
In this state, all QoS parameters should be gathered
and processed, although the protocol itself is indepen-
dent of how these parameters should be calculated.
Figure 1. Link evaluator state machine diagram.
Completed state
This is a transitory state where the client sends an END
packet to the server and puts itself into the ‘ending’
offer different QoS profiles to different packet types,
state. If the transmission of the END packet fails twice,
because the probe packets could be treated differently
the client goes back into the ‘idle’ state, however the
if they do not appear as RTP packets.
computed parameters data is kept, and is available for
The protocol can be used in P2P applications,
the evaluation algorithm.
although during its runtime there is always a ‘client’
node (which initiates the evaluation request) and Ending state
a ‘server’ node (which replies to the evaluation In this state the client waits for an ACK packet. If
requests). the ACK packet is not received after one second,
another END packet is sent, and the client waits again
4.1.1 Protocol description for an ACK. If the transmission of the ACK packet
The way the protocol works is described by the state fails a second time, the client resets into the ‘idle’
machine diagram shown in Figure 1. state. Otherwise, if the ACK packet is received within
one second, the client changes its state to ‘idle’, and
Idle state also updates the evaluation data with the information
The default state. Whenever the client wants to initi- about sent packets placed by the server in the packet
ate network evaluation, the protocol changes from this payload.
state to the ‘starting’ state, and sends a START packet
to the server. If any network error or two consecutive
timeouts occur, the protocol will revert back to this 4.1.2 Packet format
state. As QCP packets are basically RTP packets with QCP
protocol payload, they are all structured so that they
have the same size of an RTP packet carrying 40 ms of
Starting state
G.729 payload (40 bytes of IP/UDP/RTP headers + 40
In this state the client waits for an ACK packet. If the
bytes of payload). Of this payload, 12 bytes are occu-
ACK packet is not received after one second, another
pied by QCP header data and the remaining 28 bytes
START packet is sent, and the client waits again for
are normally unused.
an ACK. If the transmission of the ACK packet fails a
While most of the protocol packet types are essen-
second time, the client resets into the ‘idle’ state. Oth-
tially service packets used to control the protocol state,
erwise, if the ACK packet is received within 1 second,
the DATA packets contain the parameters, taken into
the client changes its state to sending’.
account during the evaluation, and are therefore worth
describing in detail. Figure 2 displays the structure
Sending state of the DATA packet excluding IP/UDP/RTP headers,
In this state, DATA packets are exchanged between which is composed by several fields:
the client and the server. However, the server does not
start sending DATA packets until the client success- Version Number (4 bit): protocol version.
fully delivers the first one. The client sends exactly Reserved (8 bit): reserved for future usage.
150 DATA packets (the equivalent of 6 seconds of Packet Type (4 bit): packet type.
G.729 speech) at an interval of 40 ms in order to Cumulative Packets Lost (16 bit): total packets lost
simulate real RTP packet exchange between the two during the data exchange phase.
nodes. After dispatching 150 packets, the client enters Jitter (16 bit): interarrival jitter of the previous packet
the completed’ state if no critical error occurs (oth- in milliseconds.
erwise it would return to ‘idle’ state). The number of Delay since last received packet (16 bit): time elapsed
sent packets is an acceptable trade-off between algo- since the last packet was received in milliseconds.
rithm accuracy and costs (in terms of battery, time Last received packet sequence number (16 bit):
and data plan) and corresponds to about 6 seconds of sequence number of the last received packet.
conversation. The appropriate algorithm duration was Unused (28 bytes): unused payload bytes.
9
currently limited to the usage of a particular codec,
and it does not take into account bandwidth estimation
techniques, which play an important role in scenarios
where bandwidth is dynamically allocated.
Future work may extend the algorithm so that allows
the usage of bandwidth estimation techniques to fur-
ther improve the accuracy of the network conditions’
evaluation. It also needs to be more flexible with
Figure 2. Structure of the DATA packet.
regards to codec selection in order to be used within a
larger spectrum of scenarios.
4.2 Evaluation algorithm
The evaluation algorithm challenges the collected
QoS parameters against the following constraints: ACKNOWLEDGEMENTS
1. Average interarrival jitter less than 100 ms This work was developed under the project S.R.S. –
2. Maximum interarrival jitter less than 250 ms Progetto di Formazione Integrato SINERGREEN
3. Interarrival jitter must surpass the average jitter (Smart Intelligent Energy Green), RES-NOVAE,
threshold (100 ms) at least once. SEM” supported by MIUR (Minister of Education,
4. Average round trip time less than 300 ms University and Research).
5. Packet loss ratio is less than 5%.
If any of these conditions is not satisfied, VoIP calls
are deemed not feasible. REFERENCES
Note that there are two sets of QoS parameters that
Arjona, A. 2009. A study of mobile VoIP performance in
are tested by the evaluator: the local data set (locally
wireless broadband networks.
computed parameters) and the server data set (received Cisco Systems 2001. Quality of Service for Voice over
from the server in DATA packets). This is to test link IP. http://www.cisco.com/en/US/docs/ios/solutions_docs/
reliability in both ways. qos_solutions/QoSVoIP/QoSVoIP.pdf
Constraints two and three are ways to control the IETF 2003a. RFC 3550: RTP: A Transport Protocol for Real-
amount and length of gaps that can occur during a Time Applications.
conversation. Having a jitter higher than 100 ms means IETF 2003b. RFC 3611: RTP Control Protocol Extended
that jitter buffer is not large enough to compensate, Reports (RTCP XR).
causing a gap in the audio playback due to a buffer IETF 2012. RFC 6716: Definition of the Opus Audio Codec.
ITU-T 1988. ITU-T Recommendation G.711: Pulse code
underrun; having more than one gap in six seconds
modulation (PCM) of voice frequencies.
of conversation results in an unacceptable call quality. ITU-T 1996a. ITU-T Recommendation G.729: Coding of
Furthermore, if maximum jitter is too high, the caused speech at 8 kbit/s using conjugate-structure algebraic-
gap is extended beyond acceptable levels, and, for this code-excited linear prediction (CS-ACELP).
reason, the constraint 3 exists. ITU-T 1996b. ITU-T Recommendation P.800: Methods for
The average round trip time constraint is to ensure objective and subjective assessment of quality.
delay effects do not degrade call quality too much. If ITU-T 2001. ITU-T Recommendation P.862: Perceptual
the average RTT is too large, the increased latency Evaluation of Speech Quality (PESQ): An Objective
causes acoustic delay, which negatively affects call Method for End-To-End Speech Quality Assessment of
Narrow-Band Telephone Networks and Speech Codecs.
quality.
ITU-T 2003a. ITU-T Recommendation G.114: One-way
The last constraint concerning packet loss ratio is transmission time.
also used to control the amount of gaps, since high ITU-T 2003b. ITU-T Recommendation G.722.2: Wideband
packet loss can be a cause of buffer underruns. coding of speech at around 16 kbit/s using Adaptive Multi-
Rate Wideband (AMR-WB).
ITU-T 2011. ITU-T Recommendation P.863: Perceptual
5 CONCLUSIONS Objective Listening Quality Assessment.
10
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
ABSTRACT: Based on the requirements of interstellar communication and high bit rate transmission of infor-
mation, we discussed the possibility of the superluminal communications in future, the restraints of special
relativity and SB theory and the time advance in negative dispersion media. Meanwhile, we have pointed out
that the pulse reshape in high negative dispersion media can satisfy the requirement of bit error rate.
11
And moves with a group velocity
12
and it only produces a loss (or gain) of the transmis- the result should as a observer which is still rela-
sion energy. So that for monochromatic light ω = εE 2 , tive to the earth, since light velocity is independent
we can get ve = vp ; and for light pulse ve ≈ vg . In such of the observer. Therefore, he asserted that all phys-
case, the centre of gravity of the pulse may not be ical laws should be at covariance under the Lorentz
consistent with the peak owing to the broadening of transformation. But what is the real situation? The
the pulse may be asymmetric. The conclusion that ve experimental result shows that this assert made by
must be less than c is wrong. As we know both of vp Einstein is wrong. The interference of two light beams
and vg can be larger than c certainly. In such case, we shows that the other beam is rest relative to you fol-
think that the group velocity vg is more precise than lowing a light beam. If other beam travels with c, yet,
the velocity ve to describe the velocity of energy trans- the phase difference between two beams will change
mission and still represents the velocity of a signal in rapidly and the result is that no interference fringe
negative dispersion region for digital communications. appears after combining two beams. Of course that
The pulse is an assembly of photons or electric fields is not true. The interference experiment shows that the
in time-space, and pulse reshape under the action of light velocity depends on the state of the observer cer-
dispersion of medium (or interference) can make the tainly even if in vacuum. The time – space covariance
transmission velocity go up or slow down.These pulses should be s2 − (ct)2 = s2 − (c t )2 . Generally c = c ,
are detectable and show that they tote the energy and this equation has no solution; therefore the Lorentz
can be used to transfer information. transformation does not exist. But when v c, we can
consider c ≈ c , only in this situation, the Lorentz trans-
formation can be used approximately. So that relativity
3.2 Is the propagation of the information faster is only valid for v c approximately. We also sug-
than c? gested [9] a new time-space transformation instead of
the Lorentz transformation. That is
According to the theory of special relativity, Einstein
said: no body (including a signal) can move faster than
c [8]. For developing superluminal communications
we must answer this question: is Einstein’s conclusion
correct? Therefore, we studied the special relativity
Here x0 is an initial distance between two systems,
carefully and found that Einstein’s conclusion was
v is relative velocity, and defined v > 0 if distance
incorrect too, and pointed out that the superluminal
x increases and v < 0 if x decreases. We have dis-
motion was a natural phenomenon. Here introducing
cussed this in paper [9]. Real visual mechanics also
our study result briefly.
recognizes that superluminal motion is a natural phe-
First, we think there are two kinds of epistemology
nomenon [10]. Therefore information can propagate
for knowing the external world,
faster than c certainly in theory.
1. Objective epistemology: external body exists
objectively and independent of our observa-
tion. Classical mechanics and quantum mechanics 4 PROSPECT OF SUPERLUMINAL OPTICAL
belong to this category, they study the real law COMMUNICATIONS
of body motion (in macro or micro scope) and
recognize the superluminal motion; 4.1 Advantage of the superluminal communications
2. Subjective epistemology. We cognize the existence
At present, the information that needs to be exchanged
of an external body through observation and rel-
increases rapidly. Because of the limitation of the capa-
ativity and astronomy belong to such a theory of
bility of the Opto-electric techniques, the bite rate
knowledge. They only deal with the image of the
transmitted by each channel is about 10–20 Gb/s. In
body and the study of the visual laws of body
order to fit the requirement of the need to increase
motion. We also can perceive relativity as a visual
information exchange, a Dense Wavelength Division
mechanics.
Multiplex (DWDM) and multi-core fibre technique
Since light’s speed is limited, there are differences have been adopted, all of them increasing the complex-
between real and visual law. So that, the conclusion ity of the system. If the velocity of a signal is faster
of special relativity may not be suitable for the real than c, if suppose its velocity can reach as high as 100c,
situation. obviously one channel can has a several Tb/s infor-
Second, we also found there is a serious mistake mation capacity. A single channel will simplify the
in special relativity that is based on two principles: 1. technique of dispersion and non-linearity compensa-
The relativity principle: (include special and general tion, as well as the exchange and multiplex techniques.
relativity principle); 2. The principle of light velocity It will also lessen the need for the fabrication of fibre
invariance: at any time the light velocity in vacuum and the cost of the system will decrease. In the vg < 0
is c. Albert Einstein thought the light velocity was situation, since the time advance of output pulse hap-
independent of both the light source and the observer pens, we can manufacture a ‘time compensator’ to
since it is the solution of the Maxwell equation. He shorten the transmission time of information. From
thought (Einstein’s paradox) that if you follow a light the construction of the information highway, only after
beam, go forward and looked at other light beam getting faster signal transmission speed to lealize the
13
Figure 2. Simulated Curves of refractive index n and gain Figure 3. Curve of deviation of index n. — Real; --- Imag.
coefficient in WKD Experiment [1].
14
4.3 The practical problems faced by superluminal it is time to start experimental research immediately.
communications In the future the research may still meet some prob-
lems needed to solve. But compared with the theoretic
Although the superluminal propagation of light pulses
barrier, these difficulties cannot figure out what we
has been observed, and the theoretic research has
need, and we would like to cooperate with all peo-
been done, but in practice it maybe meet some new
ple interesting in superluminal communication around
problems. So it still has a long way to go before prac-
the world and push the research work of superluminal
tical application. At first, since the medium has larger
communications forward.
negative dispersion, the distortion of light pulses is
larger and limits the long distance transmission of light
pulses. Fortunately as we see from Fig. 3, 4 dn/dω and REFERENCES
d2 n/dω2 are not too large and are relatively flat in the
middle region, so that this distortion may be not be [1] G.P. Agrawal. Nonlinear Fiber Optics, 2nd. ed. (Aca-
serious. On the other hand, this distortion can be cor- demic Press, 1995).
rected by some approaches of the waveform control [2] Huang Zhi-xun. Recent Advances in Faster Than Light
technique. Secondly, since dispersion dn/dω depends Research. National Defence Industry Press 2002).
on parameter M, therefore vg also depends on the Huang Zhi-xun; Theory and Experiments of Faster than
intensity of pumping laser beam and the density of Light Research; (Academic Press 2005).
[3] Wang L.J., KuzmichA., DogariuA. Gain-assisted super-
medium atoms devoted to χ, so that the time jitter is
luminal light propagation, Nature, 2000, 406, 277–279
important, since the clock information also follows the [4] Zhang Zihua, Zhang Huaan. Superluminal Phenomena
signal transmission. In such case the problem of time and its influence on Physics and Informatics. 6th sym-
jitter will be another research items. At last, in superlu- posium of Photonics of China, Oct. 2008, Chongqing.
minal communications, the requirement of frequency [5] Zhang zi hua, Zhang Hua an, Cause of superluminal
stabilization of light sources and the narrow width of transmission of light pulse and Photon Capture (AOM
spectral lines increase; to raise the laser quality is also 2010 – OSA-IEEE Topical Conference, Advances in
important. On the other hand, how to keep superlumi- Optoelectronics & Micro/nano-Optics, 3–6 Dec, 2010,
nal pulse propagates long distance without distortion Guang zhou, China) Zhang zi hua, Reshape and Supe-
luminal propagation of light pulses in media with
is still the primary task. Superluminal communication
Negative dispersion, Chinese Scientists 2011, No. 1,
systems in future can only be employed in trunk or spe- pp. 1–7.
cial lines. But the techniques of time compensation can [6] Zhang zi hua, the distortion-less propagation of the
be applied in remote control and remote measurement Superluminal light pulses, “Shen Shi Zhi Guang”, the
in space navigation. Literature of reform and innovation of China. (Press of
Our research [4] also shows that the velocity of Science and Literature of China 2009, Beijing).
information transmission is phase velocity vp of the [7] Brillouin. L. Wave propagation and group velocity,
load wave in analogy communications and is group (Academic Press, New York 1960).
velocity vg in digital communications. [8] A. Einstein, Relativity, (Methuen & Co Ltd Methuen &
Co Ltd, 1916)
[9] Zi-hua Zhang, Hua-an Zhang, Zhi-ying Zhong, Correct-
ing the mistake of the Principle of light invariance and
its effect. ICOELC. June 2014, Taiyuan, China.
5 SUMMARY Aplied Mechanics and Materials Vols 651-653 p.2287
(TTP Ltd. Switzerland).
In this paper we discussed the possibility of the super- [10] Cyclopedia of China (Electrical and Electronic tech-
luminal communications. Our conclusion is that the nology, 2002) (Press of Cyclopaedia of China, 2002
superluminal communications are certainly possible Beijing).
and the theoretic problem has been solved. We think [11] R. Y. Chiao, Phys. Rev. A 48, R34 (1993).
15
This page intentionally left blank
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
X. Li
Unit 62041, Changchun, Jilin, China
H.Y. He
Luoyang University of Foreign Languages, Luoyang, Henan, China
ABSTRACT: Multi-wavelength repeaterless undersea optical fibre cable transmission is a credible commu-
nication method with big capability to satisfy the requirement of communication across the sea. This paper
discusses the influences from chromatic dispersion, polarization mode dispersion and nonlinearity. According
to the simulation results on the platform of OptSim, we selected the wavelength of 1546.12 nm, 1547.72 nm,
1549.32 nm, 1550.92 nm and CSRZ code to optimize the wavelength and coding simultaneously. As a result, the
eye diagram of each channel is clear and their performances have little difference between them. The system
performance has been improved well and the transmission distance is further extended.
17
Figure 1. Change curve of Q factors of channel 3 with the
change of DCF length.
Figure 2. Attainable range of transverse stress and bending
DDCF , DSMF are respectively dispersion coefficient of radius (a) and attainable range of external plus axial tensile
DCF and Single-Mode Fibre (SMF). LDCF , LSMF are strain and bending radius (b).
respectively length of DCF and SMF. η = 1 is fully-
compensation. η < 1 is owed-compensation. η > 1 is since the simulation cannot simulate complex under-
over-compensation. The owed-compensation is cho- sea environments, various environmental factors will
sen in the system. Dispersion Compensation Module influence PMD randomly, and the PMD produced by
(DCM) is used to compensate on the receiving shore. external factors may not be higher than 38 ps [4].
DCF and loss simulator are used to simulate the DCM. To further illustrate the influence of the stress and
η changes from 0.7 to 0.9 by changing the length of bending on PMD, Figure 2(a) shows the attainable
DCF. The channel 1 and 4 can achieve error-free trans- range of transverse stress and bending radius and
mission. Figure 1 shows the change curve of Q factors Figure 2(b) shows the attainable external range plus
of channel 3 (the worst channel) with the change of axial tensile strain and bending radius.
DCF length. As is shown in Figure 2(a), the transverse stress that
As is shown in Figure 1, Q factor of channel 3 is the system can endure decreases gradually with the
the largest when the DCF length is 73 km (η is 78%). increase of the PMD coefficient. When the bending
System margin of channel 3 improves 0.2 dB. There radius is less than 0.3 m, the transverse stress that the
may be two reasons: one is that wavelength selection system can endure increases sharply with the increase
makes the channel 3 have more nonlinear product, of the bending radius. When the bending radius is
original channel power reduce, and noise increase more than 0.3 m, the transverse stress has no change
and performance become poor. The other is that the basically with the increase of the bending radius. At
amplifier gain is not flat which makes the Optical this time, birefringence induced by transverse stress
Signal Noise Ratio (OSNR) of channel 3 lower. As plays a decisive role. It can be concluded that when
a result, we change the wavelength to 1549.32 nm, the PMD coefficient is 0.04 ps/km1/2 , the transverse
1550.92 nm, 1552.52 nm, 1554.13 nm without any dis- stress and bending radius should be taken under the
persion compensation and the system margin of each curve range to ensure the system is not affected by
of the channels are shown as follows: channel 1 is PMD, while eliminating the PMD compensation. For
13.34 dB, channel 2 is 13.18 dB, channel 3 is 1.12 dB, example, transverse stress is required not to be greater
and channel 4 is 10.96 dB. Channel 1, 2 and 4 are than 8.9 N/m when bending radius is 0.3 m.
free-error. Channel 3’s performance is the worst and As is shown in Figure 2(b), the tensile strain that
differs from the other channels more. It is necessary the system can endure decreases gradually with the
to optimize the choice of channel wavelength. increase of the PMD coefficient. The tensile strain
increases linearly with the increase of bending radius.
When the PMD coefficient is 0.04 ps/km1/2 , the value
3 EFFECTS AND OPTIMIZATION OF PMD of the bending radius is larger than that in Figure 4.
When the bend radius changes from 1 m to 10 m, the
In undersea optical fibre cable transmission system, range of the tensile strain is 0 to 0.3 basically. As long
the PMD will become one of the major limiting factors as taking the value under the curve range, we can
in long-distance transmission because of the uncer- ensure the system is not affected by the PMD while
tainty of applications environment. It broadens the eliminating any PMD compensation. For example,
pulse, limits the transmission rate, and affects the when the PMD coefficient is 0.04 ps/km1/2 and the
system’s transmission performance [3]. bending radius is 0.3 m, the tensile strain is required
The PMD will cause pulse broadening and distor- to be not greater than 0.05.
tion and interference between codes in a WDM system.
By analysing the experimental eye diagram, the eye
4 EFFECTS AND OPTIMIZATION OF
opening of the worst channel has increased a little. The
NONLINEARITY
BER reduces to 2.95 × 10−6 and the system margin is
4.93 dB. System margin has improved 0.86 dB rela-
4.1 Effects and simulation of nonlinearity
tively to the system considering PMD (system margin
with PMD is 4.07 dB). Overall, the impact of PMD on Fibre nonlinearity can be divided into two categories
the system is not great and can be neglected. However, [5]. One is a scattering effect including Stimulated
18
Raman Scattering (SRS) and Stimulated Brillouin
Scattering (SBS). The other is the Kerr effect including
Self-Phase Modulation (SPM), Cross-Phase Modula-
tion (XPM) and Four-Wave Mixing (FWM).
Through analysing the worst channel simulation,
the BER is 2.01 × 10−5 and the system margin is
4.07 dB when considering SPM, XPM and FWM. The
BER is 1.05 × 10−10 and the system margin is 7.87 dB
without FWM. The BER is 9.11 × 10−17 and the sys-
tem margin is 10.12 dB without SPM, XPM or FWM.
It can be seen that the system margin can improve by Figure 3. Relation between system margin and EDF length
3.8 dB without FWM, and the BER is lower and the in power amplifier module (a) and relation between system
eye diagram is clearer. The system then adds 2.25 dB margin and EDF length in remote-booster gain module (b)
redundancy, system performance improves, eye open- (with FEC).
ing is bigger, jitter amplitude decreases and the eye
becomes clearer. Therefore, the Kerr effect has a great
impact on the system, making the system margin remote-booster module and the corresponding fibre
reduce 6.05 dB. It is necessary to reduce the impact input power are different. When we use the CSRZ,
of the Kerr effect on the system performance. system, the performance improves well and the sys-
When considering SBS and SRS, the BER is tem margin increases. Therefore, when we optimize
2.01 × 10−5 . And the BER reduces to 3.51 × 10−6 the system, we can select the CSRZ code to extend the
without SBS. We can see that SBS has little impact on transmission distance.
the system. Furthermore, seen from the transmission
power loss, the signal power in 75 km section of the
fibre loses 0.022 dBm due to SBS and on the 280 km 4.3 The optimization of adjacent channel spacing
section the loss of signal power is up to 0.769 dBm. and channel wavelength
Moreover, the higher the input power, the longer the
4.3.1 The optimization of adjacent channel spacing
transmission fibre, the greater will be the line loss
The channel spacing, the light power density, the power
caused by SBS. Therefore, choosing the right input
into fibre, dispersion, etc. are the major limiting fac-
power is very important to reduce the power loss
tors affecting the WDM system. And these factors
caused by SBS. When the Raman Effect in a Raman
have impacts on nonlinearity. The unequal channel
amplifier is not changed, SRS and SBS are closed at
spacing will reduce the impact of FWM greatly,
the same time in order to study the effects of SRS on
thereby increasing the maximum optical power of each
system. Then we obtain the BER at 7.88 × 10−6 and
channel.
the system only has 0.4 dB redundancy. Eye definition
Referring to the ITU-T G.692 recommendation, we
has no improvement basically. Therefore, the impact
select the NRZ code, and 4 waves with the wave-
of SRS on the system is negligible.
length of 1556.7 nm, 1558 nm, 1559.7 nm, 1560.7 nm
as a simulator. The system margin of each channel is
4.2 Optimization of the main point of system 11.67 dB, 12.14 dB, 11.62 dB, 11.95 dB. Though some
of the channels are poorer than that of 200 GHz chan-
The input power of fibre will directly affect the non- nel spacing, the performances of four channels are
linearity in the case of fixed fibre parameters. The basically similar to each other. Moreover, nonlinear-
amplifier gain is closely related to the pump inten- ity is controlled well and the system margin of the
sity and erbium-doped fibre (EDF) length. There is an worst channel (channel 3) improves 7.5 dB, making
optimum EDF length corresponding to the maximum the system utmost transmission distance can be further
gain. Figure 3(a) shows the system margin changes extended.
of the worst channel (channel 3) by using different From the above analysis, in order to better suppress
codes (NRZ, RZ, CSRZ) and FEC when nonlinearity, the influence of nonlinearity on the system and over-
dispersion. and noise are considered. come the unbalancing between channel performances,
From the analysis of Figure 3(a), when the system the system uses unequal channel spacing for transmis-
performance is optimal, the optimal EDF length in sion. Thus the system performance will be improved
power amplifier module and corresponding fibre input greatly.
power, using different codes, are different.
Similarly, the output power of a remote-booster gain 4.3.2 Optimization of channel wavelength
module is also enough to cause a large nonlinearity. Simulation results from the previous analysis
Set the EDF length of power amplifier module at the shows that, when we select the wavelength as
optimal value, change the EDF length of the remote- 1550.12 nm, 1551.72 nm, 1553.32 nm, 1554.92 nm
booster gain module and the system margin of the (A) and 1549.32 nm, 1550.92 nm, 1552.52 nm,
worst channel is shown in Figure 3(b). 1554.13 nm (B), and don’t consider dispersion com-
From the analysis of Figure 3(b), when we use pensation, the performance of each channel is shown
different codes, the optimal EDF length in the in Table 1.
19
Table 1. Performance of each channel with A and B set of 5 CONCLUSIONS
wavelengths.
This paper studies the effects to multi-wavelength
Q System repeaterless undersea optical fibre cable transmission
Performance BER value (dB) margin (dB) performance, caused by chromatic dispersion, PMD,
and nonlinearity. It proposes a series of optimiza-
A ch 1 8.88 × 10−34 21.62 13.43
tion methods to improve the system’s performance
ch 2 1.35 × 10−24 20.15 11.95
ch 3 2.01 × 10−5 12.27 4.07 and extend the transmission distance from the aspects
ch 4 1.14 × 10−29 21.02 12.83 of dispersion compensation, fibre input power, chan-
nel spacing, wavelength, and coding technology. (1)
B ch 1 4.34 × 10−33 21.53 13.34
The use of the DCF post-compensation and owed-
ch 2 5.46 × 10−32 21.37 13.18
ch 3 1.73 × 10−3 9.32 1.12
compensation compensates the influence of chromatic
ch 4 5.63 × 10−20 19.16 10.96 dispersion. (2) We get the range of transverse stress,
tensile strain and a bending radius that the system can
endure to avoid PMD compensation. (3) It is better
to avoid the wavelengths of 1552.52 nm–1553.32 nm
As is shown in Table 1, with respect to the A set of when we select a wavelength. (4) When we select the
wavelengths, channel 3 performance of B set of wave- wavelengths of 1546.12 nm, 1547.72 nm, 1549.32 nm,
lengths is still the worst. So we change the wavelengths 1550.92 nm and the CSRZ code, the eye diagram of
to 1546.12 nm, 1547.72 nm, 1549.32 nm, 1550.92 nm each channel is clear and their performances have
and do not consider the dispersion compensation. The little difference. The system performance has been
BER of channel 1 is 1.24 × 10−29 and system mar- improved well and the transmission distance is further
gin is 12.82 dB. The BER of channel 2 is 1.24 × 10−35 extended.
and system margin is 13.68 dB. The BER of channel What’s more, we can obtain the research methods
3 is 1.08 × 10−35 and system margin is 13.69 dB. The about extending transmission distance in a WDM sys-
BER of channel 4 is 4.33 × 10−33 and system mar- tem. Due to limited conditions, there are some issues
gin is 13.34 dB. The performance of each channel is to be further resolved: for example, with the 10 Gbit/s
almost the same. There is no error in the condition of and even the 40 Gbit/s system, the effects of PMD and
existing transmission distance and the number of mul- PMD compensation will be researched continuously.
tiplexing wavelengths. It is possible to further extend
the transmission distance.
REFERENCES
As for the analysis of changing the channel
wavelength, it is better to avoid the wavelength of [1] OptSim 4.5 Models Reference Volume II Block Mode.
1552.52 nm–1553.32 nm when select the wavelength. RSoft Design Group, Inc. [EB/OL]. http://www.resoft
Synthesizing all the above analysis results, we design.com
optimize the wavelength and coding simultaneously. [2] Sultana, Nasrin & Islam, M.S. 2012. Analysis of XPM
That is selecting the wavelength of 1546.12 nm, effect with SPM and GVD in WDM fiber optic trans-
1547.72 nm, 1549.32 nm, 1550.92 nm and CSRZ mission system. 2012 International Conference on Com-
code. The system margin of channel 1 is 18.75 dB. puter and Communication Engineering, ICCCE 2012:
263–266
The channel 2 is 17.43 dB. The channel 3 is 16.54 dB,
[3] Lignie, M.C. & Nagel, H.G.J. 1994. Large polariza-
and the channel 4 is 16.20 dB. The eye diagram of tion mode dispersion in fiber optic cables. Lightwave
each channel is clear. The performance has some Technol., 1994,12(8): 1325–1329
improvement over that using unequal channel spacing. [4] ITU-T G.650
The system margin increases. Transmission distance is [5] Kaur, Gurmeet & Singh, M.L & Patterh, M.S. 2010.
further extended. Effect of fiber nonlinearities in a WDM transmission
When using CSRZ and wavelength optimization, system. Optik, 2010(6): 889–896
the system performance improves more than the one
using unequal channel spacing. But the two kinds
of optimization are both good. From the perspective
of wavelength utilization, we suggest selecting wave-
length optimization when there are less wavelengths
and using unequal channel spacing when the number
of wavelength is more.
20
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
ABSTRACT: This paper combined LDPC channel coding technology with physical layer network coding, and,
based on the principle of superposition by the code word, put forward a new joint channel coding technology.
The technology treated the network coding signal in the relay node as a redundant code and combined it with the
original coded signal to form a joint coding signal. Finally, it is simulated for bit error rate on the Matlab which
proves that technology can effectively reduce the BER and improve transmission performance.
1 INTRODUCTION
21
yk = lk + nk when lk = Gk + xk , we can obtain
4 PERFORMANCE SIMULATION
η is error code.
Using computer simulation software (Matlab), we can
obtain the performance curve with the traditional net-
work coding and the joint channel coding. In Figure
2a, compared with the traditional network coding, the
In the fading channel, the error rate of pairing
bit error rate of the joint channel coding has been sig-
codeword is PEP (d|γ1 , γ2 ), d is Hamming distance.
nificantly reduced. And as the SNR increases, the bit
error rate reduction becomes greater. From Figure 2b,
the frame error rate of the joint channel coding is also
greatly different. When the bit error rate is 10−3 , the
performance gain of the joint channel coding is greater
than 5 dB.
The experimental results demonstrate that the joint
channel coding can reduce the bit error rate and frame
error rate effectively.
From the above results and analysis, we can see
We can obtain
that, compared to the network coding, the transmis-
sion capability of a system based on LDPC and PNC
technology has been greatly improved.
22
at the same time the coding strategies can reduce the
bit error rate and frame error rate effectively. However,
with network technology development, its promotion
throughout the network is becoming more and more
important and we can use the new joint channel cod-
ing based on LDPC and PNC to improve the network
throughout.
This paper is supported by Northwestern Polytech-
nical University Foundational Research Fund 2011
(JC201143).
REFERENCES
[1] Li S.Y.R., Sun Q.T. & Z.Y. Shao. Linear network cod-
ing: theory and algorithms [J]. Proceedings of the IEEE.
2011, 99(3):372–387.
[2] Hao, K. Research of Network Coding Key Technology
Figure 2b. Frame error rate.
and Applications [D]. Tianjin University, 2011
[3] Yu H.H. & Zhang J. Physical-layer network coding in
wireless multi access relay channel [C]. Applied Infor-
ACKNOWLEDGMENT mation and Communication. Springer Berlin Heidelberg,
2011, 227(1):312–320.
Combining network coding theory with network com- [4] Yeung R.W., Lis Y.R. & Cai N., et al. Network coding
munication technology, a new joint channel coding Theory (1st ed) [M]. Now Publishers 2005.
based on LDPC and PNC is put forward in this paper. [5] Song L., Yeung R.W. & Cai N. A separation theorem
And through mathematical analysis and simulation for single-source network coding [J]. IEEE Transactions
Information Theory, 2006, 52(5):1861–1871.
results, it shows that this coding technology can effec-
[6] Zhou L.C. & Xiu C.D. A joint design of physical
tively reduce the bit error rate and frame error rate layer network coding and channel coding for wire-
effectively, which can greatly improve the transmission less networks [J]. Computer Science and Electronics
capability of a system. Engineering (ICCSEE), 2012 International Conference,
From practical application, when we use network 2012(3):312–316.
coding strategies to increase the network throughout,
23
This page intentionally left blank
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
Q. Wang
China National Materials Group Corporation, China
ABSTRACT: In this paper, with respect to low data transmission rate for the existing FBG demodulation
system, a data transmission method based on FPGA hardware network protocol stack is proposed. This paper
designs a state machine-based LAN91C111 hardware driver, crops the standard TCP/IP protocol, and takes into
account the characteristics of system data transmission. Timing simulation software is applied to functional
simulation in the design, so as to ensure the reliability of the design. In hardware tests, a wireshark packet
capture tool is employed to obtain real-time network communication data, and to analyse the data in detail, so
as to ensure the accuracy of the design. Test results show that a high-speed and stable network transmission of
sensing data can be assured by the design when the electric circuit remains unchanged.
1 INTRODUCTION
25
Figure 2. LAN91C111 interface timing diagram. Figure 4. A network protocol layer diagram.
26
Figure 7. ARP request simulation received.
27
system. It designs a state machine-based hardware
driver for network chip LAN91C111 and crops the
standard TCP/IP protocol, based on the characteris-
tics of system data transmission, and it completes the
hardware designs for ARP, ICMP, IP and UDP proto-
cols for a TCP/IP protocol. Altera-Modelsim timing
Figure 9. Packet capture data of ARP and ICMP protocol.
simulation software is applied to functional simula-
tion in the design, so as to ensure the reliability of the
design. In hardware tests, a wireshark packet capture
tool is employed to obtain real-time network commu-
nication data, and to analyse the data in detail, so as
to ensure the accuracy of the design. Test results show
that a stable network transmission of FBG sensing data
can be assured by the design.
ACKNOWLEDGEMENTS
Figure 10. Packet capture data of UDP protocol.
This paper is supported by the National High Technol-
4.2 Hardware test ogy Research and Development Program (863 plan)
Connect FBG demodulation system to laptop with of China (No. 2012AA040106).
cable; download the generated .s of document com-
piled by QuartusII to FPGA; packet capture network
data with wireshark. REFERENCES
The packet capture data of the ARP protocol and Jeannot Frieden, Cugnoni Jo, Botsis John, et al. High-speed
ICMP protocol, which is shown in Figure 9, can be internal strain measurements in composite structures
obtained upon the input of command ping 59.69.64.2 under dynamic load using embedded FBG sensors [J].
in the cmd command prompt window in the laptop. Composite Structures, 2010, 92(8): 1905–1912.
The first line shown is ARP request data sent by the LAN91C111 Reference Manual [Z]. http://www.microchip.
computer to the demodulator; the second line is ARP com/wwwproducts/Devices.aspx?product
response data sent back by the demodulator; the fol- Liu M.Y., Zhou Z.D., Tan Y.G., et al. Fiber Bragg grating
lowing eight lines are successively ICMP loopback sensors-based mechanical structure damage identifica-
tion. [J]. Mechanika, 2012, 1:108–112.
data of the computer and the response data of the Li Zheng-ying, Xu Zhi-qiang, Tang Zhi-hao, et al.
demodulator. Research of high-speed FBG demodulation system for
Figure 10 shows the packet capture data of a UDP distributed dynamic monitoring of mechanical equip-
protocol. A UDP transmitter module will be booted ment [J]. Advances in Mechanical Engineering, 2013,
to send data to the computer when the FBG sensing 2013(107073): 1–8.
caching data of the demodulator reaches 1,400 bytes. Macro Esposito, Salvatore Buontempo, Angelo Petriccione,
The length of the network frame shown in the fig- et al. Fiber Bragg Grating sensors to measure the coef-
ure is 1,442 bytes with the data length of 1,400 bytes. ficient of thermal expansion of polymers at cryogenic
The FBG sensing value (with channel number as sim- temperatures [J]. Sensors and Actuators A: Physical, 2013,
189:195–203.
ulation numerical value to substitute sensing value) Richard S.W. TCP/IP Illustrated Volume 1: Protocol [M].
and the communication code value of a demodulation Translated by Fan Jianhua. Beijing: China Machine Press,
system are shown in the data area. Data with 99,265 2000.
frames is sent within 30.000294 s with the data length Wang L., Li D., and Ou J. Fiber Bragg grating temperature
of 1,442 bytes for each frame and with the network sensors system on a twin-deck continuous rigid frame
transmission rate calculated of 38.17 Mbps, which is bridge for long term monitoring [J]. Advanced Materials
in conformity with the maximum transmission rate Research, vol. 148–149, pp. 1611–1618, 2011.
required for the system (38.14 Mbps), calculated pre- Zhou Zu-de, Tan Yue-gang. Fiber Bragg Grating dis-
viously (since frame header data, except for sensor tributed dynamic monitoring and damage identification
of mechanical system [M]. Beijing: Science Press, 2013,
data, is also in the network frame, the measured 305–343.
transmission rate value is bigger than the calculation
value).
5 CONCLUSION
28
Future Communication Technology and Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02777-0
Y.M. Cheng
Department of Electric and Information Engineering, Beihua University, Jilin Province, China
ABSTRACT: This paper addresses the mobility simulation model of the multihomed node for supporting a
MIPv6 function in an interworking of Worldwide Interoperability for Microwave Access (WiMAX) and IEEE
802.11 WLAN. The multihomed node model with two air interfaces is developed and based on WiMAX and
WLAN workstation node model in simulation software. The main point of this paper is to support the MIPv6
function and provide a new network selection policy for multihomed nodes to make a handover decision between
the WiMAX and the WLAN network. Finally, the simulation scenario and results are shown for testing and
developing multihomed node models and MIPv6 functions.
29
designed to operate at high data rates and to deal with
several applications, resulting in different types of traf-
fic profiles and demands. The motivation is to one day
provide at last a mile of broadband wireless access to
the general population; it is seeking to implement a
single standard for fixed broadband wireless access
and mobility with high scalability and a low cost of
deployment.
30
Figure 3. Illustration of network selection policy.
31
Figure 5. An example of new network selection policy.
32
Other documents randomly have
different content
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
ebookgate.com