Data Communication System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 321 Experts worldwide ranked by ideXlab platform

Bassam Zantout - One of the best experts on this subject based on the ideXlab platform.

  • The NetCamo Data Communication System
    Advanced Science Letters, 2015
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender’s identity, different implementations have proven successful-one of which is the invention of anonymous networks. This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity. The paper discusses its implementation and techniques in details. The paper also presents the benefits and drawbacks of NetCamo.PublishedN/

  • The TOR Data Communication System: A survey
    2014 IEEE Symposium on Computers and Communications (ISCC), 2014
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.

  • The TOR Data Communication System
    Journal of Communications and Networks, 2014
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

  • I2P Data Communication System
    2011
    Co-Authors: Bassam Zantout, Ramzi A. Haraty
    Abstract:

    As Communication becomes more and more an integral part of our day to day lives, the need to access information increases as well. S ecurity is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate Data while maintaining secrecy and integrity. This paper presents one of the most common widely used Data Communication Systems for avoiding traffic analysis as well as assuring Data integrity - I2P. I2P, just like every other technology aimed at securing Data, has its pros and cons. The paper presents the benefits and drawbacks of I2P.

Mohamad Sawan - One of the best experts on this subject based on the ideXlab platform.

  • Generic Wireless Power Transfer and Data Communication System Based on a Novel Modulation Technique
    IEEE Transactions on Circuits and Systems I: Regular Papers, 1
    Co-Authors: Aref Trigui, Sami Hached, Jean-pierre David, Ahmed Chiheb Ammari, Yvon Savaria, Mohamad Sawan
    Abstract:

    This paper presents a wireless power and downlink Data transfer System for medical implants operating over a single 10 MHz inductive link. The System is based on a Carrier Width Modulation (CWM) scheme for high-speed Communication and efficient power delivery using a novel modulator circuit design. Unlike conventional modulation techniques, the Data rate of the proposed CWM is not limited by the quality factors of the primary and secondary coils. The functionality of the new modulation method is proven using a hybrid implementation comprising a custom-integrated demodulator circuit and board-level discrete components. The proposed Wireless Power and Data Transfer (WPDT) System is also capable of operating under a wide range of Data rates. It allows a maximum Data rate of 3.33 Mb/s for a maximum power delivery of 6.1 mW at 1 cm coils separation distance. The System can recover more power, reaching 55 mW at 100 kb/s. Due to the System genericity, an operator can select the best compromise between power and Data rates in accordance to application or current need, without reconfiguring the receiver. Another advantage of this modulation technique is the simple implementation and the ultra-low power consumption of the CWM demodulator despite its high-speed demodulation.

Ramzi A. Haraty - One of the best experts on this subject based on the ideXlab platform.

  • The NetCamo Data Communication System
    Advanced Science Letters, 2015
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender’s identity, different implementations have proven successful-one of which is the invention of anonymous networks. This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity. The paper discusses its implementation and techniques in details. The paper also presents the benefits and drawbacks of NetCamo.PublishedN/

  • The TOR Data Communication System: A survey
    2014 IEEE Symposium on Computers and Communications (ISCC), 2014
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.

  • The TOR Data Communication System
    Journal of Communications and Networks, 2014
    Co-Authors: Ramzi A. Haraty, Bassam Zantout
    Abstract:

    Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

  • I2P Data Communication System
    2011
    Co-Authors: Bassam Zantout, Ramzi A. Haraty
    Abstract:

    As Communication becomes more and more an integral part of our day to day lives, the need to access information increases as well. S ecurity is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate Data while maintaining secrecy and integrity. This paper presents one of the most common widely used Data Communication Systems for avoiding traffic analysis as well as assuring Data integrity - I2P. I2P, just like every other technology aimed at securing Data, has its pros and cons. The paper presents the benefits and drawbacks of I2P.

Tao Tang - One of the best experts on this subject based on the ideXlab platform.

  • dependability analysis of the Data Communication System in train control System
    Science China-technological Sciences, 2009
    Co-Authors: Tianhua Xu, Tao Tang
    Abstract:

    Communication based train control (CBTC) System is based on mobile Communication and overcomes fixed blocks in order to increase track utilization and train safety. The Data Communication System (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC System. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper, a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed, which captures all relevant failure and failure recovery behavior System aspects in a concise way. We compared the reliability, availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability, availability and the frame loss probability index for the full redundant configuration.

  • A Method for Simulation and Analysis of Trackside Data Communication System in CBTC
    2009 WRI International Conference on Communications and Mobile Computing, 2009
    Co-Authors: Yan Zhang, Lijie Chen, Tao Tang
    Abstract:

    When simulation aims at evaluating the scalability of new protocols and applications, it is indispensable to work with large scale network topologies. It has important practical significance and benefits for improving the behaviors of network planning and design, System optimized design and project risk reduction. The technique of modeling our safe Communication protocol of Communication based train control (CBTC) and the setup of a research platform using the OPNET modeler are introduced, so that the dynamic performance issues could be studied to guide the CBTC network planning and design.

  • The modeling and Analysis of Data Communication System (DCS) in Communication Based Train Control (CBTC) with Colored Petri Nets
    Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), 2007
    Co-Authors: Tianhua Xu, Tao Tang
    Abstract:

    Communication based train control (CBTC) System was based on mobile Communication and overcome fixed blocks in order to increase track utilization and train safety. As an intelligent autonomous decentralized Systems (IADS), Data Communication System (DCS) between trains and zone center (ZC) are crucial factors for the safe and efficient operation of CBTC System. The real-time behavior under various transmission conditions needs to be modeled and evaluated. The paper presents a DCS model and evaluates the influence of Communication collision and message length on the transfer delay. Performance evaluation of the coloured Petri net model shows that the Communication collision caused by two trains in one cell does not result in the unacceptable train operation situations. But the message length may have much influence on the transfer delay

  • ISADS - The modeling and Analysis of Data Communication System (DCS) in Communication Based Train Control (CBTC) with Colored Petri Nets
    Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), 2007
    Co-Authors: Tianhua Xu, Tao Tang
    Abstract:

    Communication based train control (CBTC) System was based on mobile Communication and overcome fixed blocks in order to increase track utilization and train safety. As an intelligent autonomous decentralized Systems (IADS), Data Communication System (DCS) between trains and zone center (ZC) are crucial factors for the safe and efficient operation of CBTC System. The real-time behavior under various transmission conditions needs to be modeled and evaluated. The paper presents a DCS model and evaluates the influence of Communication collision and message length on the transfer delay. Performance evaluation of the coloured Petri net model shows that the Communication collision caused by two trains in one cell does not result in the unacceptable train operation situations. But the message length may have much influence on the transfer delay

Aref Trigui - One of the best experts on this subject based on the ideXlab platform.

  • Generic Wireless Power Transfer and Data Communication System Based on a Novel Modulation Technique
    IEEE Transactions on Circuits and Systems I: Regular Papers, 1
    Co-Authors: Aref Trigui, Sami Hached, Jean-pierre David, Ahmed Chiheb Ammari, Yvon Savaria, Mohamad Sawan
    Abstract:

    This paper presents a wireless power and downlink Data transfer System for medical implants operating over a single 10 MHz inductive link. The System is based on a Carrier Width Modulation (CWM) scheme for high-speed Communication and efficient power delivery using a novel modulator circuit design. Unlike conventional modulation techniques, the Data rate of the proposed CWM is not limited by the quality factors of the primary and secondary coils. The functionality of the new modulation method is proven using a hybrid implementation comprising a custom-integrated demodulator circuit and board-level discrete components. The proposed Wireless Power and Data Transfer (WPDT) System is also capable of operating under a wide range of Data rates. It allows a maximum Data rate of 3.33 Mb/s for a maximum power delivery of 6.1 mW at 1 cm coils separation distance. The System can recover more power, reaching 55 mW at 100 kb/s. Due to the System genericity, an operator can select the best compromise between power and Data rates in accordance to application or current need, without reconfiguring the receiver. Another advantage of this modulation technique is the simple implementation and the ultra-low power consumption of the CWM demodulator despite its high-speed demodulation.