7,208 research outputs found

    Integrated source and channel encoded digital communication system design study

    Get PDF
    The particular Ku-band carrier, PN despreading, and symbol synchronization strategies, which were selected for implementation in the Ku-band transponder aboard the orbiter, were assessed and evaluated from a systems performance viewpoint, verifying that system specifications were met. A study was performed of the design and implementation of tracking techniques which are suitable for incorporation into the Orbiter Ku-band communication system. Emphasis was placed on maximizing tracking accuracy and communication system flexibility while minimizing cost, weight, and system complexity of Orbiter and ground systems hardware. The payload communication study assessed the design and performance of the forward link and return link bent-pipe relay modes for attached and detached payloads. As part of this study, a design for a forward link bent-pipe was proposed which employs a residual carrier but which is tracked by the existing Costas loop

    Robust and scalable matching pursuits video transmission using the Bluetooth air interface standard

    Get PDF

    Synchronised laser chaos communication: statistical investigation of an experimental system

    Get PDF
    The paper is concerned with analyzing data from an experimental antipodal laser-based chaos shift-keying communication system. Binary messages are embedded in a chaotically behaving laser wave which is transmitted through a fiber-optic cable and are decoded at the receiver using a second laser synchronized with the emitter laser. Instrumentation in the experimental system makes it particularly interesting to be able to empirically analyze both optical noise and synchronization error as well as bit error rate. Both the noise and error are found to significantly depart in distribution from independent Gaussian. The conclusion from bit error rate results is that the antipodal laser chaos shift-keying system can offer a feasible approach to optical communication. The non-Gaussian optical noise and synchronous error results are a challenge to current theoretical modelling

    Nimbus Telemetry

    Get PDF
    Nimbus satellite - pulse-code-modulated telemetry subsyte

    Multi-Source Cooperative Communication with Opportunistic Interference Cancelling Relays

    Full text link
    In this paper we present a multi-user cooperative protocol for wireless networks. Two sources transmit simultaneously their information blocks and relays employ opportunistically successive interference cancellation (SIC) in an effort to decode them. An adaptive decode/amplify-and-forward scheme is applied at the relays to the decoded blocks or their sufficient statistic if decoding fails. The main feature of the protocol is that SIC is exploited in a network since more opportunities arise for each block to be decoded as the number of used relays NRU is increased. This feature leads to benefits in terms of diversity and multiplexing gains that are proven with the help of an analytical outage model and a diversity-multiplexing tradeoff (DMT) analysis. The performance improvements are achieved without any network synchronization and coordination. In the final part of this work the closed-form outage probability model is used by a novel approach for offline pre-selection of the NRU relays, that have the best SIC performance, from a larger number of NR nodes. The analytical results are corroborated with extensive simulations, while the protocol is compared with orthogonal and multi-user protocols reported in the literature.Comment: in IEEE Transactions on Communications, 201

    Precise Packet Loss Pattern Generation by Intentional Interference

    Get PDF
    Abstract—Intermediate-quality links often cause vulnerable connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation
    corecore