Explore chapters and articles related to this topic
Optical Satellite Networking
Published in Hamid Hemmati, Near-Earth Laser Communications, 2020
The latency in data transmission involves propagation and processing delays. Although the first can be predicted with satisfactory accuracy calculating the source to destination satellite propagation path, the second type of delays depend on a large number of factors and primarily on the traffic conditions (for which no reliable data exist) and the available resources of the network. In any case, the delays that may be encountered by intermediate processing can impair the quality of service offered as expressed, e.g., in cell transfer delay and cell delay variation to use the Asynchronous Transfer Mode (ATM) terminology. This is one of the reasons to consider a technique that can allow end-to-end paths to be established without intermediate processing of data [Karafolas et al., 2000].
Optical Satellite Networking: The Concept of a Global Satellite Optical Transport Network
Published in Hamid Hemmati, Near-Earth Laser Communications, 2018
The latency in data transmission involves propagation and processing delays. Although the first can be predicted with satisfactory accuracy (calculating the source to destination satellite propagation path), the second type of delays depend on a large number of factors, and primarily on the traffic conditions (for which no reliable data exist) and the available resources of the network. In any case, the delays that may be encountered by intermediate processing can impair the quality of service offered (as expressed in cell transfer delay and cell delay variation) to use the asynchronous transfer mode (ATM) terminology. This is one of the reasons to consider a technique that can allow end-to-end paths to be established without intermediate processing of data (Karafolas and Baroni, 2000).
Introduction to Digital Communication for Building Automation and DDC
Published in John J. “Jack” Mc Gowan, Energy and Analytics, 2020
A protocol consists of critical elements which define the format, structure and timing of data transmission. Format is essential to defining the organization of the data that are sent. Data structures are needed for coordination between devices and for handling data. Protocol timing involves matching transmission speeds to allow communication between devices with varying capability (for example the reader has likely experienced a time when number of users on a WiFi network slowed refresh speed). Timing is also implemented within the protocol to ensure that data are transmitted in the proper sequence to ensure that they are meaningful when they arrive at a receiving station.
Analysis of heat conduction in a nanoscale metal oxide semiconductor field effect transistor using lattice Boltzmann method
Published in Energy Sources, Part A: Recovery, Utilization, and Environmental Effects, 2023
Oussama Zobiri, Abdelmalek Atia, Müslüm Arıcı
The necessity of faster data processing, such as data transmission and data storage has been realized in recent years. During the data transmission by electrons to electronics, circuits may lead to unwanted hotspots (Chen 2005). The most commonly used materials in electronic industries are semiconductor materials. Among them, silicon (Si) is the dominating semiconductor material utilized for microelectronics devices (Nasri et al. 2015b). The Field-Effect Transistor (FET) is the essential component of semiconductor. The most popular type of isolated gate FET used in a variety of microelectronic is the Metal Oxide Semiconductor Field-Effect Transistor (MOSFET). Hundreds of millions of semiconductors are assembled on a few square centimeters chip area (Pop, Sinha, and Goodson 2006). The channel region in the MOSFET was projected to be 13 nm in 2018, however, the miniaturization of MOSFET has already reached the nano-scale, and it is expected to be less than 6 nm in 2026 (Fiori et al. 2014).
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
A vast amount of data is being transmitted and processed in this era by IoD devices. These data are vulnerable to malicious software and attackers. Hence, there is a need to keep this data storage, processing, and data transmission secure and efficient. Cryptography is a technique that can provide secure data transmissions in an IoD network. Before transmission of data between any two communicating entities, the two entities should be initially authenticated, and then secure keys have to be established in the two entities. Hence, this motivates us to classify the IoD network security based on different Cryptography concepts used by IoD networks like key-agreement mechanisms, Authentication mechanisms, Blockchain mechanisms, Encryption and Decryption algorithms, and a combination of any/all these concepts.
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles
Published in Connection Science, 2022
Consequently, the main purpose of this study is to provide a key management agreement based on a multi-level security framework to combine the elliptic curve cryptosystem with IoV and cloud service platforms (Sathishkumar & Rajakumar, 2017). As V2V or V2R equipment executes secure data transmission, this study employs the ECDH session key to perform the secure data transmission for point-to-point. While the communication is between a vehicle and the group vehicle V2G, this research employs the group key management mechanism to compute a common group key for protecting the security of transmitted data. Additionally, this study deploys a VM virtual machine server at the end of the cloud to serve as the root base station GCA, which is an administrator of the entire system and is responsible for the key management agreement.