SlideShare a Scribd company logo
1 of 4
Download to read offline
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
Design of Tele command SOC-IP by AES
Cryptographic Method Using VHDL
Ms.RASHMI P1
, Ms.RASHMITHA C M2
, Mr.SHIVUKUMAR3
, Ms.SWATHI M D4
UG
Scholars. B S Sahana Raj5
, Assistant Professor,
Dept. of Electronics & Communication Engineering,
PESCE, Mandya. An Autonomous Institution affiliated to Visvesvaraya Technological
University, Belgaum)
Literature Review Article
ABSTRACT
The goal of this project is to implement the (AES)
encryption system using Verilog. To do this, several separate
sections of the algorithm will be coded to work together
towards the end goal of performing the correct encryption
routines. A telecommand is a command sent to control a
remote system or systems i.e not directly connected (e.g. via
wires) to the place from which the telecommand is sent. The
telecommand word is derived from tele = remote (Greek), and
command = to entrust/order (Latin). Systems that need remote
measurement and reporting of information of interest to the
system designer or operator, require the counterpart of
telecommand, telemetry. For a telecommand (TC) to be
effective, it must be compiled into a pre-arranged format
(which may follow a standard structure), modulated onto a
carrier wave which is then transmitted with adequate power to
the remote system. The remote system will then demodulates
the digital signal from the carrier, decode the telecommand,
and execute it.
I. REVIEW PAPERS
1. “System-on-Chip (SoC) for Telecommand
System Design International Journal of
Advanced Research in Computer and
Communication Engineering Vol. 2, Issue 3,
March 2014”
The emerging developments in semiconductor
technology have made possible to design entire
system onto a single chip, commonly known as
System-On-Chip (SoC). The incresase in Space
System„s capabilities kindled by the On-board data
processing capabilities can be overcome by
optimizing the SoCs to provide cost effective, high
performance, and reliable data. This is achieved by
embedding pre-designed functions into a single
SoC, which utilizes specialized reusable core (IP
cores) architecture into complex chip.This paper is
concerned with the design of telecommand system
for transfer of signals from ground station to space
station by the integration of SRAM(Static Random
Access Memory), ARM (Advanced RISC Machine)
Processor, EDAC unit (Error Detection And
Correction)and CCSDS (Consultative Committee
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
for Space Data System) decoder system.In this
paper we designed the Telecommand SoC.
2. “HIGH SPEED IP BASED
ARCHITECTURE FOR TELE COMMAND
SYSTEM Proceedings of Third IRF
International Conference, 07th March-2015,
Mysore, India, ISBN: 978-93-82702-74-0”
An IP (intellectual property) core is a block of logic
or data that is used for making a field programmable
gate array ( FPGA ) or application-specific integrated
circuit ( ASIC ) for a product. Design reuse IP cores
are part of the growing electronic design automation
(EDA ) industry which allows the repeated use of
previously designed components. Using many IP
cores a system itself can be designed, System on
Chip (SoC) offers this requirement. In the current
telecommand communication method, excess number
of physical devices is present, which cause a major
communication delay. Combining many of the
predesigned internal blocks in to a single chip can
solve this problem.
3. “Designing Space Applications Using
Synthesisable Cores- European Space Agency
European Space Research and Technology
Centre (ESTEC) Postbus 299, NL-2200 AG
Noordwijk, The Netherlands”
Very high integration levels of microelectronics will
be required to fulfil the ever-increasing demands for
high processing performance, low mass and power.
With an increasing number of available gates on
silicon, the functionality being implemented will
move away from the use of traditional components to
more advanced and complex systems within a single
device. To develop such complex circuits the design
methodology will have to change from being gate-
level oriented to the integration of complex building
blocks. The designers will have to rely on pre-
existing building blocks with already verified
functionality, with documentation and production test
vectors being available, and which have ultimately
been validated on silicon.
4. “DESIGN OF SPACE DATA LINK
SUBLAYEROF TELECOMMAND
DECODER USING CCSDS PROTOCOL-
ISSN (Print): 2278-5140, Volume-2, Issue – 2,
2013”
This paper deals with the design of Space Data Link
layer of a Telecommand Decoder using CCSDS
protocol. Telecommand Decoder is a part of
Telecommand subsystem which receives uplinked
data/ commands and distributes it to all subsystems.
All commands received will be validated and
thereafter depending on the address, commands will
be delivered to their respective destinations. Space
Data Link sublayer was designed to meet the
requirements of space missions for efficient transfer
of space application data or commands to control the
Spacecraft. Space Data Link modules are designed
using CCSDS protocol and VHDL code for the same.
Simulation is performed using modelsim.
II. OBJECTIVE
The main objective of the project is to design and develop
architecture for Design of Tele command soc IP by using
AES cryptographic method using VHDL. To overcome the
shortfall of the present design where the major drawback has
been the increased delay and decrease in frequency for
transmission of data packets. The new architecture is designed
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
to analyze the scope for a performance enhancement with
respect to the present system.
III.MOTIVATION
Consumer demands for high performance and rich
functionality have driven the semiconductor manufacturing
industry to the integration of multiple complex components
onto a single chip. As the complexity of the remotely located
physical devices increases, the requirement for a greater
telecommanding capability and efficiency arises, but present
IP Core Based Architecture of telecommand System-on-a-
Chip (SoC) has increased delay in transmission of data
packets. The increase in demand for better throughput and
increase features has lead to the motivation of this project.
IV.SOLUTION
In this proposed design, plan to achieve by
embedding pre-designed functions into a single SoC, which
utilizes specialized reusable core (IP cores) architecture into
complex chip. The conventional telecommand system is
designed with Telecommand Processor and they are integrated
onto a chip .In this project, which reduces the utilization of
slices and hence time delay is reduced.
Since IP cores are pre-designed and pre-verified, the
designer can concentrate on the complete system without
having to worry about the correctness or performance of the
individual components.
REFERENCES
[1] "TC SPACE DATA LINK PROTOCOL” Recommended
standard, Blue book issue 1, CCSDS 231.0-B1, SEP 2003.
[2] "TC SPACE DATA LINK PROTOCOL” Recommended
standard, Blue book issue 2, CCSDS 231.0-B2, Sep 2010.
[3] “Detailed Design Review Document of TTCB/B System of
INSAT-4B” ISRO, Aug 2005.
[4] “Baseline Design Review Document of TTCB/B System
of INSAT-4B” ISRO, Mar 2011.
[5] Lin, Shu, and Daniel J. Costello, Jr., “Error Control
Coding: Fundamentals and Applications”, Englewood Cliffs,
NJ, PrenticeHall, 1983.
[6] Dr. PS. Sathyanarayana “Concepts of Information Theory
and Coding”
[7] “Proximity-1 SPACE LINK PROTOCOLCODING AND
SYNCHRONIZATION SUBLAYER” Recommended
standard, Blue book, CCSDS 211.2-B1, April 2003.
[8] Telecommand Part 1.Channel Service. Recommendation
for Space Data System Standards, CCSDS 201.0-B-3.Blue
Book. Issue 3. Washington, D.C.: CCSDS, June2000.
[9] Packet Telemetry. Recommendation for Space Data
System Standards, CCSDS 102.0B-5.Blue Book. Issue 5.
Washington, D.C.: CCSDS, November 2000.
[10] Telecommand Part 2.1.Command Operation Procedures.
Recommendation for Space Data System Standards, CCSDS
202.1-B-2.Blue Book. Issue 2. Washington, D.C.: CCSDS,
June 2001.
[11] Rajesvari., Manoj G, Angelin Ponrani.M )“IP Core Based
Architecture of Telecommand System-on-Chip (SoC) for
Spacecraft applications “International Conference on Signal
Processing, Image Processing and Pattern Recognition”- 2013
[12] SoC: A Real Platform for IP Reuse, IP Infringement, and
IP Protection Debasri Saha and Susmita Sur-Kolay Advanced
Computing and Microelectronics Unit, Indian Statistical
Institute, Kolkata 700108, India, Received 12 October 2010;
Revised 4 January 2011; Accepted 24 January 2011
[13] Reduced Precision Redundancy for Satellite
Telecommand Receiver Module on FPGA Salman Sadruddin
and Arshad Aziz,National University of Science and
Technology (NUST), H-12, Islamabad, Pakistan, Hindawi
Publishing Corporation ,Chinese Journal of
Engineering,Volume 2013, Article ID 453872, 8 pages.
[14] The International Journal Of Engineering And Science
(IJES) || Volume || 3 || Issue || 6 || Pages || 17-24 || 2014 || ISSN
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
(e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The
IJES Page 17,FPGA Implementation of System-on-chip
(SOC) Architecture for Spacecraft Application ,Kiran Kumar
B.G ,Dr. Kaushik Bhattacharyya
[15] International journal of electronics and communication
engineering & technology(IJECET) ,Volume 5, Issue 8,
August (2014), pp. 139-149, designing of telecommand
system using system on chip(soc) for spacecraft control
applications by Anupama sindgi, u.b.Mahadevaswamy
[16] Wireless Telecommand and Telemetry Systems for
Satellite Communication Using ZigBee Network”
Ravichandran, P.N. Kulkarni S. Sharma, S. Vasudevamurthy,
H.S. Vanitha, M. Lakshminarsimhan, P. Digital Syst. Group,
ISRO Satellite Center, and Bangalore, India this paper appears
in: Advances in Recent Technologies in Communication and
Computing, 2009. ARTCom '09. International Conference.
[17] System-on-Chip: Reuse and Integration Pre-designed and
pre-verified hardware and software blocks can be combined
on chips for many different applicationsVthey promise large
productivity gains. By Resve Saleh, Fellow IEEE,
SteveWilton, Senior Member IEEE, Shahriar Mirabbasi,
Member IEEE

More Related Content

What's hot

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...AJIT M KARANJKAR
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...DETER-Project
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...IJECEIAES
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsIJAAS Team
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...Alexander Decker
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...kitechsolutions
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 

What's hot (19)

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
J031101064069
J031101064069J031101064069
J031101064069
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
Fw3510381039
Fw3510381039Fw3510381039
Fw3510381039
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...11.providing security to wireless packet networks by using optimized security...
11.providing security to wireless packet networks by using optimized security...
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 

Similar to Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL

20607-39024-1-PB.pdf
20607-39024-1-PB.pdf20607-39024-1-PB.pdf
20607-39024-1-PB.pdfIjictTeam
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSaciijournal
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdffermanrw
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptxachakracu
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...AIRCC Publishing Corporation
 
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...ijcsit
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Thesis Scientist Private Limited
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnGr Patel
 
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoCDesign and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoCIRJET Journal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 

Similar to Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL (20)

20607-39024-1-PB.pdf
20607-39024-1-PB.pdf20607-39024-1-PB.pdf
20607-39024-1-PB.pdf
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdf
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptx
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh...
 
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...
APPLYING GENETIC ALGORITHM TO SOLVE PARTITIONING AND MAPPING PROBLEM FOR MESH...
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsn
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoCDesign and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoC
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL

  • 1. IDL - International Digital Library Of Technology & Research Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL Ms.RASHMI P1 , Ms.RASHMITHA C M2 , Mr.SHIVUKUMAR3 , Ms.SWATHI M D4 UG Scholars. B S Sahana Raj5 , Assistant Professor, Dept. of Electronics & Communication Engineering, PESCE, Mandya. An Autonomous Institution affiliated to Visvesvaraya Technological University, Belgaum) Literature Review Article ABSTRACT The goal of this project is to implement the (AES) encryption system using Verilog. To do this, several separate sections of the algorithm will be coded to work together towards the end goal of performing the correct encryption routines. A telecommand is a command sent to control a remote system or systems i.e not directly connected (e.g. via wires) to the place from which the telecommand is sent. The telecommand word is derived from tele = remote (Greek), and command = to entrust/order (Latin). Systems that need remote measurement and reporting of information of interest to the system designer or operator, require the counterpart of telecommand, telemetry. For a telecommand (TC) to be effective, it must be compiled into a pre-arranged format (which may follow a standard structure), modulated onto a carrier wave which is then transmitted with adequate power to the remote system. The remote system will then demodulates the digital signal from the carrier, decode the telecommand, and execute it. I. REVIEW PAPERS 1. “System-on-Chip (SoC) for Telecommand System Design International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 3, March 2014” The emerging developments in semiconductor technology have made possible to design entire system onto a single chip, commonly known as System-On-Chip (SoC). The incresase in Space System„s capabilities kindled by the On-board data processing capabilities can be overcome by optimizing the SoCs to provide cost effective, high performance, and reliable data. This is achieved by embedding pre-designed functions into a single SoC, which utilizes specialized reusable core (IP cores) architecture into complex chip.This paper is concerned with the design of telecommand system for transfer of signals from ground station to space station by the integration of SRAM(Static Random Access Memory), ARM (Advanced RISC Machine) Processor, EDAC unit (Error Detection And Correction)and CCSDS (Consultative Committee
  • 2. IDL - International Digital Library Of Technology & Research Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 for Space Data System) decoder system.In this paper we designed the Telecommand SoC. 2. “HIGH SPEED IP BASED ARCHITECTURE FOR TELE COMMAND SYSTEM Proceedings of Third IRF International Conference, 07th March-2015, Mysore, India, ISBN: 978-93-82702-74-0” An IP (intellectual property) core is a block of logic or data that is used for making a field programmable gate array ( FPGA ) or application-specific integrated circuit ( ASIC ) for a product. Design reuse IP cores are part of the growing electronic design automation (EDA ) industry which allows the repeated use of previously designed components. Using many IP cores a system itself can be designed, System on Chip (SoC) offers this requirement. In the current telecommand communication method, excess number of physical devices is present, which cause a major communication delay. Combining many of the predesigned internal blocks in to a single chip can solve this problem. 3. “Designing Space Applications Using Synthesisable Cores- European Space Agency European Space Research and Technology Centre (ESTEC) Postbus 299, NL-2200 AG Noordwijk, The Netherlands” Very high integration levels of microelectronics will be required to fulfil the ever-increasing demands for high processing performance, low mass and power. With an increasing number of available gates on silicon, the functionality being implemented will move away from the use of traditional components to more advanced and complex systems within a single device. To develop such complex circuits the design methodology will have to change from being gate- level oriented to the integration of complex building blocks. The designers will have to rely on pre- existing building blocks with already verified functionality, with documentation and production test vectors being available, and which have ultimately been validated on silicon. 4. “DESIGN OF SPACE DATA LINK SUBLAYEROF TELECOMMAND DECODER USING CCSDS PROTOCOL- ISSN (Print): 2278-5140, Volume-2, Issue – 2, 2013” This paper deals with the design of Space Data Link layer of a Telecommand Decoder using CCSDS protocol. Telecommand Decoder is a part of Telecommand subsystem which receives uplinked data/ commands and distributes it to all subsystems. All commands received will be validated and thereafter depending on the address, commands will be delivered to their respective destinations. Space Data Link sublayer was designed to meet the requirements of space missions for efficient transfer of space application data or commands to control the Spacecraft. Space Data Link modules are designed using CCSDS protocol and VHDL code for the same. Simulation is performed using modelsim. II. OBJECTIVE The main objective of the project is to design and develop architecture for Design of Tele command soc IP by using AES cryptographic method using VHDL. To overcome the shortfall of the present design where the major drawback has been the increased delay and decrease in frequency for transmission of data packets. The new architecture is designed
  • 3. IDL - International Digital Library Of Technology & Research Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 to analyze the scope for a performance enhancement with respect to the present system. III.MOTIVATION Consumer demands for high performance and rich functionality have driven the semiconductor manufacturing industry to the integration of multiple complex components onto a single chip. As the complexity of the remotely located physical devices increases, the requirement for a greater telecommanding capability and efficiency arises, but present IP Core Based Architecture of telecommand System-on-a- Chip (SoC) has increased delay in transmission of data packets. The increase in demand for better throughput and increase features has lead to the motivation of this project. IV.SOLUTION In this proposed design, plan to achieve by embedding pre-designed functions into a single SoC, which utilizes specialized reusable core (IP cores) architecture into complex chip. The conventional telecommand system is designed with Telecommand Processor and they are integrated onto a chip .In this project, which reduces the utilization of slices and hence time delay is reduced. Since IP cores are pre-designed and pre-verified, the designer can concentrate on the complete system without having to worry about the correctness or performance of the individual components. REFERENCES [1] "TC SPACE DATA LINK PROTOCOL” Recommended standard, Blue book issue 1, CCSDS 231.0-B1, SEP 2003. [2] "TC SPACE DATA LINK PROTOCOL” Recommended standard, Blue book issue 2, CCSDS 231.0-B2, Sep 2010. [3] “Detailed Design Review Document of TTCB/B System of INSAT-4B” ISRO, Aug 2005. [4] “Baseline Design Review Document of TTCB/B System of INSAT-4B” ISRO, Mar 2011. [5] Lin, Shu, and Daniel J. Costello, Jr., “Error Control Coding: Fundamentals and Applications”, Englewood Cliffs, NJ, PrenticeHall, 1983. [6] Dr. PS. Sathyanarayana “Concepts of Information Theory and Coding” [7] “Proximity-1 SPACE LINK PROTOCOLCODING AND SYNCHRONIZATION SUBLAYER” Recommended standard, Blue book, CCSDS 211.2-B1, April 2003. [8] Telecommand Part 1.Channel Service. Recommendation for Space Data System Standards, CCSDS 201.0-B-3.Blue Book. Issue 3. Washington, D.C.: CCSDS, June2000. [9] Packet Telemetry. Recommendation for Space Data System Standards, CCSDS 102.0B-5.Blue Book. Issue 5. Washington, D.C.: CCSDS, November 2000. [10] Telecommand Part 2.1.Command Operation Procedures. Recommendation for Space Data System Standards, CCSDS 202.1-B-2.Blue Book. Issue 2. Washington, D.C.: CCSDS, June 2001. [11] Rajesvari., Manoj G, Angelin Ponrani.M )“IP Core Based Architecture of Telecommand System-on-Chip (SoC) for Spacecraft applications “International Conference on Signal Processing, Image Processing and Pattern Recognition”- 2013 [12] SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection Debasri Saha and Susmita Sur-Kolay Advanced Computing and Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India, Received 12 October 2010; Revised 4 January 2011; Accepted 24 January 2011 [13] Reduced Precision Redundancy for Satellite Telecommand Receiver Module on FPGA Salman Sadruddin and Arshad Aziz,National University of Science and Technology (NUST), H-12, Islamabad, Pakistan, Hindawi Publishing Corporation ,Chinese Journal of Engineering,Volume 2013, Article ID 453872, 8 pages. [14] The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 6 || Pages || 17-24 || 2014 || ISSN
  • 4. IDL - International Digital Library Of Technology & Research Volume 1, Issue 3, Mar 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 17,FPGA Implementation of System-on-chip (SOC) Architecture for Spacecraft Application ,Kiran Kumar B.G ,Dr. Kaushik Bhattacharyya [15] International journal of electronics and communication engineering & technology(IJECET) ,Volume 5, Issue 8, August (2014), pp. 139-149, designing of telecommand system using system on chip(soc) for spacecraft control applications by Anupama sindgi, u.b.Mahadevaswamy [16] Wireless Telecommand and Telemetry Systems for Satellite Communication Using ZigBee Network” Ravichandran, P.N. Kulkarni S. Sharma, S. Vasudevamurthy, H.S. Vanitha, M. Lakshminarsimhan, P. Digital Syst. Group, ISRO Satellite Center, and Bangalore, India this paper appears in: Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference. [17] System-on-Chip: Reuse and Integration Pre-designed and pre-verified hardware and software blocks can be combined on chips for many different applicationsVthey promise large productivity gains. By Resve Saleh, Fellow IEEE, SteveWilton, Senior Member IEEE, Shahriar Mirabbasi, Member IEEE