154 research outputs found

    Personal area technologies for internetworked services

    Get PDF

    High Performance LNAs and Mixers for Direct Conversion Receivers in BiCMOS and CMOS Technologies

    Get PDF
    The trend in cellular chipset design today is to incorporate support for a larger number of frequency bands for each new chipset generation. If the chipset also supports receiver diversity two low noise amplifiers (LNAs) are required for each frequency band. This is however associated with an increase of off-chip components, i.e. matching components for the LNA inputs, as well as complex routing of the RF input signals. If balanced LNAs are implemented the routing complexity is further increased. The first presented work in this thesis is a novel multiband low noise single ended LNA and mixer architecture. The mixer has a novel feedback loop suppressing both second order distortion as well as DC-offset. The performance, verified by Monte Carlo simulations, is sufficient for a WCDMA application. The second presented work is a single ended multiband LNA with programmable integrated matching. The LNA is connected to an on-chip tunable balun generating differential RF signals for a differential mixer. The combination of the narrow band input matching and narrow band balun of the presented LNA is beneficial for suppressing third harmonic downconversion of a WLAN interferer. The single ended architecture has great advantages regarding PCB routing of the RF input signals but is on the other hand more sensitive to common mode interferers, e.g. ground, supply and substrate noise. An analysis of direct conversion receiver requirements is presented together with an overview of different LNA and mixer architectures in both BiCMOS and CMOS technology

    Cloud RAN for Mobile Networks - a Technology Overview

    Get PDF
    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and possible cost savings on base- band resources. Furthermore, it improves network capacity by performing load balancing and cooperative processing of signals originating from several base stations. This article surveys the state-of-the-art literature on C-RAN. It can serve as a starting point for anyone willing to understand C-RAN architecture and advance the research on C-RA

    Vision Sensors and Edge Detection

    Get PDF
    Vision Sensors and Edge Detection book reflects a selection of recent developments within the area of vision sensors and edge detection. There are two sections in this book. The first section presents vision sensors with applications to panoramic vision sensors, wireless vision sensors, and automated vision sensor inspection, and the second one shows image processing techniques, such as, image measurements, image transformations, filtering, and parallel computing

    Feasibility of Using Passive Monitoring Techniques in Mesh Networks for the Support of Routing

    Get PDF
    In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising solution to provide low cost access networks that extend Internet access and other networking services. Mesh routers form the backbone connectivity through cooperative routing in an often unstable wireless medium. Therefore, the techniques used to monitor and manage the performance of the wireless network are expected to play a significant role in providing the necessary performance metrics to help optimize the link performance in WMNs. This thesis initially presents an assessment of the correlation between passive monitoring and active probing techniques used for link performance measurement in single radio WMNs. The study reveals that by combining multiple performance metrics obtained by using passive monitoring, a high correlation with active probing can be achieved. The thesis then addresses the problem of the system performance degradation associated with simultaneous activation of multiple radios within a mesh node in a multi-radio environment. The experiments results suggest that the finite computing resource seems to be the limiting factor in the performance of a multi-radio mesh network. Having studied this characteristic of multi-radio networks, a similar approach as used in single radio mesh network analysis was taken to investigate the feasibility of passive monitoring in a multi-radio environment. The accuracy of the passive monitoring technique was compared with that of the active probing technique and the conclusion reached is that passive monitoring is a viable alternative to active probing technique in multi-radio mesh networks

    Real Time Control for Intelligent 6G Networks

    Get PDF
    The benefits of telemetry for optical networking have been shown in the literature, and several telemetry architectures have been defined. In general, telemetry data is collected from observation points in the devices and sent to a central system running besides the Software Defined Networking (SDN) controller. In this project, we try to develop a telemetry architecture that supports intelligent data aggregation and nearby data collection. Several frameworks and technologies have been explored to ensure that they fit well into the architecture's composition. A description of these different technologies is presented in this work, along with a comparison between their main features and downsides. Some intelligent techniques, aka. Algorithms have been stated and tested within architecture, showing their benefits by reducing the amount of data processed. In the design of this architecture, the main issues related to distributed systems have been faced, and some initial solutions have been proposed. In particular, several security solutions have been explored to deal with threats but also with scalability and performance issues, trying to find a balance between performance and security. Finally, two use cases are presented, showing a real implementation of the architecture that has been presented at conferences and validated within the project's development
    corecore