Practical Covert Channel Implementation through a Timed Mix-Firewall
|
|
|
- Alexis Watts
- 10 years ago
- Views:
Transcription
1 Practical Covert Channel Implementation through a Timed Mix-Firewall Richard E. Newman 1 and Ira S. Moskowitz 2 1 Dept. of CISE, PO Box University of Florida, Gainesville, FL [email protected] & 2 Center for High Assurance Computer Systems, Code 5540 Naval Research Laboratory, Washington, DC [email protected] Abstract. The ability to communicate covertly through Mix-firewalls has been discussed in previous work [?]. This paper discusses the issues of implementing this theoretical construction in a prototype system. The practical issues involved in implementation are analyzed, and the actual design is given here. Suggested parameters for concatenated codes for the experimental channel are given. We compare our numerically computed information theoretic results for the data rate of covert channels through timed Mix-firewalls to the data rate obtained by our actual construction of these covert channels. 1 Simple Covert Channel Experimental Results Although we implemented the testbed in an actual LAN, the firing (tick) rate of the Mix-firewall had to be low (at most once per second or so) for technical reasons. This limited the rate at which we could send data through the covert channel, and consequently, the speed with which we could collect data on variations of the system (e.g., error correcting code strategies, copy code parameter, etc.). In order to collect more data faster, a single-host simulator was built that simulated the Alice, the Clueless, and Eve all on one system. Alice and the Clueless were simulated as one process, and Eve was simulated as another process. Since the challenge of Eve synchronizing with the Mixfirewall firing had been solved, the Alice process simply sent the Eve process the number of packets Eve would observe each tick. Eve still had to synchronize with the copy code, decode the logical symbols from the copy code, and decode the results using the error-correcting code. This section presents experimental data collected from numerous test runs on our testbed. The data portion of the message has 100 bits in all the test runs. Tests were run with the number N of Clueless varying between 1 and 15 and the probability that a Clueless sent a message in a given tick varying from p=0.1 to 0.9, in increments of 0.1. A variety of copy code redundancies (R) and convolutional code rates were used to determine the bit error rate (BER) in the decoded frames, and also computed the 1 0 and 0 1 bit error rates and the message error rate. 1
2 The product of the copy code redundancy R and the convolutional code redundancy C is the overall coding redundancy (the inverse of coding rate). Tests were run for copy code redundancies of R=1 to 15 and convolutional code redundancies from C=2 to 10. The highest overall coding rate (lowest redundancy) that resulted in zero message errors was recorded over all combinations tested, for each combination of number of Clueless (N=1 to 15) and probability that the Clueless sent a message during a tick (p=0.1 to 0.9). One thousand runs was found to produce stable results. For these best cases, the copy code rate and the convolutional code rate were determined. Surprisingly, the results showed that more redundancy should be put into the copy code than the convolutional code, at least when p is near 0.5. Graphs of the results for hard and soft input decoding are shown in Figure??. These graphs show that the overall coding rate, and hence the covert channel rate, decreases as the number of Clueless increases, that it also decreases as the probability that a Clueless sends a packet during a tick approaches p=0.5. Comparison of the results for hard input (from the copy code output) and soft input show that the soft input convolutional code has significantly better performance, as expected. The rates obtained experimentally are about 0.17 (bits per tick) for N = 2 and p = 0.1, 0.6 for N = 2 and p = 0.5 (soft decoding). For hard decoding, the rates were about 0.11 for N=2 and p=0.1, and 0.04 for N = 2 and p = 0.5, showing the benefit of soft decoding of the copy code. These may not be true error-free rates they are just the best rates we obtained in which there were no errors observed. Numerically computed rates based on information theory [?] give the best rate for N = 1 and p = 0.5 as 0.5 (bit per tick), and about 0.3 for N = 2 and p = 0.5. With finite length and sub-optimal codes, this is not unexpected. Generally, the rates obtained experimentally are 1/3 to 1/10 the information theoretic predicted theoretical maximum rates (capacity). The characteristic U (that is, C(p) decreases as p approaches 0.5, where C(p) is the capacity for input probability p) shape of the graphs giving the coding rate as a function of p are comparable to the numerical capacity computed in [?], although much lower. A graph for this is shown for N=1 Clueless in Figure??. In both [?,?] numerical evidence and plots attempted to show that this U shape is standard. However, in [?,?] the authors attempted to put this on firm theoretical ground. Unfortunately, there is a gap in in the proof of [?,?, Thm. 4 & Cor. 1] where the authors assumed that the mutual information, for a fixed input distribution, is convex up. Due to the non-linear nature of the channel matrix for multiple Clueless, that assumption is non-trivial and needs to be proved. However, we still (optimistically) accept, without proof, the U shaped behavior as stated in [?,?, Cor. 1]. 1.1 Estimating the Number of Clueless For the best results, Alice must know the number of Clueless. She may be able to detect this directly by eavesdropping (she is inside the enclave), or she may have some a priori knowledge. When Alice underestimates the number of Clueless, then there is a chance that the code selected is not powerful enough to correct all the errors encountered due to the additional noise. Figure?? shows the effect of N on the average BER (taken over 1,000 runs) for copy code redundancy R=3 and various convolutional code rates. If, for example, Alice had chosen R=5 and c=1/5, she 2
3 should usually be able to transmit without errors to Eve if there are 3 or fewer Clueless present. If there are actually 8 Clueless, then Eve will experience a bit error rate around 12%, after decoding, rendering communication ineffective. Figure?? holds the convolutional code rate constant at 1/5, and shows the effect of N on the average BER (taken over 1,000 runs) for copy code redundancy R ranging from 4 to 10. If Alice had chosen R=4 and c=1/5, she should usually be able to transmit without errors to Eve if there are 5 or fewer Clueless present. If there are actually 12 Clueless, then Eve will experience a bit error rate around 15%, after decoding, seriously disrupting communication. Eve, on the other hand, only needs to know the average number of packets that the Clueless send per tick (Np). This she obtains when averaging the number of packets over a large number of ticks. The copy code used by Alice (which should depend upon Np) is determined by Eve s observations when she synchronizes with Alice. As long as the copy code parameter R uniquely determines the convolutional code parameter, then Eve can adjust her decoding behavior according to Alice s decisions and the behavior of the Clueless. We have derived recommendations for copy code and convolutional code redundancies as a function of N so that R uniquely determines C (see Table 1.1). Table 1. Recommended combinations for Copy Code and Convolutional Code Number of Soft Decoding Hard Decoding Clueless Copy Code Conv. Code Product Copy Code Conv. C ode Product N Param. R Param. C RC Param. R Param. C RC In the absence of a priori information on the number of Clueless, it is possible for Eve to estimate the effective number of Clueless from observations (i.e., from the distribution of packets sent per tick). Alice, on the other hand, must either have this information already, or must also monitor 3
4 the medium to determine the number of Clueless present. Since the number of Clueless affects the amount of noise in the channel, it determines the information theoretic channel capacity and hence sets an upper bound on the code rate for forward error correction codes used. In these experiments, a combination of a copy code and a convolutional code were used to demonstrate successful exercise of the channel. Naturally, Eve must decode the detected signals in a manner consistent with the way in which Alice encoded them. As long as Alice is consistent in the copy code she uses (see below), and sends a sufficient preamble, it is possible for Eve to detect the copy code length, even if this is not known ahead of time. If Alice uses convolutional code parameters that depend on the copy code length, then Eve will also be able to determine these from observation. So in short, it is incumbent upon Alice to select channel coding that suffices to deliver the messages she sends to Eve error-free (with high probability). The danger of overestimating the number of Clueless is that the data rate of the channel will be considerably lower; the danger of underestimating the number of Clueless is that the messages may not be delivered error-free (see Figures?? and??). 1.2 Recommended Code Parameter Combinations Table 1.1 shows recommended combinations of copy code redundancy and convolutional code reduncancy depending on the number of Clueless present. Eve is able to discern the copy code rate by autorcorrelation of the received raw signal, and can synchronize by observing windowed deviations with windows of the copy code redundancy size. By pairing a unique convolutional code rate with each copy code rate, Eve can then know which convolutional code to use to decode the received symbols, depending on whether she and Alice have agreed to use hard coding or soft coding (this is a computational power issue). Table 1.1 was obtained by analyzing our output and searching for code combinations that gave little, or no, error. 2 Conclusions This work has provided proof-of-concept for the model covert channel first proposed in [?]. The channel exists, and can be exercised, though the practical error-free rate is much lower than the information theoretic rate derived earlier. While the restriction that each host send at most one packet per tick is certainly artificial, we suspect that this limitation is more of a burden to Alice and Eve than to the Clueless (that is, it is harder for Alice and Eve to exercise the covert channel successfully than it would be if Alice could send more messages per tick). If at most k messages can be sent by each host per tick, then this should have a similar effect as having a copy code of length k each tick (assuming that the activity of the Clueless remains the same as before, but with finer granularity). This is worth further investigation, as realistic Mix-firewalls are almost certain to have periods much longer than the time it takes to send a single packet. From the standpoint of Alice and Eve, it would be of interest to determine what the best approaches are for exploiting the channel efficiently are there ways better than using a copy 4
5 code with another error-correcting code above it to send messages reliably? Our initial results here indicate that copy codes with convolution codes are effective at higher rates than convolutional codes alone, so this begs further examination. Also, the Mix firing condition may be threshold-based instead of timed, or may be a combination of these. How best to exploit the channel and what the achievable rates are under these types of Mix-firewalls is of practical interest, as these types of Mixes are common. Finally, the Mix-firewall may inject dummy packets into its transmissions. Certainly, if the Mix-firewall always pads traffic out to a fixed, constant level, there can be no covert channel at the channel matrix will have only one output regardless of the input. However, this is expensive, and Mix deployers are loathe to do much padding, if any at all. The trade-offs between traffic padding and covert channel disruption are of great interest, as knowledge of these will allow rational choices in Mix design to affordably achieve desired protection. Acknowledgements We thank Mahendra Kumar, Piyush Harsh, and Prashant Jayaraman, who were involved in simulation and implementation of these systems. We also appreciate the help of Will Snook when he was at NRL. 5
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
T1 Networking Made Easy
T1 Networking Made Easy 1 THE T1 CARRIER 3 WHAT DOES A T1 LOOK LIKE? 3 T1 BANDWIDTH 3 T1 PHYSICAL CHARACTERISTICS 4 T1 FRAMING 5 LINE CODE 6 T1 NETWORKING 6 TELCOS 6 PSTN ACCESS WITH A T1 8 SUMMARY OF
Network Coding for Distributed Storage
Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
Lab 5 Getting started with analog-digital conversion
Lab 5 Getting started with analog-digital conversion Achievements in this experiment Practical knowledge of coding of an analog signal into a train of digital codewords in binary format using pulse code
Optimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
APRSstat An APRS Network Analysis Tool
APRSstat An APRS Network Analysis Tool Richard Parry, P.E., W9IF [email protected] http://people.qualcomm.com/rparry ABSTRACT APRSstat monitors network traffic by connecting to an APRS telnet server
How To Understand The Quality Of A Wireless Voice Communication
Effects of the Wireless Channel in VOIP (Voice Over Internet Protocol) Networks Atul Ranjan Srivastava 1, Vivek Kushwaha 2 Department of Electronics and Communication, University of Allahabad, Allahabad
Information Leakage in Encrypted Network Traffic
Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
GPON 984.3. Section 12-14 Reporter: 王 依 盈 94.10.26
GPON 984.3 Section 12-14 Reporter: 王 依 盈 94.10.26 Outline Security Forward Error Correction OMCI Transport Mechanism Security Basic Threat Model Encryption System Key exchange and switch-over Forward Error
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Environmental Effects On Phase Coherent Underwater Acoustic Communications: A Perspective From Several Experimental Measurements
Environmental Effects On Phase Coherent Underwater Acoustic Communications: A Perspective From Several Experimental Measurements T. C. Yang, Naval Research Lab., Washington DC 20375 Abstract. This paper
Credit Card Market Study Interim Report: Annex 4 Switching Analysis
MS14/6.2: Annex 4 Market Study Interim Report: Annex 4 November 2015 This annex describes data analysis we carried out to improve our understanding of switching and shopping around behaviour in the UK
Chapter 6: The Information Function 129. CHAPTER 7 Test Calibration
Chapter 6: The Information Function 129 CHAPTER 7 Test Calibration 130 Chapter 7: Test Calibration CHAPTER 7 Test Calibration For didactic purposes, all of the preceding chapters have assumed that the
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
MOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya ([email protected]) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
Life Cycle Asset Allocation A Suitable Approach for Defined Contribution Pension Plans
Life Cycle Asset Allocation A Suitable Approach for Defined Contribution Pension Plans Challenges for defined contribution plans While Eastern Europe is a prominent example of the importance of defined
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
RECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,
Rec. ITU-R F.1113 1 RECOMMENDATION ITU-R F.1113 RADIO SYSTEMS EMPLOYING METEOR-BURST PROPAGATION (Question ITU-R 157/9) (1994) Rec. ITU-R F.1113 The ITU Radiocommunication Assembly, considering a) that
100BASE-TX Decoding Instructions
100BASE-TX Decoding Instructions Note: These instructions assume the following: You have downloaded the descrambler key binary sequence file. You have printed the 100BASE-TX simulated frame (PDF document)
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska
PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
Jitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
2013 IEEE Security and Privacy Workshops Steganography in OFDM Symbols of Fast IEEE 802.11n Networks Szymon Grabski, Krzysztof Szczypiorski Institute of Telecommunications Warsaw University of Technology
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
Deployment of express checkout lines at supermarkets
Deployment of express checkout lines at supermarkets Maarten Schimmel Research paper Business Analytics April, 213 Supervisor: René Bekker Faculty of Sciences VU University Amsterdam De Boelelaan 181 181
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
PCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
Decision Theory. 36.1 Rational prospecting
36 Decision Theory Decision theory is trivial, apart from computational details (just like playing chess!). You have a choice of various actions, a. The world may be in one of many states x; which one
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
Step Response of RC Circuits
Step Response of RC Circuits 1. OBJECTIVES...2 2. REFERENCE...2 3. CIRCUITS...2 4. COMPONENTS AND SPECIFICATIONS...3 QUANTITY...3 DESCRIPTION...3 COMMENTS...3 5. DISCUSSION...3 5.1 SOURCE RESISTANCE...3
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Clock Recovery in Serial-Data Systems Ransom Stephens, Ph.D.
Clock Recovery in Serial-Data Systems Ransom Stephens, Ph.D. Abstract: The definition of a bit period, or unit interval, is much more complicated than it looks. If it were just the reciprocal of the data
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)
FPGA IMPLEMENTATION OF 4D-PARITY BASED DATA CODING TECHNIQUE Vijay Tawar 1, Rajani Gupta 2 1 Student, KNPCST, Hoshangabad Road, Misrod, Bhopal, Pin no.462047 2 Head of Department (EC), KNPCST, Hoshangabad
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
HOW TO TEST 10 GIGABIT ETHERNET PERFORMANCE
HOW TO TEST 10 GIGABIT ETHERNET PERFORMANCE March 2012 Rev. B 03/12 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683
Broadcasting your attack: Security testing DAB radio in cars
Broadcasting your attack: Security testing DAB radio in cars Andy Davis, Research Director Image: computerworld.com.au Agenda Who am I and why am I interested in security testing DAB? Overview of DAB How
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
AE64 TELECOMMUNICATION SWITCHING SYSTEMS
Q2. a. Draw the schematic of a 1000 line strowger switching system and explain how subscribers get connected. Ans: (Page: 61 of Text book 1 and 56 of Text book 2) b. Explain the various design parameters
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
Blind Deconvolution of Barcodes via Dictionary Analysis and Wiener Filter of Barcode Subsections
Blind Deconvolution of Barcodes via Dictionary Analysis and Wiener Filter of Barcode Subsections Maximilian Hung, Bohyun B. Kim, Xiling Zhang August 17, 2013 Abstract While current systems already provide
TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS
TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of
Corvil Insight. Low-Latency Market Data
Corvil Insight Low-Latency Market Data of 12 Contents How much bandwidth do you really need? 4 How to ask the bandwidth question for low-latency? 4 What about loss? 5 Exchange feed example 5 Working with
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Information, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
WHITE PAPER Personal Telepresence: The Next Generation of Video Communication. www.vidyo.com 1.866.99.VIDYO
WHITE PAPER Personal Telepresence: The Next Generation of Video Communication www.vidyo.com 1.866.99.VIDYO 2009 Vidyo, Inc. All rights reserved. Vidyo is a registered trademark and VidyoConferencing, VidyoDesktop,
How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)
Physical Layer Part 2 Data Encoding Techniques Networks: Data Encoding 1 Analog and Digital Transmissions Figure 2-23.The use of both analog and digital transmissions for a computer to computer call. Conversion
A New Digital Communications Course Enhanced by PC-Based Design Projects*
Int. J. Engng Ed. Vol. 16, No. 6, pp. 553±559, 2000 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 2000 TEMPUS Publications. A New Digital Communications Course Enhanced by PC-Based Design Projects*
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
1. (Ungraded) A noiseless 2-kHz channel is sampled every 5 ms. What is the maximum data rate?
Homework 2 Solution Guidelines CSC 401, Fall, 2011 1. (Ungraded) A noiseless 2-kHz channel is sampled every 5 ms. What is the maximum data rate? 1. In this problem, the channel being sampled gives us the
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
(Refer Slide Time: 2:10)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
Assessment of Camera Phone Distortion and Implications for Watermarking
Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION
RFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
Introduction, Rate and Latency
Introduction, Rate and Latency Communication Networks Why communicate? Necessary to support some application. Example Applications Audio communication Radio, Telephone Text communication Email, SMS (text
Copyright. Network and Protocol Simulation. What is simulation? What is simulation? What is simulation? What is simulation?
Copyright Network and Protocol Simulation Michela Meo Maurizio M. Munafò [email protected] [email protected] Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per
An Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],
Capacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage
Lecture 3: Signaling and Clock Recovery CSE 123: Computer Networks Stefan Savage Last time Protocols and layering Application Presentation Session Transport Network Datalink Physical Application Transport
ELEC3028 Digital Transmission Overview & Information Theory. Example 1
Example. A source emits symbols i, i 6, in the BCD format with probabilities P( i ) as given in Table, at a rate R s = 9.6 kbaud (baud=symbol/second). State (i) the information rate and (ii) the data rate
DOE/OE Transmission Reliability Program. Data Validation & Conditioning
DOE/OE Transmission Reliability Program Data Validation & Conditioning Jianzhong Mo [email protected] Kenneth Martin [email protected] June 3-4, 2014 Washington, DC 2 Presentation Introduction
Adaptive Equalization of binary encoded signals Using LMS Algorithm
SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) volume issue7 Sep Adaptive Equalization of binary encoded signals Using LMS Algorithm Dr.K.Nagi Reddy Professor of ECE,NBKR
What Types of ECC Should Be Used on Flash Memory?
What Types of ECC Should Be Used on Flash Memory? Application 1. Abstract NOR Flash normally does not need ECC (Error-Correcting Code). On the other hand, NAND requires ECC to ensure data integrity. NAND
Polarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
