• 제목/요약/키워드: optical Internet

검색결과 372건 처리시간 0.028초

광프로세서를 위한 효율적인 제어회로 설계 및 검증 (A Design and Verification of an Efficient Control Unit for Optical Processor)

  • 이원주
    • 전자공학회논문지CI
    • /
    • 제43권4호
    • /
    • pp.23-30
    • /
    • 2006
  • 본 논문은 $LiNbO_3$ 광스위칭 소자를 이용한 광컴퓨터 시스템인 SPOC(Stored Program Optical Computer)의 제어 동작의 문제점을 개선한 회로를 설계하고 검증한다. SPOC의 메모리는 DLM(Delay Line Memory) 구조이고, 오퍼런드가 필요 없는 명령어도 메모리 접근 과정을 수행하기 때문에 메모리 접근에 많은 시간이 소요되는 문제점이 있다. 또한 원하는 연산만을 선택하여 수행할 수 없기 때문에 산술논리장치에서 불필요한 연산이 많이 수행된다. 따라서 본 논문에서는 오퍼런드를 찾기 전에 미리 명령어를 해독함으로써 오퍼런드가 필요 없는 명령어의 메모리 접근을 제거하도록 회로를 개선한다. 또한 산술논리장치내의 모든 연산회로에 오퍼런드를 보내지 않고 특정 연산회로에만 오퍼런드를 보냄으로써 불필요한 연산을 줄인다. 그리고 DIR(Dual Instruction Register) 구조를 제시하여 전체 프로그램의 실행시간을 최소화한다.

다중속도의 광신호 추출 및 클락-데이터 복원회로 설계 (Design of A Clock-and-Data Recovery Circuit for Detection and Reconstruction of Broadband Multi-rate Optical Signals)

  • 김강욱
    • 센서학회지
    • /
    • 제12권4호
    • /
    • pp.191-197
    • /
    • 2003
  • 최근 인터넷 사용의 증가로 인한 데이터 전송이 급속히 증가하고 있고, 이러한 전송을 위해 광섬유가 주로 사용되고 있다. 장거리 통신을 통한 신호의 감쇄 및 왜곡을 보정하기 위하여 보통 광신호를 전기적인 신호로 변환하여 신호를 재생한다. 이러한 광신호는 포토 다이오드를 통하여 전기적인 신호로 바꾸어지는데, 광신호의 정확한 클락과 데이터를 추출하는 과정은 필수적이다. 본 연구에서는 광대역의 광신호 클락과 데이터의 복원에 쓰이는 클락-데이터 복원회로(CDR)를 1.8V $0.18\;{\mu}m$ CMOS공정을 이용하여 설계하였다. 이 CDR 회로는 위상고정 루프를 사용한 회로로서 개선된 위상비교기 및 전하 펌프를 사용하였다. 특히 설계된 CDR은 광대역 링 발진기를 사용함으로서 750 Mb/s에서 2.85 Gb/s의 다중속도를 가진 데이터의 클락과 데이터의 복원이 가능하다.

광섬유 기반 IPTV 네트워크를 위한 FC 내장형 IPTV STB 제안 (Suggestion of an Fiber Channel-Embedded IPTV STB for Optical Fiber-based IPTV Networks)

  • 정성욱
    • 한국정보전자통신기술학회논문지
    • /
    • 제10권3호
    • /
    • pp.213-219
    • /
    • 2017
  • 최근, 인터넷 프로토콜 텔레비전 (IPTV) 서비스가 일반화되어 TV시청 뿐만 아니라 다양한 인터넷기반 서비스가 가능하다. 이러한 IPTV 시스템에서 STB(Set-Top Box)는 실시간 멀티미디어 콘텐츠를 송수신 할 수 있도록 지원하는 네트워크 단말 장치로써 작동한다. 이러한 IPTV 네트워크는 일반적으로 FTTH(Fiber-To-The-Home)와 같은 광섬유(Optical Fiber) 기반의 광대역기반 네트워크에 의해 제공되지만 현재 대부분의 IPTV STB는 대역폭(Bandwidth)을 공유하는 이더넷(Ethernet)과 같은 로컬 영역 네트워크(LAN)에 연결된 장치 중 하나로 연결된다. 따라서 HD급 고화질 콘텐츠 및 다양한 서비스 지원을 위한 IPTV STB을 위하서는 1Gbps와 같은 충분한 광섬유 기반의 네트워크 대역폭을 효과적으로 활용할 수 있어야 한다. 이를 위하여 본 논문에서는 광섬유 네트워크에 바로 장착할 수 있는 새로운 FC(Fiber Channel) 내장형 IPTV STB를 제안한다. 그 후 해당 제안된 FC 내장형 IPTV STB의 우수성을 확인하기 위하여 해당 FC 내장형 IPTV STB가 장착된 FC-AL(Fiber Channel-Arbitration Loop) 네트워크를 구성하여 해당 아키텍처의 성능을 검증한다. 우수한 IPTV 아키텍처의 성능을 확인하기 위하여 철저한 시뮬레이션을 통하여 평균 시작지연(Average Start-up Delay) 시간, 평균 거부비율(Average Reject Ratio) 및 동시 사용자수(Number of Concurrent Users)를 측정한다. 놀랍게도, 제안된 FC 내장형 IPTV STB가 장착된 IPTV 네트워크 아키텍처는 10 msec 미만의 우수한 평균 시작지연(Average Start-up Delay) 시간, 3 % 미만의 수용가능한(Acceptable) 평균 거부비율(Average Reject Ratio) 및 아키텍처를 확장 할 때 동시 사용자수의 선형증가(Linear Increase)를 보여준다. 이는 제안된 FC 내장형 STB가 광섬유 기반의 광대역 대역폭을 효과적으로 사용하여 전체 IPTV 네트워크 성능에 우수한 영향을 미치고 있음을 보여준다.

Development of Efficient Dynamic Bandwidth Allocation Algorithm for XGPON

  • Han, Man Soo;Yoo, Hark;Lee, Dong Soo
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.18-26
    • /
    • 2013
  • This paper proposes an efficient bandwidth utilization (EBU) algorithm that utilizes the unused bandwidth in dynamic bandwidth allocation (DBA) of a 10-gigabit-capable passive optical network (XGPON). In EBU, an available byte counter of a queue can be negative and the unused remainder of an available byte counter can be utilized by the other queues. In addition, EBU uses a novel polling scheme to collect the requests of queues as soon as possible. We show through analysis and simulations that EBU improves performance compared to that achieved with existing methods. In addition, we describe the hardware implementation of EBU. Finally we show the test results of the hardware implementation of EBU.

EPON의 DBA 방안에서 실시간 트래픽의 패킷 손실률과 지연 성능 분석 (Packet Delay and Loss Analysis of Real-time Traffic in a DBA Scheme of an EPON)

  • 심세용;박철근
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.86-88
    • /
    • 2004
  • As the rapid incensement of the number of internet users has occurred recently, many multimedia application services have been emerging. To improve quality of service, traffic can be suggested to be classified with priority in EPON(Ethernet Passive Optical Network), which is supporting the multimedia application services. In this paper, multimedia application services treat bandwidth classifying device in serving both delay sensitive traffic for real-time audio, video and voice data such as VoIP(Voice over Internet Protocol), and nonreal-time traffic such as BE(Best Effort). With looking through existing mechanisms, new mechanism to improve the quality will be suggested. The delay performances and packet losses of traffic achieved by supporting bandwidth allocation of upstream traffic in suggested mechanism will be analyzed with simulation.

  • PDF

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability

  • Qin, Chuan;Chang, Chin-Chen;Hsu, Tai-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권11호
    • /
    • pp.2941-2956
    • /
    • 2013
  • In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.

A Study on Ceiling Light and Guided Line based Moving Detection Estimation Algorithm using Multi-Camera in Factory

  • Kim, Ki Rhyoung;Lee, Kang Hun;Cho, Su Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제10권4호
    • /
    • pp.70-74
    • /
    • 2018
  • In order to ensure the flow of goods available and more flexible, reduce labor costs, many factories and industrial zones around the world are gradually moving to use automated solutions. One of them is to use Automated guided vehicles (AGV). Currently, there are a line tracing method as an AGV operating method, and a method of estimating the current position of the AGV and matching with a factory map and knowing the moving direction of the AGV. In this paper, we propose ceiling Light and guided line based moving direction estimation algorithm using multi-camera on the AGV in smart factory that can operate stable AGV by compensating the disadvantages of existing AGV operation method. The proposed algorithm is able to estimate its position and direction using a general - purpose camera instead of a sensor. Based on this, it can correct its movement error and estimate its own movement path.

Illumination-Robust Foreground Extraction for Text Area Detection in Outdoor Environment

  • Lee, Jun;Park, Jeong-Sik;Hong, Chung-Pyo;Seo, Yong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.345-359
    • /
    • 2017
  • Optical Character Recognition (OCR) that has been a main research topic of computer vision and artificial intelligence now extend its applications to detection of text area from video or image contents taken by camera devices and retrieval of text information from the area. This paper aims to implement a binarization algorithm that removes user intervention and provides robust performance to outdoor lights by using TopHat algorithm and channel transformation technique. In this study, we particularly concentrate on text information of outdoor signboards and validate our proposed technique using those data.

Reduced-State MLSD Based on Volterra Kernels for Square-Law Detected Multipath Channels

  • Ha, Young-Sun;Chung, Won-Zoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권12호
    • /
    • pp.2315-2325
    • /
    • 2011
  • We propose a novel reduced-state maximum-likelihood sequence detection (MLSD) structure using the Viterbi algorithm based on the second-order Volterra kernel modeling nonlinear distortion due to square law detection of multipath channels commonly occurring in chromatic dispersion (CD) or polarization mode dispersion (PMD) in optical communication systems. While all existing MLSD methods for square-law detection receivers are based on direct computation of branch metrics, the proposed algorithm provides an efficient and structured way to implement reduced-state MLSD with almost the same complexity of a MLSD for linear channels. As a result, the proposed algorithm reduces the number of parameters to be estimated and the complexity of computation.

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.