To see the other types of publications on this topic, follow the link: Asynchronous Transfer Mode (ATM).

Journal articles on the topic 'Asynchronous Transfer Mode (ATM)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Asynchronous Transfer Mode (ATM).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

IHEKWEABA, C., and G. N. ONOH. "An Improved Fuzzy Controlled Asynchronous Transfer Mode (ATM) Network." International Journal of Engineering and Technology 2, no. 6 (2010): 567–73. http://dx.doi.org/10.7763/ijet.2010.v2.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rudin, Harry. "The ATM—Asynchronous transfer mode." Computer Networks and ISDN Systems 24, no. 4 (May 1992): 277–78. http://dx.doi.org/10.1016/0169-7552(92)90113-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Minzer, S. E. "Broadband ISDN and asynchronous transfer mode (ATM)." IEEE Communications Magazine 27, no. 9 (September 1989): 17–24. http://dx.doi.org/10.1109/35.35508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Laeticia, Onyejegbu, and Okafor Nkiru. "Congestion Control in Asynchronous Transfer Mode (ATM) Network." International Journal of Computer Applications 142, no. 4 (May 17, 2016): 11–15. http://dx.doi.org/10.5120/ijca2016909736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Sharhan, S., F. Karray, and W. Gueaieb. "Learning-based resource optimization in asynchronous transfer mode (ATM) networks." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 33, no. 1 (February 2003): 122–32. http://dx.doi.org/10.1109/tsmcb.2003.808178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rizk, M. R. M., H. Rashwan, and A. Abdel Aziz. "A Modified Asynchronous Transfer Mode Fuzzy Policer." Sultan Qaboos University Journal for Science [SQUJS] 7, no. 1 (June 1, 2002): 137. http://dx.doi.org/10.24200/squjs.vol7iss1pp137-146.

Full text
Abstract:
A Modified Fuzzy policer for Asynchronous Transfer Mode is introduced. In a preceding fuzzy policer model the time window (time interval where ATM cells are accepted in the policer) is not synchronized with the source activity. In the proposed one, the time windows are not consecutive but are triggered by the first arriving cell. The modified policer gives good improvement to the selectivity, and minimizes the congestion over the path. This improvement can be significant for multiple channels.
APA, Harvard, Vancouver, ISO, and other styles
7

Chiang, Shu-Yin. "Performance analysis of ATM multiplexer with Bernoulli traffic sources." Mathematical Problems in Engineering 8, no. 6 (2002): 541–52. http://dx.doi.org/10.1080/1024123021000053673.

Full text
Abstract:
In this paper, we study the simplified models of the ATM (Asynchronous Transfer Mode) multiplexer network with Bernoulli random traffic sources. Based on the model, the performance measures are analyzed by the different output service schemes.
APA, Harvard, Vancouver, ISO, and other styles
8

Chitre, D. M., D. S. Gokhale, T. Henderson, J. L. Lunsford, and N. Mathews. "Asynchronous transfer mode (ATM) operation via satellite: Issues, challenges and resolutions." International Journal of Satellite Communications 12, no. 3 (May 1994): 211–22. http://dx.doi.org/10.1002/sat.4600120305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsang, Rose P., David H. C. Du, and Allalaghatta Pavan. "Experiments with video transmission over an Asynchronous Transfer Mode (ATM) network." Multimedia Systems 4, no. 4 (August 1, 1996): 157–71. http://dx.doi.org/10.1007/s005300050020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Niestegge, Gerd. "The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network." International Journal of Digital & Analog Communication Systems 3, no. 2 (April 1990): 187–97. http://dx.doi.org/10.1002/dac.4510030214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Parish, D. J., R. Briggs, D. Chambers, C. Hunter, and N. Kelsall. "1553 emulation over ATM (asynchronous transfer mode) - A hybrid avionics communications architecture." IEEE Aerospace and Electronic Systems Magazine 13, no. 3 (March 1998): 34–39. http://dx.doi.org/10.1109/62.659862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kesidis, G., and J. Walrand. "Conservation Relations for Fully Shared ATM Buffers." Probability in the Engineering and Informational Sciences 8, no. 1 (January 1994): 147–51. http://dx.doi.org/10.1017/s0269964800003272.

Full text
Abstract:
In asynchronous transfer mode (ATM), networks, buffering is required to reduce cell loss and increase bandwidth utilization by the bursty traffic. Several types of traffic with different performance requirements on delay and loss will share buffer resources. We focus on the fully shared buffer with push-out and a randomized service priority rule. Some conservation relations are obtained which can be used to tune the parameters of the buffering and service disciplines.
APA, Harvard, Vancouver, ISO, and other styles
13

Ogwu, Francis Joseph, Mohammad Talib, and Ganiyu Adesola Aderounmu. "Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network." Journal of Computer Science 3, no. 11 (November 1, 2007): 847–53. http://dx.doi.org/10.3844/jcssp.2007.847.853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Smith, Nancy R., Don Pardoe, Corinne Pelote, Mark Honer, and Christopher L. Morgan. "Remote Control of a Scanning Electron Microsocpe Using Asynchronous Transfer Mode." Microscopy Today 4, no. 2 (March 1996): 18–21. http://dx.doi.org/10.1017/s1551929500067535.

Full text
Abstract:
California State University, Hayward has successfully demonstrated remote control of a scanning electron microscope (SEM) using Asynchronous Transfer Mode (ATM). The development of digital imaging technology has iead to exploration and testing of networking strategies for sharing scientific instrumentation. The concept of shared instrumentation is appealing to both academia and private enterprise. Networking access presents the opportunity to teach scanning electron microscopy to a large number of students using multiple desktop computers. Video images can also be projected onto large screens in classrooms or as a distant learning resource. Remote shared access to scientific equipment provides certain advantages such as access to a wider variety of resources, direct interaction without hazard to people or equipment, ability to combine resources into larger virtual instruments, rapid access to available resources, and pooling of knowledge by a larger community.The advent of high speed networks such as ATM offers the possibility of integrated solutions to communication and control.
APA, Harvard, Vancouver, ISO, and other styles
15

Sá Lisboa, Flávia Oliveira Santos de. "Redes Atm de Alto Desempenho." Revista Brasileira Multidisciplinar 8, no. 2 (July 16, 2004): 135. http://dx.doi.org/10.25061/2527-2675/rebram/2004.v8i2.313.

Full text
Abstract:
A tendência atual de integração de serviços de dados, voz e vídeo, estimulada pelo pleno sucesso da Internet, aumentou a demanda por maior banda e melhor desempenho nas redes de comunicação de dados. Neste contexto, a tecnologia ATM (Asynchronous Transfer Mode) vem sendo utilizada na implementação de backbone de LANs e WANs, justamente por oferecer a possibilidade de integração de serviços com qualidade, alta escalabilidade e altas taxas de transferência em banda larga. Neste artigo serão abordados os principais conceitos relacionados à tecnologia ATM, suas vantagens e desvantagens em face de outras tecnologias (como Fast e Gigabit Ethernet), além de casos de sua utilização em empresas e instituições de ensino.
APA, Harvard, Vancouver, ISO, and other styles
16

Masaki, Toshihiro, Yasuhiro Nakatani, Takao Onoye, and Koso Murakami. "Voice and Telephony Over ATM for Multimedia Network using Shared VCI Cell." Journal of Circuits, Systems and Computers 07, no. 02 (April 1997): 93–110. http://dx.doi.org/10.1142/s0218126697000073.

Full text
Abstract:
This paper presents new multimedia Asynchronous Transfer Mode (ATM) networks which are capable of transmitting voice data efficiently and serving smooth evolution from the existing narrowband voice networks. Fully ATMized networks are characterized by having both rerouting function and switching function. The rerouting nodes multiplex plural calls going through the same route into one ATM cell, namely shared virtual channel identifier (VCI) cell. The shared VCI cell includes fellow cells which contain call data and its VCI. The rerouting node is integrated into a single chip by using CMOS technology. The multimedia ATM networks can be readily implemented by attaching the rerouting nodes to the standard ATM switches.
APA, Harvard, Vancouver, ISO, and other styles
17

GUSTER, DENNIS, CHANGSOO SOHN, PAUL SAFONOV, and DAVID ROBINSON. "A COMPARISON OF ASYNCHRONOUS TRANSFER MODE (ATM) AND HIGH SPEED ETHERNET: THE NETWORK DESIGN IMPLICATIONS TO A BUSINESS ORGANIZATION." International Journal of Information Technology & Decision Making 02, no. 04 (December 2003): 683–92. http://dx.doi.org/10.1142/s0219622003000860.

Full text
Abstract:
Technological advances such as high speed Ethernet and ATM have provided a means for business organizations to employ high performance networking. However, few studies have been conducted to verify the architecture's typical performance in a business environment. This study analyzed the network performance of high speed Ethernet and ATM when they were configured as LAN backbones. The results revealed that ATM exhibited performance superior to high speed Ethernet, but when adjustments were made for differences in line speed, the throughput was similar. In addition to analyzing empirical data about each technologies' performance, the advantages and limitations of using ATM in a business network are discussed.
APA, Harvard, Vancouver, ISO, and other styles
18

Hsu, Ivy, and Jean Walrand. "Dynamic bandwidth allocation for ATM switches." Journal of Applied Probability 33, no. 3 (September 1996): 758–71. http://dx.doi.org/10.2307/3215357.

Full text
Abstract:
We explore a dynamic approach to the problems of call admission and resource allocation for communication networks with connections that are differentiated by their quality of service requirements. In a dynamic approach, the amount of spare resources is estimated on-line based on feedbacks from the network's quality of service monitoring mechanism. The schemes we propose remove the dependence on accurate traffic models and thus simplify the tasks of supplying traffic statistics required of network users. In this paper we present two dynamic algorithms. The objective of these algorithms is to find the minimum bandwidth necessary to satisfy a cell loss probability constraint at an asynchronous transfer mode (ATM) switch. We show that in both schemes the bandwidth chosen by the algorithm approaches the optimal value almost surely. Furthermore, in the second scheme, which determines the point closest to the optimal bandwidth from a finite number of choices, the expected learning time is finite.
APA, Harvard, Vancouver, ISO, and other styles
19

Hsu, Ivy, and Jean Walrand. "Dynamic bandwidth allocation for ATM switches." Journal of Applied Probability 33, no. 03 (September 1996): 758–71. http://dx.doi.org/10.1017/s0021900200100191.

Full text
Abstract:
We explore a dynamic approach to the problems of call admission and resource allocation for communication networks with connections that are differentiated by their quality of service requirements. In a dynamic approach, the amount of spare resources is estimated on-line based on feedbacks from the network's quality of service monitoring mechanism. The schemes we propose remove the dependence on accurate traffic models and thus simplify the tasks of supplying traffic statistics required of network users. In this paper we present two dynamic algorithms. The objective of these algorithms is to find the minimum bandwidth necessary to satisfy a cell loss probability constraint at an asynchronous transfer mode (ATM) switch. We show that in both schemes the bandwidth chosen by the algorithm approaches the optimal value almost surely. Furthermore, in the second scheme, which determines the point closest to the optimal bandwidth from a finite number of choices, the expected learning time is finite.
APA, Harvard, Vancouver, ISO, and other styles
20

Hellendoorn, Hans, and Rudolf Seising. "Fuzzy Traffic Management for Modern Telecommunications." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 06, no. 02 (April 1998): 189–99. http://dx.doi.org/10.1142/s0218488598000173.

Full text
Abstract:
We describe applications of fuzzy logic in the area of broadband telecommunication networks. Call Admission Control (CAC) and Usage Parameter Control (UPC) play an important role in the traffic management of ATM networks (Asynchronous Transfer Mode). We present "fuzzy solutions" for this control tasks and we show their success by presenting simulation results and heuristic valuations.
APA, Harvard, Vancouver, ISO, and other styles
21

Ahmed, Sarfaraz, and T. Senthil Kumaran. "Interaction With ATM for Blind." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (March 1, 2018): 549. http://dx.doi.org/10.11591/ijeecs.v9.i3.pp549-551.

Full text
Abstract:
<p>A talking ATM may be a kind of Asynchronous Transfer Mode (ATM) that gives perceptible directions so that persons United Nations agency will not scan associate degree ATM screen can severally use the machine. All perceptible data is delivered in private through an earpiece jack on the face of the device or an on an individual basis hooked up a telephone. Information provided to the client either through pre-recorded sound files or via text-to-speech synthesis A user plugs a conventional telephone receiver into the jack, hear directions and also the user can respond to voice. In spite of everything, the small print is given press OK button for confirmation. There's associate degree perceptible orientation for initial time users, and perceptible data describing the placement of options like the OK button, deposit slot, and card slot. During this application is principally developed for the blind individuals. The blind people cannot see the keyboard and also the screen for the system. They enter the input details through voice. The voice to text converter can convert into text and method additional way. The system offers the instruction regarding the system usage through voice.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Sarkar, Nurul I., Ritchie Qi, and Akbar Hossain. "Performance Studies of FTP, Voice and Video over ATM-Wireless Backbone Network." International Journal of Advanced Pervasive and Ubiquitous Computing 7, no. 3 (July 2015): 38–54. http://dx.doi.org/10.4018/ijapuc.2015070104.

Full text
Abstract:
Asynchronous Transfer Mode (ATM) is a high-speed networking technology designed to support real-time applications such as voice and video over both wired and wireless networks. This type of network is being used by medium-to-large organizations and the Internet service providers as backbone network to carry data traffic over long-distance with a guaranteed quality of service (QoS). The guaranteed QoS is achieved through a point-to-point link between end users. While the performance of ATM network over wired network has been studied extensively, the performance of real-time traffic over an ATM-Wireless extension has not been fully explored yet. It is useful to be able to compare the performance of ATM network with and without wireless extension against various network performance metrics to find out the effect of wireless extension on system performance.
APA, Harvard, Vancouver, ISO, and other styles
23

Bolla, Raffaele, Ahmad Dalal'Ah, Franco Davoli, and Mario Marchese. "Two Simulation Tools for Testing ATM Resource Allocation Strategies." SIMULATION 68, no. 1 (January 1997): 9–22. http://dx.doi.org/10.1177/003754979706800110.

Full text
Abstract:
Two event-driven simulation tools aimed at testing access control and routing mechanisms in an Asynchronous Transfer Mode (ATM) environment are presented. The first one is dedicated to the behavioural description of an ATM Virtual Circuit (VC) switch. The purpose is to test resource allocation and Call Admission Control (CAC) strategies, so only the relevant events for this objective are considered and some important functions (e.g., the switching element) for a complete description of an ATM switch are not explicitly modeled. The second simulator has been designed to test routing strategies for an ATM network. In such a case, a higher level of abstraction than in the previous one is necessary and, again, only the meaningful events to the aim are taken into account. Some resource allocation, CAC, and routing schemes are also reported, along with the description of the simulation tools. Several simulation results are discussed, in order to assess their performance.
APA, Harvard, Vancouver, ISO, and other styles
24

Sarkar, Nurul I., and Kashif Nisar. "Modelling and Performance Studies of ATM Networks Over Email & FTP." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 2 (April 2012): 16–25. http://dx.doi.org/10.4018/japuc.2012040102.

Full text
Abstract:
The Advanced Network Technologies is a research that investigates the technology(s) behind today’s modern networks and network infrastructures – one of these technologies being Asynchronous Transfer Mode (ATM); a technology commonly in place in networks all around the world today. Therefore, this paper focuses its attention on ATM. Dubbed “Modelling and Performance Studies of ATM Networks,” this research looks into the “impact of application segment length on the performance of an ATM network” and the “impact of traffic type data on the performance of an ATM network.” For this research, the authors have used the OPNET Modeler 14.0 Simulation software to create a network model that represents a real-life ATM network. By simulating an ATM network at AUT University New Zealand, the authors can change certain variables, and observe the effects the changes have on performance. As such, one of the impacts that will be explored is the effect that application segment length has on an ATM network. The second impact to be inspected is the impact of different traffic types on an ATM network. For example, Email traffic should theoretically affect an ATM network differently to the way that Voice traffic does. This way of thinking is what will be looked into further.
APA, Harvard, Vancouver, ISO, and other styles
25

Ihekweaba, C. "A Comparative Study of the Effects of Different Genetic Algorithm Selection Mechanisms on Variable Bit Rate (VBR) and Alternate Bit Rate (ABR) Asynchronous Transfer Mode (ATM) Networks." International Journal of Engineering and Technology 2, no. 6 (2010): 563–66. http://dx.doi.org/10.7763/ijet.2010.v2.182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kopeetsky, M., and A. Lin. "MATHEMATICAL MODELLING OF MODIFIED CELL DELINEATION STRATEGY IN PACKET SWITCHED NETWORKS." Mathematical Modelling and Analysis 11, no. 3 (September 30, 2006): 253–74. http://dx.doi.org/10.3846/13926292.2006.9637317.

Full text
Abstract:
The paper proposes a new mathematical model of Cell Delineation (CD) strategy in any Packet Switching technology when Data Units (DUs) are of constant length. A special strategy that differentiates between synchronization failures and other channel errors with the sufficiently high confidence level has been proposed, analyzed and optimized. The mathematical analysis of the strategy is presented on the Asynchronous Transfer Mode (ATM) network example. The CD cycle implementation time is discussed and analyzed. The numerical results are presented for the case of the standard CD protocol.
APA, Harvard, Vancouver, ISO, and other styles
27

Nisar, Kashif, and Nurul I. Sarkar. "Modeling and Performance Studies of ATM Networks Over Voice and Video." International Journal of Technology Diffusion 3, no. 3 (July 2012): 47–56. http://dx.doi.org/10.4018/jtd.2012070105.

Full text
Abstract:
The Advanced Network Technologies is a research that investigates the technology(s) behind today’s modern networks and network infrastructures one of these technologies being Asynchronous Transfer Mode (ATM). Therefore, also focuses its attention on ATM. Dubbed “Modelling and Performance Studies of ATM Networks”; this research seeks to look at, and into, the impact of application segment length on the performance of an ATM network and the impact of traffic type data on the performance of an ATM network. To be able to examine an ATM network, we need to be able to simulate it somehow. This research, the authors have used the OPNET Modeler 14.0 simulation tool to create a network model that represents a real-life ATM network. And by actually simulating an ATM network at AUT University New Zealand, they can therefore change certain variables, and observe the effects the changes have on performance. As stated above, one of the impacts that will be explored is the effect that application segment length has on an ATM network. Thus, one variable that will be changed in our simulation is the segment length. This is the length of each packet segment that is sent through the network for a particular traffic type. The second impact to be inspected is the impact of different traffic types on an ATM network. For example, voice & video traffic should theoretically affect an ATM network
APA, Harvard, Vancouver, ISO, and other styles
28

Nisar, Kashif, Nurul I. Sarkar, and Yash Dole. "Performance Studies of Voice and Video Conferencing over ATM and Gigabit Ethernet Backbone Networks." International Journal of Technology Diffusion 3, no. 1 (January 2012): 22–32. http://dx.doi.org/10.4018/jtd.2012010103.

Full text
Abstract:
This research paper compares two popular backbone network technologies – Gigabit Ethernet and Asynchronous Transfer Mode (ATM). ATM has been a popular choice for years for providing multimedia applications over the network effectively by making use of its features like Quality of Service (QoS). Gigabit Ethernet matches ATM’s functionality by providing higher bandwidth at lower cost, less complexity and easier integration into the existing Ethernet technologies. Hence, it becomes important to compare these two technologies against various network performance metrics to find out which technology performs better for what type of applications under what circumstances. This research paper will analyze and compare the performance of those two technologies based on the throughput, end-to-end delay for Voice and Video conferencing and jitter for the Voice applications. For this purpose, two different simulations were created, one for the Gigabit Ethernet and the other one for the ATM network, using the popular commercial and academic simulation software – OPNET modeler.
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, H. K., Albert W. K. Wong, and Xiaoming Zhu. "Performance of asynchronous transfer mode (ATM) local area and wide area networks for medical imaging transmission in clinical environment." Computerized Medical Imaging and Graphics 21, no. 3 (May 1997): 165–73. http://dx.doi.org/10.1016/s0895-6111(97)89888-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Courcoubetis, Costas, and Richard Weber. "Effective Bandwidths for Stationary Sources." Probability in the Engineering and Informational Sciences 9, no. 2 (April 1995): 285–96. http://dx.doi.org/10.1017/s0269964800003867.

Full text
Abstract:
At a buffered switch in an ATM (asynchronous transfer mode) network it is important to know what combinations of different types of traffic can be carried simultaneously without risking more than a very small probability of overflowing the buffer. We show that a simple and serviceable measure of effective bandwidths may be computed for stationary traffic sources. For large buffers the effective bandwidth of a source is a function only of its mean rate, index of dispersion, and the size of the buffer.
APA, Harvard, Vancouver, ISO, and other styles
31

Et. al., Vishal Chandra ,. "VLSI Design of A Chip With High Speed Atm Switch-A Review." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1655–59. http://dx.doi.org/10.17762/turcomat.v12i2.1451.

Full text
Abstract:
In current computer communication network, it is overwhelmed by two technologies, in particular Asynchronous Transfer Mode (ATM) and Internet Protocol (IP). Association situated ATM is the awesome constant administrations which require ensured nature of-administration like video conferencing. Be that as it may, connectionless IP is more proficient than ATM for non-ongoing administrations like email. Right now, the significant exploration challenge is on the most proficient method to coordinate ATM and IP into a solitary network effectively. It is shown by the acknowledgment of the highlight of the A/I Net architecture: the A/I Switch. In this postulation, a VLSI execution of a multistage self-steering ATM switch texture which is one of the vital parts of the A/I Switch will be presented. The size of the switch model is 16x16. The chip is intended to work at the very least frequency of 100MHz and the framework is equipped for dealing with the OC-12 (622 Mbps) connect rate. In view of a piece cut architecture, the whole 16x16 switch is acknowledged utilizing four indistinguishable chips. It accomplishes elite by using dispersed control and accelerate with the input-output buffering technique. A need structure, which upholds four-level, permits the postponement delicate ATM cells to be switched with the briefest inertness. It likewise empowers the non-interleaving directing plan of IP cells.
APA, Harvard, Vancouver, ISO, and other styles
32

Uehara, Kiyohiko, and Kaoru Hirota. "Fuzzy Inference Based Connection Admission Control in ATM Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 1, no. 1 (October 20, 1997): 14–22. http://dx.doi.org/10.20965/jaciii.1997.p0014.

Full text
Abstract:
A connection admission control (CAC) method is proposed for asynchronous transfer mode (ATM) networks by applying the fuzzy inference and learning algorithm of neural networks. In order to guarantee the allowed cell loss ratio (CLR) in CAC, the upper bound of CLR must be used as the criterion for judging whether an incoming call can be accepted or not. For estimating the upper bound of CLR from observed CLR data, fuzzy inference, based on a weighted mean of fuzzy sets, is adopted. This inference method can effectively estimate the possibility distribution of CLR by applying the error back-propagation algorithm with the proposed energy functions in learning and provide the upper bound of CLR efficiently from the distribution. A self-compensation mechanism for estimation errors is also provided, which is simple enough to work in real time by taking advantage of the fuzzy inference method adopted. Fuzzy rules in the area with no observed data are generated by extrapolation from adjacent fuzzy rules in the area with observed data. This increases the multiplex gain, thereby guaranteeing the allowed CLR as much as possible. The simulation results show the feasibility of the proposed CAC method.
APA, Harvard, Vancouver, ISO, and other styles
33

SALEH, ANDHI RACHMAN, and SUNNY ARIEF SUDIRO. "CRC 8-bit Encoder-Decoder Component in FPGA using VHDL." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 8, no. 1 (January 31, 2020): 58. http://dx.doi.org/10.26760/elkomika.v8i1.58.

Full text
Abstract:
AbstrakCyclic Redundancy Check (CRC) adalah salah satu jenis dari deteksi kesalahan yang digunakan pada pengiriman data. CRC umumnya digunakan di jaringan digital dan perangkat penyimpanan untuk mendeteksi perubahan tidak disengaja pada data asli. CRC memiliki keandalan yang tinggi dalam pengiriman data karena CRC menggunakan algoritma berdasarkan cyclic code. Pada artikel ini generator polinomial yang digunakan dalam encoder dan decoder adalah CCITT dan dengan lebar bit data 8 bit. CRC-8-CCITT biasanya digunakan pada Asynchronous Transfer Mode (ATM) headers, Integrated Services Digital Network (ISDN) HEC, dll. Pada penelitian ini dilakukan perancangan dan diterapkan dengan menggunakan VHDL. Software pendukung yang digunakan untuk mengimplementasikan VHDL adalah Xilinx ISE 8.1i.Kata kunci: Cyclic Redundancy Check (CRC), VHDL Language, Xilinx ISE 8.1iAbstractCyclic Redundancy Check (CRC) is one type of error detection used in data transmission. CRC commonly used in digital networks and storage devices to detect accidental changes to raw data. CRC has high reliability in data transmission because uses algorithms based on cyclic codes. In this article the polynomial generator used in the encoder and decoder is the CCITT and with a width of 8 bits data bits.CRC-8-CCITT usually used at Asynchronous Transfer Mode (ATM) headers, Integrated Services Digital Network (ISDN) HEC, etc. This article presents design and implementation of a component using VHDL. The supporting software used to implement VHDL is Xilinx ISE 8.1i.Keywords: Cyclic Redundancy Check (CRC), VHDL Language, Xilinx ISE 8.1i
APA, Harvard, Vancouver, ISO, and other styles
34

Mansfield, John F., Andy Adamson, and Kevin Coffman. "Development of a System to Provide Full, Real-time Remote Control of a Scanning Electron Microscope across the Second Generation Internet: The Teaching SEM." Microscopy and Microanalysis 6, no. 1 (January 2000): 31–41. http://dx.doi.org/10.1017/s1431927600000064.

Full text
Abstract:
The development and makeup of a real-time full remote control system for the University of Michigan, Department of Materials Science and Engineering Teaching SEM is described. The instrument was initially controlled via the campus local area Ethernet network and cable TV network. The latest implementation employs Fast Ethernet, Asynchronous Transfer Mode (ATM) networks, and moving picture experts group (MPEG) video encoding to effect the remote control via the computer network alone. Remote control demonstrations from Washington, DC, Dearborn, MI, and Emerson School, Ann Arbor, MI are described.
APA, Harvard, Vancouver, ISO, and other styles
35

Mansfield, John F., Andy Adamson, and Kevin Coffman. "Development of a System to Provide Full, Real-time Remote Control of a Scanning Electron Microscope across the Second Generation Internet: The Teaching SEM." Microscopy and Microanalysis 6, no. 1 (January 2000): 31–41. http://dx.doi.org/10.1007/s100059910003.

Full text
Abstract:
Abstract The development and makeup of a real-time full remote control system for the University of Michigan, Department of Materials Science and Engineering Teaching SEM is described. The instrument was initially controlled via the campus local area Ethernet network and cable TV network. The latest implementation employs Fast Ethernet, Asynchronous Transfer Mode (ATM) networks, and moving picture experts group (MPEG) video encoding to effect the remote control via the computer network alone. Remote control demonstrations from Washington, DC, Dearborn, MI, and Emerson School, Ann Arbor, MI are described.
APA, Harvard, Vancouver, ISO, and other styles
36

PAP, LÁSZlÓ, and SÁNDOR IMRE. "A NEW CALL ADMISSION CONTROL METHOD BASED ON THE ESTIMATION OF THE LOST CELL." Journal of Circuits, Systems and Computers 09, no. 05n06 (October 1999): 321–38. http://dx.doi.org/10.1142/s0218126699000268.

Full text
Abstract:
Due to the capability to serve a large number and various types of user traffic, ATM (Asynchronous Transfer Mode) networks are going to be the leading role in telecommunications in the immediate future. To guarantee high quality communications for a lot of customers and efficient use of network resources, the ATM network management has to contain appropriate Call Admission Control (CAC) algorithms. Choosing suitable network and user models, the CAC problem can be traced back to statistical inequalities. This paper introduces a CAC technique based on the Mean Value of the Lost Cells (MVLC) instead of using Cell Loss Probability that follows Gaussian approach. Two methods are presented which are able to estimate efficiently the MVLC. These methods are based on special transformation of the Chernoff bound.
APA, Harvard, Vancouver, ISO, and other styles
37

Gupta, U. C., and Karabi Sikdar. "A finite capacity bulk service queue with single vacation and Markovian arrival process." Journal of Applied Mathematics and Stochastic Analysis 2004, no. 4 (January 1, 2004): 337–57. http://dx.doi.org/10.1155/s1048953304403025.

Full text
Abstract:
Vacation time queues with Markovian arrival process (MAP) are mainly useful in modeling and performance analysis of telecommunication networks based on asynchronous transfer mode (ATM) environment. This paper analyzes a single-server finite capacity queue wherein service is performed in batches of maximum size “b” with a minimum threshold “a” and arrivals are governed by MAP. The server takes a single vacation when he finds less than “a” customers after service completion. The distributions of buffer contents at various epochs (service completion, vacation termination, departure, arbitrary and pre-arrival) have been obtained. Finally, some performance measures such as loss probability and average queue length are discussed. Numerical results are also presented in some cases.
APA, Harvard, Vancouver, ISO, and other styles
38

Shijer, Sameera Sadey, and Ahmad H. Sabry. "Analysis of performance parameters for wireless network using switching multiple access control method." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (August 31, 2021): 6–14. http://dx.doi.org/10.15587/1729-4061.2021.238457.

Full text
Abstract:
The developments of wireless networks have directed to search for opportunities of a broad diversity of improved and new networking contributions. Wireless Asynchronous Transfer Mode (ATM) is a non-synchronous or random mode of transferring information. The advantages of circuit switching include dedicated connections and guaranteed traffic parameters and the benefits of packet switching are the efficiency at the physical layer and a more cost-effective design. ATM is the only protocol that offers the best of both communication methods. Although the Variable Bit-Rate (VBR) transmission presents a promising prospective of stable data quality, it is usually accompanied by network traffic overload and cell packet loss, which extensively weakens that potential. This work overcomes these concerns by developing a switching-based multiple access control model to improve the data transmission performance of wireless ATM. Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. It is demonstrated that the introduced method effectively transmits information without creating any network complexity and delay
APA, Harvard, Vancouver, ISO, and other styles
39

Sarkar, Nuru I., Kashif Nisar, and Layangi Babbage. "Performance Studies on Campus-Wide Focus on FTP, Video and VoIP Ethernet Network." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 1 (January 2012): 49–59. http://dx.doi.org/10.4018/japuc.2012010106.

Full text
Abstract:
The Advanced Network Technologies is research that investigates technology(s) behind today’s modern networks and network infrastructures. One part of this technology being Asynchronous Transfer Mode (ATM). A technology commonly in place in networks all around the world today. This paper focuses on ATM. Dubbed “Modelling and Performance Studies of ATM Networks”; this research seeks to look at and into the “impact of application segment length on the performance of an ATM network” and the “impact of traffic type data on the performance of an ATM network”. To be able to examine an ATM network, the authors need to be able to simulate a network. Thus, for this research, they have used the OPNET Modeler 14.0 Simulation software to create a network model that represents a ATM network. By actually simulating an ATM network at AUT University New Zealand, the authors can therefore change certain variables, and observe the effects the changes have on performance. As stated, one of the impacts that will be explored is the effect that application segment length has on an ATM network. Thus, one variable that will be changed in the authors’ simulation is the segment length. This is the length of each packet segment that is sent through the network for a particular traffic type. The second impact to be inspected is the impact of different traffic types on an ATM network. This network model is based on a campus network. An Application Configuration is setup with default parameters which specify 8 common applications used. Among them the ones that the authors will focus on are VOIP, Video and FTP. A Profile Configuration is setup that will define the 3 applications stated above. A fixed node model of 100BaseT will specify the profile configuration for each scenario and the number of work stations of each scenario.
APA, Harvard, Vancouver, ISO, and other styles
40

Núñez-Queija, R., and O. J. Boxma. "Analysis of a multi-server queueing model of ABR." Journal of Applied Mathematics and Stochastic Analysis 11, no. 3 (January 1, 1998): 339–54. http://dx.doi.org/10.1155/s1048953398000288.

Full text
Abstract:
In this paper we present a queueing model for the performance analysis of Available Bit Rate (ABR) traffic in Asynchronous Transfer Mode (ATM) networks. We consider a multi-channel service station with two types of customers, denoted by high priority and low priority customers. In principle, high priority customers have preemptive priority over low priority customers, except on a fixed number of channels that are reserved for low priority traffic. The arrivals occur according to two independent Poisson processes, and service times are assumed to be exponentially distributed. Each high priority customer requires a single server, whereas low priority customers are served in processor sharing fashion. We derive the joint distribution of the numbers of customers (of both types) in the system in steady state. Numerical results illustrate the effect of high priority traffic on the service performance of low priority traffic.
APA, Harvard, Vancouver, ISO, and other styles
41

Biradar, Prabhavati, and Purushottama T L. "DESIGN OF TRAFFIC ENGINEERED MULTI-PROTOCOL LABEL SWITCHING-TRANSPORT PROFILE (MPLS-TP) FOR THE ENHANCEMENT OF QUALITY OF SERVICE." International Journal of Research -GRANTHAALAYAH 5, no. 4RACEEE (April 30, 2017): 58–67. http://dx.doi.org/10.29121/granthaalayah.v5.i4raceee.2017.3323.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is a switching technology. MPLS-TP is a progressive version of MPLS in the field of packet switched data network. MPLS-TP is a high-end technology which implements network methodologies in a transport layer. For managing virtual private network(VPN) services, MPLS is of developing enthusiasm to the service providers (SPs) and furthermore to VPN customers. MPLS-enabled routers allot a few labels to the packets, and in view of these allocated labels it produces sending decisions. The prime expectation after the MPLS technology is to eliminate the need of OSI model data link layered (layer-2) technology i.e. frame relay, Ethernet, asynchronous transfer mode (ATM). This paper gives data about the components of Multi-Protocol Label Switching (MPLS), correlation of MPLS with traditional Routing and Packet Switching, MPLS label format and MPLS operation.
APA, Harvard, Vancouver, ISO, and other styles
42

Voigt, Andreas, and Helena Linzer. "Spatial Planning and Remote Teamwork." International Journal of Virtual Reality 3, no. 2 (January 1, 1997): 46–59. http://dx.doi.org/10.20870/ijvr.1997.3.2.2624.

Full text
Abstract:
The following contribution describes work in progress within the context of the focal field of research and development remote teamwork (RT) of Vienna University of Technology (Dept. of Local Planning - IFOR), which is carried out in cooperation with the Institute for Spatial Interaction and Simulation (IRIS-ISIS), Vienna, exchanging experience with the Research Institute for Symbolic Computation (RISC Linz-Hagenberg). Research work is aimed at the elaboration of suitable collaborative remote working structures for research and project transactions, including study projects, within the context of spatial planning on the basis of ATM (Asynchronous Transfer Mode: a technology of broad band telecommunications). The generation and manipulation of digital spatial models and their virtual transportation within large spatial distances represent main objectives. The current subjects in urban and regional planning and in architecture act as test projects to be defined in the course of the research project in their contents and spatial context and to be represented as digital spatial working models.
APA, Harvard, Vancouver, ISO, and other styles
43

Loula, P., E. Rauhala, M. Erkinjuntti, E. Raty, K. Hirvonen, and V. Hakkinen. "Distributed clinical neurophysiology." Journal of Telemedicine and Telecare 3, no. 2 (June 1, 1997): 89–95. http://dx.doi.org/10.1258/1357633971930922.

Full text
Abstract:
We have developed a consultation forum for clinical neurophysiology in Finland. The system connects local digital electroencephalography EEG recording and analysing networks using a high-speed asynchronous transfer mode ATM network. Clinicians can obtain a second opinion using interactive data and video consultations or using data-only consultations. In addition, the system can be used for off-line review of prerecorded data. During a one-month evaluation, 66 EEG recordings were made altogether in Satakunta Central Hospital and consultations were required on 12 occasions. Nine of them were data-only consultations and three were data and video consultations. A data consultation lasted 15-20 min and a data and video consultation 35-45 min. Clinically, there were numerous benefits for the hospitals. The system established a link to a centre of excellence for second opinions or continuing education. It also helped with on-duty arrangements and enabled the construction of national data banks.
APA, Harvard, Vancouver, ISO, and other styles
44

Lee, Duan-Shin. "On the optimality and the asymptotic optimality of the smallest weighted available buffer policy." Advances in Applied Probability 31, no. 04 (December 1999): 1118–50. http://dx.doi.org/10.1017/s0001867800009654.

Full text
Abstract:
A major design challenge of Asynchronous Transfer Mode (ATM) networks is to efficiently provide the quality of service (QOS) specified by users with different demands. We classify sources so that sources in one class join the same buffer and have the same requirement for the ATM cell loss ratio. It is important to search for the service discipline that minimizes the accumulated cell loss under the constraint that the cell loss ratios of the sources are proportional to their QOS requirements. In this paper we consider a model that has N finite buffers and a single server. Buffer i, of size B i , is assigned a positive number w i . The server serves from one of the non-empty buffers whose indices are equal to argmin w i (B i -Q i ), where Q i is the queue length of buffer i. This scheduling policy is called the smallest weighted available buffer policy (SWAB). We show that in a completely symmetric setting, the SWAB policy minimizes the discounted expected loss of cells under some technical conditions. For asymmetric models, we show that the accumulated loss of cells of the SWAB service discipline is asymptotically optimal under heavy traffic conditions in the diffusion limit. Finally, we obtain the expression of w i so that the cell loss ratios of the sources in the diffusion limit are proportional to their QOS requirements.
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Duan-Shin. "On the optimality and the asymptotic optimality of the smallest weighted available buffer policy." Advances in Applied Probability 31, no. 4 (December 1999): 1118–50. http://dx.doi.org/10.1239/aap/1029955263.

Full text
Abstract:
A major design challenge of Asynchronous Transfer Mode (ATM) networks is to efficiently provide the quality of service (QOS) specified by users with different demands. We classify sources so that sources in one class join the same buffer and have the same requirement for the ATM cell loss ratio. It is important to search for the service discipline that minimizes the accumulated cell loss under the constraint that the cell loss ratios of the sources are proportional to their QOS requirements. In this paper we consider a model that has N finite buffers and a single server. Buffer i, of size Bi, is assigned a positive number wi. The server serves from one of the non-empty buffers whose indices are equal to argmin wi(Bi-Qi), where Qi is the queue length of buffer i. This scheduling policy is called the smallest weighted available buffer policy (SWAB). We show that in a completely symmetric setting, the SWAB policy minimizes the discounted expected loss of cells under some technical conditions. For asymmetric models, we show that the accumulated loss of cells of the SWAB service discipline is asymptotically optimal under heavy traffic conditions in the diffusion limit. Finally, we obtain the expression of wi so that the cell loss ratios of the sources in the diffusion limit are proportional to their QOS requirements.
APA, Harvard, Vancouver, ISO, and other styles
46

Smith, N. R., R. E. Tullis, N. Fegan, and C. L. Morgan. "Remote Operation of a Scanning Electron Microscope (SEM) from Distant Classrooms." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 414–15. http://dx.doi.org/10.1017/s0424820100164532.

Full text
Abstract:
California State University, Hayward (CSUH) has successfully demonstrated remote operation of a scanning electron microscope (SEM) using several networking interfaces. One of these methods is the use of highbandwidth asynchronous transfer mode (ATM). The different networking schemes have made it possible for instructors and researchers to access and control the Cal State Hayward SEM from classrooms located within the same building housing the microscope. In addition, the microscope has been remotely operated from across campus, from the local community college, and from San Jose State University.The development of digital imaging technology provides opportunities of developing networking schemes for access and control of scientific instrumentation. The ability to network microscopes offers the capability of teaching microscopy methods to a large number of students at the same time. The traditional microscopy class includes the instructor training one student at a time while other students observe the operator of the instrument. Remote shared access to scientific instrumentation provides the advantages of a wider variety of resources and pooling of knowledge by a larger community.
APA, Harvard, Vancouver, ISO, and other styles
47

Leng, Supeng, K. R. Subramanian, N. Sundararajan, and P. Saratchandran. "Novel Neutral Network Approach to Call Admission Control in High-speed Networks." International Journal of Neural Systems 13, no. 04 (August 2003): 251–62. http://dx.doi.org/10.1142/s0129065703001571.

Full text
Abstract:
This paper presents a novel Call Admission Control (CAC) scheme which adopts the neural network approach, namely Minimal Resource Allocation Network (MRAN) and its extended version EMRAN. Though the current focus is on the Call Admission Control (CAC) for Asynchronous Transfer Mode (ATM) networks, the scheme is applicable to most high-speed networks. As there is a need for accurate estimation of the required bandwidth for different services, the proposed scheme can offer a simple design procedure and provide a better control in fulfilling the Quality of Service (QoS) requirements. MRAN and EMRAN are on-line learning algorithms to facilitate efficient admission control in different traffic environments. Simulation results show that the proposed CAC schemes are more efficient than the two conventional CAC approaches, the Peak Bandwidth Allocation scheme and the Cell Loss Ratio (CLR) upperbound formula scheme. The prediction precision and computational time of MRAN and EMRAN algorithms are also investigated. Both MRAN and EMRAN algorithms yield similar performance results, but the EMRAN algorithm has less computational load.
APA, Harvard, Vancouver, ISO, and other styles
48

Szarkowicz, Krzysztof, Gábor Fodor, András Faragó, and Tamás Henk. "Simulation Analysis of Routing Strategies in Multicasting Multiservice Loss Networks." SIMULATION 68, no. 1 (January 1997): 34–43. http://dx.doi.org/10.1177/003754979706800108.

Full text
Abstract:
This paper begins with an overview of multicast algorithms, which are the most promising candidates to be in wide use in first generation Asynchronous Transfer Mode (ATM) based Broadband Integrated Services Digital Networks (B-ISDN). Since the Multiple Destination Routing (MDR) problem and the associated Steiner Tree problem are known to be NP-complete and therefore a number of heuristic algorithms have been proposed in the literature, we first need to establish which of these are the best candidates for the B-ISDN. We conclude that the weighted greedy -type algorithms are promising ones, and therefore we examine the behavior of these algorithms in terms of blocking probability and network utilization. In doing so, we use a B-ISDN call level simulation program, which proves to be an indispensable tool in the quest for efficient multicast algorithms. We find that shortest path routing with appropriate (adaptive) weight functions combined with the complete partitioning link allocation policy may give satisfactory blocking values and good network utilization in networks of different sizes.
APA, Harvard, Vancouver, ISO, and other styles
49

Schumacher, H. J. (Jerry), Tony Lee, and Sumit Ghosh. "A Novel, User-Level, Security-On-Demand Paradigm for ATM Networks: Modeling, Simulation, and Performance Analysis." Journal of Interconnection Networks 04, no. 04 (December 2003): 429–61. http://dx.doi.org/10.1142/s0219265903000969.

Full text
Abstract:
With networks increasingly moving into virtually every aspect of our daily life, security is gaining importance, not only from the traditional perspective of communication but the network's growing role in modern automation and control. The traditional, certification based approach attempts to guarantee the security of a network through certification. Certified networks are generally confined to a limited domain and, as a result, they are isolated, costly, and under-utilized. In contrast, this paper presents a new principle – user-level, security-on-demand system, wherein the network allocates, where possible, the security resources commensurate with the user's request for transporting message(s) through the network securely. This principle is successfully demonstrated for the current Asynchronous Transfer Mode (ATM) networks, and is the result of an integration of the fundamental framework for network security, recently proposed by the authors in the literature, with the unique characteristics of ATM networks. The framework encapsulates the fundamental knowledge and set of relationships in network security and permits scientific and systematic reasoning about network security. It also enables all user groups – military, government, industry, and academia, to define their security requirements in a uniform manner. The security-on-demand approach promises the development of a "mixed use" class of networks in the future that may be simultaneously shared by different groups of users, with the system sustaining the diverse security requirements of each user. A unique characteristic in ATM network design is the dynamic call setup process. Under it, a network first establishes a virtual path or route for a user's call, guided by the user's requirements, and then transports the messages when a route has been successfully determined. This unique ATM characteristic is integrated with the framework to yield a successful demonstration of the proposed, user-level, security-on-demand approach. Utilizing the security framework as the foundation, every element of the network – node and link, is characterized by a security matrix that reflects its security resources. Every user is permitted to specify the security requirement for the call through a matrix, which expresses the limits of the security resources that the traffic cells must encounter during their transport through the network. Thus, during the dynamic establishment of the virtual path, every node and link is examined to ensure that the user-specified security is met, in addition to bandwidth and other Quality of Service (QoS) requirements. Traffic is launched when the call setup succeeds, otherwise, the call fails. Like all networks, the ATM network inherently consists of geographically dispersed entities and, as a result, the resource allocation strategy is necessarily distributed. Furthermore, as the network operation progresses, the resource availability scene changes dynamically. This paper proposes a unique function that reduces the key network resource parameters at a node to a single value, termed Node Status Indicator (NSI). The NSI value is computed dynamically at every node and disseminated across the network to be utilized by a node to refine its determination of a virtual path for a user call. The aim of the NSI is to improve the resource utilization in the network. The proposed approach is modeled for a large-scale, representative, 40-node ATM network. Utilizing stochastic input traffic that is synthesized to reflect realistic operating conditions, the model is simulated extensively on a testbed of 35+ Pentium workstations, under Linux, configured as a loosely-coupled parallel processor, utilizing an accurate, asynchronous, distributed simulator. The simulator implements the key characteristics of the ATM Forum proposed P-NNI 1.0 and UNI 3.0 standards. While the simulation results reflect a successful realization of the proposed approach, analysis reveals minimal impact of incorporating security on ATM network performance, as measured through call success rates and call setup times. In contrast, the tradition has been to incorporate security into large-scale systems and networks as an afterthought, i.e. adding hardware and software devices after the design has been completed, resulting in performance degradation. Also, while the use of NSI is observed to yield slightly lower average call setup rates and slightly higher average call setup times, a careful analysis of the trace of the calls as they progress through the system, reveals that, in general, calls are dispersed throughout the network, seeking to utilize all available resources of the network more evenly.
APA, Harvard, Vancouver, ISO, and other styles
50

Horvath, Tomas, Petr Munster, and Ning-Hai Bao. "Lasers in Passive Optical Networks and the Activation Process of an End Unit: A Tutorial." Electronics 9, no. 7 (July 9, 2020): 1114. http://dx.doi.org/10.3390/electronics9071114.

Full text
Abstract:
It is 21 years since the first passive optical network (PON) was standardized as an asynchronous transfer mode passive optical network (APON) with same optical distribution network scheme as we know in current networks. A lot of PON networks were standardized in the following years and became an important part of telecommunication. The general principles of these PON networks are described in many papers and books, but only a little information about used lasers is available. The aim of this tutorial is to describe lasers used in PON networks and principles of their operation. The paper describes the principles of single longitudinal mode (SLM), multi longitudinal mode (MLM), distributed-feedback (DFB), and Fabry–Pérot (FP) lasers. Furthermore, the lasers are compared by their usage in optical line termination (OLT) for passive optical networks. The second part of this tutorial deals with activation process of optical network unit. The described principle is the same for connection of a new customer or blackout scenario. The end unit is not able to communicate until reach the operational state; each state is defined with physical layer operation and administration and maintenance (PLOAM) messages sequence and their processing.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography