32 research outputs found

    Analysis of hybrid-ARQ based relaying protocols under modulation constraints

    Get PDF
    In a seminal paper published in 2001, Caire and Tuninetti derived an information theoretic bound on the throughput of hybrid-ARQ in the presence of block fading. However, the results placed no constraints on the modulation used, and therefore the input to the channel was Gaussian. The purpose of this thesis is to investigate the impact of modulation constraints on the throughput of hybrid-ARQ in a block fading environment. First, we consider the impact of modulation constraints on information outage probability for a block fading channel with a fixed length codeword. Then, we consider the effect of modulation constraints upon the throughput of hybrid-ARQ, where the rate of the codeword varies depending on the instantaneous channel conditions. These theoretical bounds are compared against the simulated performance of HSDPA, a newly standardized hybrid-ARQ protocol that uses QPSK and 16-QAM bit interleaved turbo-coded modulation. The results indicate how much of the difference between HSDPA and the previous unconstrained modulation bound is due to the use of the turbo-code and how much is due to the modulation constraints. (Abstract shortened by UMI.)

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodesïżœ resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    Performance Study of Shared Versus Nonshared Bandwidth on a Packet-Switched Network

    Get PDF
    In wide area computer data communications, many networks have evolved by satisfying increased user demands in the most expedient manner. In some cases, new users’ demands are satisfied by installing a new link, rather than sharing the links that are already in place. This research investigates the differences in performance between using a dedicated link for each source destination pair (nonshared bandwidth) and using a single link to be used by all source destination pairs (shared bandwidth). Simulation models are developed for a wide area network using shared bandwidth, and a wide area network using nonshared bandwidth. The quality of service offered by each network is based on its responsiveness and productivity. Responsiveness will be measured in terms of average end to end delay of packet transmission, and productivity will be measured in terms of percent bandwidth utilization. The networks are modeled under a common set of operating assumptions and system environment. This allows for accurate comparison of packet delay and bandwidth utilization. Two variable input parameters are used in the simulation: intensity of input traffic load, and amount of link capacity. Provided that the intensity of the input traffic load remains below the network saturation level, it is shown that the shared system clearly outperforms the nonshared system. This result occurs for both a uniform and a nonuniform traffic load destination distribution

    Adaptive scheduling in cellular access, wireless mesh and IP networks

    Get PDF
    Networking scenarios in the future will be complex and will include fixed networks and hybrid Fourth Generation (4G) networks, consisting of both infrastructure-based and infrastructureless, wireless parts. In such scenarios, adaptive provisioning and management of network resources becomes of critical importance. Adaptive mechanisms are desirable since they enable a self-configurable network that is able to adjust itself to varying traffic and channel conditions. The operation of adaptive mechanisms is heavily based on measurements. The aim of this thesis is to investigate how measurement based, adaptive packet scheduling algorithms can be utilized in different networking environments. The first part of this thesis is a proposal for a new delay-based scheduling algorithm, known as Delay-Bounded Hybrid Proportional Delay (DBHPD), for delay adaptive provisioning in DiffServ-based fixed IP networks. This DBHPD algorithm is thoroughly evaluated by ns2-simulations and measurements in a FreeBSD prototype router network. It is shown that DBHPD results in considerably more controllable differentiation than basic static bandwidth sharing algorithms. The prototype router measurements also prove that a DBHPD algorithm can be easily implemented in practice, causing less processing overheads than a well known CBQ algorithm. The second part of this thesis discusses specific scheduling requirements set by hybrid 4G networking scenarios. Firstly, methods for joint scheduling and transmit beamforming in 3.9G or 4G networks are described and quantitatively analyzed using statistical methods. The analysis reveals that the combined gain of channel-adaptive scheduling and transmit beamforming is substantial and that an On-off strategy can achieve the performance of an ideal Max SNR strategy if the feedback threshold is optimized. Finally, a novel cross-layer energy-adaptive scheduling and queue management framework EAED (Energy Aware Early Detection), for preserving delay bounds and minimizing energy consumption in WLAN mesh networks, is proposed and evaluated with simulations. The simulations show that our scheme can save considerable amounts of transmission energy without violating application level QoS requirements when traffic load and distances are reasonable

    Push-to-Talk över Bluetooth

    Get PDF
    Push-to-Talk over Cellular (PoC) Àr en teknologi som möjliggör en radiotelefonlik service över GPRS vilken vÀckt ökande popularitet. I skrivande stund pÄgÄr specifiering av en öppen PoC-standard inom Open Mobile Alliance (OMA). OMA planerar att baser PoC pÄ en IP/UDP/RTP protokollstack samt en server-clientarkitektur. Systemet utnyttjar Àven SIP-signaleringsegenskaperna hos IP Multimedia Subsystem (IMS). PoC-nÀtelement handhar bl.a. gruppförvaltning och taltursfördelning. Forskningsproblemet för denna avhandling Àr: "Hur kan en PoC-liknande service erbjudas gratis Ät mobiltelefonsanvÀndare med hjÀlp av Bluetooth-teknologi?" Den primÀra mÄlsÀttningen för detta arbete Àr dÀrmed att skissa upp ett förslag för hur man kunde utveckla en Push-to-Talk (PTT)-funktion som utnyttjar ett Bluetooth scatternet-nÀt samt PAN-profilen för att överföra data. En mÄttlig rÀckvidd kan uppnÄs med hjÀlp av Bluetooth apparater av effektklass 1 vars rÀckvidd kan vara t.o.m. 100 m. En sekundÀr mÄlsÀttning Àr att beskriva PoC samt de protokoll PoC utnyttjar (t.ex. SIP och SDP). Denna beskrivning utgör bÄde en utgÄngspunkt för att uppnÄ den primÀra mÄlsÀttningen och erbjuder Àven en introduktion till OMA PoC som lÀmpar sig för bÄde studeranden och yrkesmÀn. Det uppskissade förslaget för Push-to-Talk över Bluetooth (PoB) innefattar metoder för skapande av grupper och nÀt, dataöverföring samt taltursfördelning. Metoden för nÀtskapande (som kan vara anvÀndbar Àven för andra ÀndamÄl) baserar sig pÄ att skapa ett scatternet emellan apparater som tillhör en pÄ förhand specifierad grupp av apparater samt pÄ att undvika slingor. Detta möjliggör enkel kommunikation genom att skicka data till alla apparater inom nÀtet, förutsatt att de apparater som sammanbinder piconet-nÀten till ett scatternet fungerar som repeterare. Ytterligare uppskissas en metod för att kombinera PoB och PoC. Avsikten med detta Àr att möjliggöra PTT-kommunikation med bÄde lokalt och avlÀgset belÀgna gruppmedlemmar med hjÀlp av Bluetooth respektive GPRS.Push-to-Talk over Cellular (PoC) is an emerging technology enabling a walkie-talkie-like service over GPRS. At the time of writing, an open standard for PoC is being specified by the Open Mobile Alliance (OMA). As specified by the OMA standard drafts, PoC is based on an IP/UDP/RTP protocol stack and a client-server based architecture. The systems exploits the SIP signalling capabilities of the the IP Multimedia Subsystem (IMS). Group management, floor control etc are administered by the network elements of PoC. The research problem of this thesis is: "How can mobile phone users be provided with a free-of-charge PTT-feature with PoC-like user experience by means of Bluetooth technology?" The primary objective of the study is thus to propose an outline for developing a Push-to-Talk (PTT) feature that utilizes a Bluetooth scatternet and the PAN profile for data communications. A reasonable range can be obtained with Bluetooth class 1 devices, which provide a range of up to 100 m. A subsidiary objective is to provide a description of OMA PoC and the protocols it relies upon. The description serves both as a basis for pursuing the primary objective and as a tutorial, which is suitable for students or professionals desiring to acquaint themselves with OMA PoC. The proposed outline for Push-to-Talk over Bluetooth (PoB) comprises e.g. methods for group formation, network formation, communication, and floor control. The network formation method, which can be utilized in other applications as well, is based on creating a scatternet among a predefined set of devices and on avoiding loops. This approach enables usage of a simple broadcasting based communication method, in which the devices bridging the piconets into a scatternet act as repeaters. A method for combining PoB and PoC is also outlined. It is intended for enabling PTT-communication with both local and distant group members over Bluetooth and GPRS respectively

    A NEUROMORPHIC APPROACH TO TACTILE PERCEPTION

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Variable Rate Transmission Over Noisy Channels

    Get PDF
    Hybrid automatic repeat request transmission (hybrid ARQ) schemes aim to provide system reliability for transmissions over noisy channels while still maintaining a reasonably high throughput efficiency by combining retransmissions of automatic repeat requests with forward error correction (FEC) coding methods. In type-II hybrid ARQ schemes, the additional parity information required by channel codes to achieve forward error correction is provided only when errors have been detected. Hence, the available bits are partitioned into segments, some of which are sent to the receiver immediately, others are held back and only transmitted upon the detection of errors. This scheme raises two questions. Firstly, how should the available bits be ordered for optimal partitioning into consecutive segments? Secondly, how large should the individual segments be? This thesis aims to provide an answer to both of these questions for the transmission of convolutional and Turbo Codes over additive white Gaussian noise (AWGN), inter-symbol interference (ISI) and Rayleigh channels. Firstly, the ordering of bits is investigated by simulating the transmission of packets split into segments with a size of 1 bit and finding the critical number of bits, i.e. the number of bits where the output of the decoder is error-free. This approach provides a maximum, practical performance limit over a range of signal-to-noise levels. With these practical performance limits, the attention is turned to the size of the individual segments, since packets of 1 bit cause an intolerable overhead and delay. An adaptive, hybrid ARQ system is investigated, in which the transmitter uses the number of bits sent to the receiver and the receiver decoding results to adjust the size of the first, initial, packet and subsequent segments to the conditions of a stationary channel

    Coding Theory For Security And Reliability In Wireless Networks

    Full text link
    Wireless networks hold many applications and are an integral part of our lives. Security and reliability are extremely important in wireless networks. These networks must be reliable so that data can be conveyed from transmitters to receivers. Data sent across wireless networks must be kept conïŹdential from unintended users and it is necessary that false packets generated by illegitimate users are rejected by the receiver. Another important task is for the network to determine which network components can be trusted and to what degree. The work presented in this dissertation addresses the security and reliability issues in wireless networks through the use of coding theory. The network is composed of numerous nodes and we consider a classical point to point communication problem. We explore the network reliability issue and develop two algorithms (exponential and polynomial time) which determine minimum redundancy and optimal symbol allocation to assure that the probability of successful decoding is greater than or equal to a speciïŹed threshold. The performance of the algorithms is compared with each other, and MDS, LT, and Raptor codes are compared using the exponential algorithm. We also consider the security problem of keeping a message conïŹdential from an illegitimate eavesdropper in a multiple path network. Carefully crafted Raptor codes are shown to asymptotically achieve perfect secrecy and zero-error probability, and a bit allocation method across the paths is developed. Lastly, we look into the problem of determining the integrity of nodes in the network. In particular, we show how the malicious nodes can be localized in the network through the use of ReedMuller codes. The Reed-Muller codes represent the paths that are necessary in the network. For the case where a path is not realizable according to the network connectivity matrix, we conceived an algorithm to treat the non-realizable paths as erasures and decode to localize malicious nodes. The performance of the algorithm is compared to several techniques

    Blockchain security and applications

    Get PDF
    Cryptocurrencies, such as Bitcoin and Ethereum, have proven to be highly successful. In a cryptocurrency system, transactions and ownership data are stored digitally in a ledger that uses blockchain technology. This technology has the potential to revolutionize the future of financial transactions and decentralized applications. Blockchains have a layered architecture that enables their unique method of authenticating transactions. In this research, we examine three layers, each with its own distinct functionality: the network layer, consensus layer, and application layer. The network layer is responsible for exchanging data via a peer-to-peer (P2P) network. In this work, we present a practical yet secure network design. We also study the security and performance of the network and how it affects the overall security and performance of blockchain systems. The consensus layer is in charge of generating and ordering the blocks, as well as guaranteeing that everyone agrees. We study the existing Proof-of-stake (PoS) protocols, which follow a single-extension design framework. We present an impossibility result showing that those single-extension protocols cannot achieve standard security properties (e.g., common prefix) and the best possible unpredictability if the honest players control less than 73\% stake. To overcome this, we propose a new multi-extension design framework. The application layer consists of programs (e.g., smart contracts) that users can use to build decentralized applications. We construct a protocol on the application layer to enhance the security of federated learning
    corecore