Spelling suggestions: "subject:"packet""
21 |
Consequences and Applications of Non-differentiable Angular Dispersion and Space-time Wave PacketsHall, Layton Alec 01 January 2023 (has links) (PDF)
First demonstrated by Isaac Newton in his prism experiment, angular dispersion (AD) is a prevalent effect in optics where each wavelength in a pulsed field propagates at a different angle. Angular dispersion occurs after a collimated pulse traverses a diffractive or dispersive device and, as a result, helps modify the group velocity of a pulse in free space and introduces group-velocity dispersion into the freely propagating wave packet. These are essential ingredients in group-velocity matching and dispersion cancellation in various optical settings. With 300 years of development, it was only recently that a new class of angular dispersion materialized as non-differentiable AD. This non-differentiable AD has also been studied under the moniker space-time wave packets (STWP) and has shown to be propagation-invariant and possess arbitrary group velocity. In this dissertation, I will study (1) the underpinning theory of how non-differentiable AD allows for an optical field to break the pre-conceived notions of group velocity, group velocity dispersion (GVD), and pulse front tilt for on-axis propagation through analytical and experimental demonstrations. From these developments, I will (2) apply these concepts of non-differentiable AD to dispersive materials. I will validate these analytical predictions through experiments showing that propagation-invariant wave packets can also be supported in normal and anomalous media. Moreover, I will prove, through the use of non-differentiable AD, that the dispersive properties of a material can be overwritten to produce arbitrary group velocity and GVD characteristics. With this new information on propagation-invariant fields in dispersive materials, I will (3) exhibit new classes of optical fields that were previously theorized but never synthesized in dispersive materials, such as the X- to O- transition in anomalous GVD materials, which will be connected to the de-Broglie-Mackinnon wave packet and particle wave packets. To address the propagation invariance of non-differentiable AD, I will (4) demonstrate the STWP propagation throughout a kilometer in a turbulent environment and develop a new Rayleigh length for the STWP. Finally, I will (5) establish the consequences of discretization on the non-differentiable AD and produce a new form of the Talbot effect in which the temporal and spatial degrees of freedom are interlocked along with independent spatial and temporal Talbot effects in free space.
|
22 |
Nondispersive wave packetsShaarawi, Amr Mohamed January 1989 (has links)
In this work, nondispersive wave packet solutions to linear partial differential equations are investigated. These solutions are characterized by infinite energy content; otherwise, they are continuous, nonsingular and propagate in free space without spreading out. Examples of such solutions are Berry and Balazs’ Airy packet, MacKinnon’s wave packet and Brittingham’s Focus Wave Mode (FWM). It is demonstrated in this thesis that the infinite energy content is not a basic problem per se and that it can be dealt with in two distinct ways. First these wave packets can be used as bases to construct highly localized, slowly decaying, time-limited pulsed solutions. In the case of the FWMs, this path leads to the formulation of the bidirectional representation, a technique that provides the most natural basis for synthesizing Brittingham-like solutions. This representation is used to derive new exact solutions to the 3-D scalar wave equation. It is also applied to problems involving boundaries, in particular to the propagation of a localized pulse in an infinite acoustic waveguide and to the launch ability of such a pulse from the opening of a semi-infinite waveguide. The second approach in dealing with the infinite energy content utilizes the bump-like structure of nondispersive solutions. With an appropriate choice of parameters, these bump fields have very large amplitudes around the centers, in comparison to their tails. In particular, the FWM solutions are used to model massless particles and are capable of providing an interesting interpretation to the results of Young’s two slit experiment and to the wave-particle duality of light. The bidirectional representation provides, also, a systematic way of deriving packet solutions to the Klein-Gordon, the Schrodinger and the Dirac equations. Nondispersive solutions of the former two equations are compared to previously derived ones, e.g., the Airy packet and MacKinnon's wave packet. / Ph. D.
|
23 |
Rossby wave propagation in a bounded ocean currentHarlander, Uwe, Metz, Werner 09 November 2016 (has links) (PDF)
Die Ausbreitungspfade und die strukturelle Veränderung von quasi geostrophischen Rossby-Wellenpaketen werden mittels der WKB-Methode untersucht. Es wird angenommen, daß die Wellenpakete an einem in Ost-West-Richtung verlaufenden festen Rand reflektiert werden können. Die Dynamik der Rossby-Wellenpakete wird auf der ß-Ebene aber auch auf der sogenannten d-Oberfiäche - wo auch die zweite Ableitung des Coriolis-Parameters eine Rolle spielt - studiert. Es wird gezeigt, daß die Wellenpakete unter bestimmten Umständen große Entfernungen in zonaler Richtung entlang der Küste zurücklegen können und damit die Strömung weit stromab beeinflussen. Die Wellenpakete sind dabei zwischen dem reflektierenden Rand und einer Umkehrbreite gefangen im Unterschied zu freien Rossbywellen in der Atmosphäre, die zwischen zwei Umkehrbreiten gefangen werden können. Es zeigt sich, daß der d-Term keine besonders wichtige Rolle für die Ausbreitung der Rossby-Wellenpakete spielt, am wichtigsten ist
er noch bei der Dynamik von Wellen mit negativer Phasengeschwindigkeit. Es wird vorgeschlagen, daß ein selektiver Rossby-Wellenleiter wie er hier diskutiert wird eine Rolle in der Dynamik des Antarktik-Zirkumpolarstromes spielt. / We study the propagation and the structural change of quasi geostrophic Rossby wave packets by means of a WKB-method. Our approach involves the introduction of a rigid boundary, where the wave packets can be refiected elastically. We study Rossby wave packet dynamics at high latitudes on a modified ß-plane, where the second derivative of the Coriolis parameter with respect to latitude is taken into account (d-term). We show that under certain conditions synoptic-scale wave packets can propagate far distances along an east-west oriented \"coast\" and may affect the fiow far downstream of the source region. In contrast to free propagating Rossby wave packets ( e.g. in the atmosphere), which can be trapped between two turning latitudes, the wave packets considered here are trapped between a turning latitude and the reflecting boundary. lt turns out that the 6-term is most important for wave packets with negative phase
speeds. Finally, we suggest that such a selective Rossby waveguide may play a role in the dynamics of the Antarctic Circumpolar Current.
|
24 |
Numerical Investigation of Hypersonic Conical Boundary-Layer Stability Including High-Enthalpy and Three-Dimensional EffectsSalemi, Leonardo da Costa, Salemi, Leonardo da Costa January 2016 (has links)
The spatial stability of hypersonic conical boundary layers is investigated utilizing different numerical techniques. First, the development and verification of a Linearized Compressible Navier-Stokes solver (LinCS) is presented, followed by an investigation of different effects that affect the stability of the flow in free-flight/ground tests, such as: high-enthalpy effects, wall-temperature ratio, and three-dimensionality (i.e. angle-of-attack). A temporally/spatially high-order of accuracy parallelized Linearized Compressible Navier-Stokes solver in disturbance formulation was developed, verified and employed in stability investigations. Herein, the solver was applied and verified against LST, PSE and DNS, for different hypersonic boundary-layer flows over several geometries (e.g. flat plate - M=5.35 & 10; straight cone - M=5.32, 6 & 7.95; flared cone - M=6; straight cone at AoA = 6 deg - M=6). The stability of a high-enthalpy flow was investigated utilizing LST, LinCS and DNS of the experiments performed for a 5 deg sharp cone in the T5 tunnel at Caltech. The results from axisymmetric and 3D wave-packet investigations in the linear, weakly, and strongly nonlinear regimes using DNS are presented. High-order spectral analysis was employed in order to elucidate the presence of nonlinear couplings, and the fundamental breakdown of second mode waves was investigated using parametric studies. The three-dimensionality of the flow over the Purdue 7 deg sharp cone at M=6 and AoA =6 deg was also investigated. The development of the crossflow instability was investigated utilizing suction/blowing at the wall in the LinCS/DNS framework. Results show good agreement with previous computational investigations, and that the proper basic flow computation/formation of the vortices is very sensitive to grid resolution.
|
25 |
Spécification du protocole MAC pour les réseaux IEEE 802.11e à différentiation de services sous contrainte de mobilité / Specification of MAC protocol for quality of service in IEEE 802.11-based networks under mobility constraintsDridi, Khaled 16 December 2011 (has links)
Cette thèse a pour objectif de proposer de nouvelles approches d'ordonnancement, de coopération et de gestion de la mobilité dans les réseaux sans fil de type IEEE 802.11. Le maintien de la qualité de service (QoS), au niveau MAC, représente la caractéristique fondamentale de ces approches. L'analyse des mécanismes existants nous a conduits à retenir le protocole EDCF, supportant la QoS, comme une base de travail pour l'ensemble de nos propositions. Dans le but de pallier certaines faiblesses du standard 802.11, une nouvelle architecture à base de multi-ordonnanceurs HCF-T, est proposée. Les performances obtenues sont exprimées en termes de gestion du trafic, de maintien du débit, d'élimination de collisions et de réduction de la charge du réseau. Ensuite, un schéma coopératif est présenté et analysé. Il comporte une étude de deux protocoles de relayage AAF et DAF ainsi qu'une évaluation d'un ensemble de techniques de combinaison au niveau du récepteur. Concernant la problématique de la mobilité, nous avons retenu et analysé un scénario prenant en considération les différentes situations rencontrées dans un modèle réel. Un algorithme de résolution multi-couvertures est proposé afin de traiter l'accès dans les zones de recouvrement. Cette étude a mené à distinguer trois régimes de mobilité : faible, moyen et fort. Les performances sont évaluées en fonction des métriques MAC et pour chaque mode de mobilité, un schéma de synthèse est établi / This thesis proposes a new approach relating to the packets scheduling algorithm, the cooperation scheme and the nodes' mobility for IEEE 802.11 wireless network family. Considering the QoS delivery process at the MAC level consists the main feature of the proposal research study. The analysis of the current mechanisms leads to keep the protocol EDCF as the basic model for our work platform. In order to overcome the weakness of the earlier 802.11 standard, a new model based on multi-scheduler algorithm, called HCF-T, is proposed. The achieved performances are summarized following several criteria: traffic control, throughput improving, collisions avoidance, and network load decreasing. Furthermore, in the way of getting better results according to the PHY layer, we presented and analyzed a model of cooperative diversity scheme. It included a couple of relaying protocols AAF and DAF supported by a set of combining techniques to backup the signal at the receiver. To support node's mobility within EDCF, we built-up a model of WLAN which able to track node motion and control the access as in real condition. In the case of overlapping APs ranges, we developed a Multi-coverage algorithm aiming to carry out the session associations. As a result, three levels (Low, Medium, and High) of node's speed are discerned. Finally, EDCF has been implemented on various static and dynamic scenarios. The performances, based on the main MAC-layer metrics, such as throughput, End-2-End delay, and jitter, have been classified and comprehensively evaluated
|
26 |
Design and Evaluation of the Combined Input and Crossbar Queued (CICQ) SwitchYoshigoe, Kenji 09 August 2004 (has links)
Packet switches are used in the Internet to forward information between a sender and receiver and are the critical bottleneck in the Internet. Without faster packet switch designs, the Internet cannot continue to scale-up to higher data rates. Packet switches must be able to achieve high throughput and low delay. In addition, they must be stable for all traffic loads, must efficiently support variable length packets, and must be scalable to higher link data rates and greater numbers of ports. This dissertation investigates a new combined input and crossbar queued (CICQ) switch architecture.
Some unbalanced traffic loads result in instability for input queued (IQ) and CICQ switches. This instability region was modeled, and the cause of the instability was found to be a lack of work conservation at one port. A new burst stabilization protocol was investigated that was shown to stabilize both IQ and CICQ switches. As an added benefit, this new protocol did not require a costly internal switch speed-up. Switching variable length packets in IQ switches requires the segmentation of packets into cells. The process also requires an internal switch speed-up which can be costly. A new method of cell-merging in IQ switches reduced this speed-up. To improve fairness for CICQ switches, a block and transfer method was proposed and evaluated.
Implementation feasibility of the CICQ switch was also investigated via a field programmable gate array (FPGA) implementation of key components. Two new designs for round robin arbiters were developed and evaluated. The first of these, a proposed priority-encoder-based round robin arbiter that uses feedback masking, has a lower delay than any known design for an FPGA implementation. The second, an overlapped round robin arbiter design that fully overlaps round robin polling and scheduling, was proposed and shown to be scalable, work conserving, and fair.
To allow for multi-cabinet implementation and minimization of the size of the cross point buffers, a distributed input port queue scheduler was investigated. This new scheduler minimizes the amount of buffering needed within the crossbar.
The two primary contributions of this dissertation are 1) a complete understanding of the performance characteristics of the CICQ switch, and 2) new methods for improving the performance, stability,and scalability of the CICQ switch. This work has shown that the CICQ switch can be the switch architecture of the future.
|
27 |
The Self-Calibration Method for Multiple Systems at the CHARA ArrayO'Brien, David P 07 May 2011 (has links)
The self-calibration method, a new interferometric technique using measurements in the K′-band (2.1 μm) at the CHARA Array, has been used to derive orbits for several spectroscopic binaries. This method uses the wide component of a hierarchical triple system to calibrate visibility measurements of the triple’s close binary system through quasi-simultaneous observations of the separated fringe packets of both. Prior to the onset of this project, the reduction of separated fringe packet data had never included the goal of deriving visibilities for both fringe packets, so new data reduction software has been written. Visibilities obtained with separated fringe packet data for the target close binary are run through both Monte Carlo simulations and grid search programs in order to determine the best-fit orbital elements of the close binary.
Several targets, with spectral types ranging from O to G and luminosity classesfrom III to V, have been observed in this fashion, and orbits have been derived for the close binaries of eight targets (V819 Her B, Kappa Peg B, Eta Vir A, Eta Ori Aab, 55 UMa A, 13 Ceti A, CHARA 96 Ab, HD 129132 Aa). The derivation of an orbit has allowed for the calculation of the masses of the components in these systems. The magnitude differences between the components can also be derived, provided that the components of the close binary have a magnitude difference of Delta K < 2.5 (CHARA’s limit). Derivation of the orbit also allows for the calculation of the mutual inclination (Phi), which is the angle between the planes of the wide and close orbits. According to data from the Multiple Star Catalog, there are 34 triple systems other than the 8 studied here for which the wide and close systems both have visual orbits. Early formation scenarios for multiple systems predict coplanarity (Phi < 15 degrees), but only 6 of these 42 systems are possibly coplanar. This tendency against coplanarity may suggest that the capture method of multiple system formation is more important than previously believed.
|
28 |
QoS Evaluation of BandwidthSchedulers in IPTV Networks OfferedSRD Fluid Video TrafficMondal, Chandra Shekhar January 2009 (has links)
Internet protocol TV (IPTV) is predicted to be the key technology winner in the future. Efforts to accelerate the deployment of IPTV centralized model which is combined of VHO, encoders, controller, access network and Home network. Regardless of whether the network is delivering live TV, VOD, or Time-shift TV, all content and network traffic resulting from subscriber requests must traverse the entire network from the super-headend all the way to each subscriber's Set-Top Box (STB).IPTV services require very stringent QoS guarantees When IPTV traffic shares the network resources with other traffic like data and voice, how to ensure their QoS and efficiently utilize the network resources is a key and challenging issue. For QoS measured in the network-centric terms of delay jitter, packet losses and bounds on delay. The main focus of this thesis is on the optimized bandwidth allocation and smooth datatransmission. The proposed traffic model for smooth delivering video service IPTV network with its QoS performance evaluation. According to Maglaris et al [5] First, analyze the coding bit rate of a single video source. Various statistical quantities are derived from bit rate data collected with a conditional replenishment inter frame coding scheme. Two correlated Markov process models (one in discrete time and one incontinuous time) are shown to fit the experimental data and are used to model the input rates of several independent sources into a statistical multiplexer. Preventive control mechanism which is to be include CAC, traffic policing used for traffic control.QoS has been evaluated of common bandwidth scheduler( FIFO) by use fluid models with Markovian queuing method and analysis the result by using simulator andanalytically, Which is measured the performance of the packet loss, overflow and mean waiting time among the network users.
|
29 |
QoS evaluation of Bandwidth Schedulers in IPTV Networks Offered SRD Fluid Video TrafficHabib, Mohammad Ahasan January 2009 (has links)
Internet protocol TV (IPTV) is predicted to be the key technology winner in the future. Efforts to accelerate the deployment of IPTV centralized model which is combined of VHO, encoders, controller, access network and Home network. Regardless of whether the network is delivering live TV, VOD, or Time-shift TV, all content and network traffic resulting from subscriber requests must traverse the entire network from the super-headend all the way to each subscriber's Set-Top Box (STB). IPTV services require very stringent QoS guarantees When IPTV traffic shares the network resources with other traffic like data and voice, how to ensure their QoS and efficiently utilize the network resources is a key and challenging issue. For QoS measured in the network-centric terms of delay jitter, packet losses and bounds on delay. The main focus of this thesis is on the optimized bandwidth allocation and smooth data transmission. The proposed traffic model for smooth delivering video service IPTV network with its QoS performance evaluation. According to Maglaris et al [5] first, analyze the coding bit rate of a single video source. Various statistical quantities are derived from bit rate data collected with a conditional replenishment inter frame coding scheme. Two correlated Markov process models (one in discrete time and one in continuous time) are shown to fit the experimental data and are used to model the input rates of several independent sources into a statistical multiplexer. Preventive control mechanism which is to be including CAC, traffic policing used for traffic control. QoS has been evaluated of common bandwidth scheduler( FIFO) by use fluid models with Markovian queuing method and analysis the result by using simulator and analytically, Which is measured the performance of the packet loss, overflow and mean waiting time among the network users.
|
30 |
Detection and analysis of connection chains in network forensicsAlmulhem, Ahmad 06 April 2010 (has links)
Network forensics is a young member of the bigger family of digital forensics discipline. In particular, it refers to digital forensics in networked environments. It represents an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on the collection, and analysis of network packets and events caused by an intruder for investigative purposes. A key challenge in network forensics is to ensure that the network itself is forensically-ready, by providing an infrastructure to collect and analyze data in real-time. In this thesis, we propose an agent-based network forensics system, which is intended to add real-time network forensics capabilities into a controlled network. We also evaluate the proposed system by deploying and studying it in a real-life environment. Another challenge in network forensics arises because of attackers ability to move around in the network, which results in creating a chain of connections; commonly known as connection chains. In this thesis, we provide an extensive review and taxonomy of connection chains. Then, we propose a novel framework to detect them. The framework adopts a black-box approach by passively monitoring inbound and outbound packets at a host, and analyzing the observed packets using association rule mining. We assess the proposed framework using public network traces, and demonstrate both its efficiency and detection capabilities. We, finally, propose a profiling-based framework to investigate connection chains that are distributed over several ip addresses. The framework utilizes a simple yet extensible hacker model that integrates information about a hacker's linguistic, operating system and time of activity. We establish the effectiveness of the proposed approach through several simulations and an evaluation with real attack data.
|
Page generated in 0.052 seconds