65 research outputs found

    Propagation aspects of frequency hopping spread spectrum

    Get PDF

    An evaluation of the performance of IEEE 802.11a and 802.11g wireless local area networks in a corporate office environment

    Get PDF

    An OFDMA-Based Next-Generation Wireless Downlink System Design with Hybrid Multiple Access and Frequency Grouping Techniques

    Get PDF
    This paper discusses how to effectively design a nextgeneration wireless communication system that can possibly provide very high data-rate transmissions and versatile quality services. In order to accommodate the sophisticated user requirements and diversified user environments of the next-generation systems, it should be designed to take an efficient and flexible structure for multiple access and resource allocation. In addition, the design should be optimized for cost-effective usage of resources and for efficient operation in a multi-cell environment. As orthogonal frequency division multiple access (OFDMA) has turned out in recent researches to be one of the most promising multiple access techniques that can possibly meet all those requirements through efficient radio spectrum utilization, we take OFDMA as the basic framework in the next-generation wireless communications system design. So, in this paper, we focus on introducing an OFDMA-based downlink system design that employs the techniques of hybrid multiple access (HMA) and frequency group (FG) in conjunction with intra-frequency group averaging (IFGA). The HMA technique combines various multiple access schemes on the basis of OFDMA system, adopting the multiple access scheme that best fits to the given user condition in terms of mobility, service, and environment. The FG concept and IFGA technique help to reduce the feedback overhead of OFDMA system and the other-cell interference (OCI) problem by grouping the sub-carriers based on coherence bandwidths and by harmonizing the channel condition and OCI of the grouped sub-carriers.This work was supported in part by Samsung Advanced Institute of Technology

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    Full text link
    Within a recently developed low-power ad hoc network system, we present a transport protocol (JTP) whose goal is to reduce power consumption without trading off delivery requirements of applications. JTP has the following features: it is lightweight whereby end-nodes control in-network actions by encoding delivery requirements in packet headers; JTP enables applications to specify a range of reliability requirements, thus allocating the right energy budget to packets; JTP minimizes feedback control traffic from the destination by varying its frequency based on delivery requirements and stability of the network; JTP minimizes energy consumption by implementing in-network caching and increasing the chances that data retransmission requests from destinations "hit" these caches, thus avoiding costly source retransmissions; and JTP fairly allocates bandwidth among flows by backing off the sending rate of a source to account for in-network retransmissions on its behalf. Analysis and extensive simulations demonstrate the energy gains of JTP over one-size-fits-all transport protocols.Defense Advanced Research Projects Agency (AFRL FA8750-06-C-0199

    Multiple access and coding method for wireless ATM.

    Get PDF
    by Cheng Siu Lung.Thesis (M.Phil.)--Chinese University of Hong Kong, 1999.Includes bibliographical references (leaves 81-86).Abstracts in English and Chinese.ABBREVIATION --- p.3INTRODUCTION --- p.9Chapter 1.1 --- Wireless ATM for multimedia application --- p.9Chapter 1.2 --- Challenges in Wireless ATM --- p.11Chapter 1.3 --- Outline of thesis --- p.14PREDICTIVE QUEUING MULTIPLE ACCESS --- p.17Chapter 2.1 --- Introduction --- p.17Chapter 2.2 --- Protocol for Mobile to Base --- p.20Chapter 2.3 --- Scheduling Protocol at the Base Station --- p.23Chapter 2.4 --- Rate Compatible Punctured Turbo code --- p.27Chapter 2.5 --- FEC and ARQ methodologies --- p.30Chapter 2.6 --- Experimental Results --- p.32Chapter 2.7 --- Conclusion --- p.34FUNDAMENTALS OF THE WIRELESS COMMUNICATION MEDIUM --- p.36Chapter 3.1 --- Introduction --- p.36Chapter 3.2 --- Error control and channel capacity --- p.38Chapter 3.3 --- Capacity of fading channel --- p.39ITERATIVE CHANNEL ESTIMATION FOR TURBO CODE FOR FREQUENCY HOPPED MULTIPLE ACCESSING --- p.45Chapter 4.1 --- Introduction --- p.45Chapter 4.2. --- Turbo code structures --- p.47Chapter 4.3 --- System Model --- p.49Chapter 4.4 --- Iterative Channel Estimator --- p.53Chapter 4.5 --- Turbo decoding with iterative channel estimation --- p.56Chapter 4.6 --- Simulation Results --- p.58Chapter 4.7 --- Conclusion --- p.63DUMMY BITS INSERTED TURBO CODE --- p.64Chapter 5.1 --- Introduction --- p.64Chapter 5.2 --- Weight Distribution of turbo codes --- p.66Chapter 5.3 --- Encoding with dummy bit insertion --- p.69Chapter 5.3.1 --- Dummy bit insertion methodology --- p.69Chapter 5.3.2 --- Hybrid Periodic Random Interleaver --- p.70Chapter 5.3.3 --- Dummy bit removal before transmission --- p.71Chapter 5.4 --- Decoding with dummy signal enhancement --- p.73Chapter 5.5 --- Weight distribution of dummy bit inserted turbo coding --- p.76Chapter 5.6 --- Simulation results --- p.77Chapter 5.7 --- Summary --- p.79REFERENCES --- p.8

    THE COMMUNICATION PRINCIPLE IN THE BLUETOOTH WIRELLES PAN NETWORK

    Get PDF
    U ovom radu objašnjen je princip povezivanja i komunikacije u Bluetooth bežičnoj mreži. Bluetooth bežična tehnologija najpoznatiji je predstavnik mrežnih tehnologija u sve popularnijim osobnim mrežama (PAN)This paper gives an explanation for connection and communication principles of the Bluetooth wirelles network. Bluetooth wireless technology is the most popular network technology for personal area networking (PAN)

    CROSSLAYER OPTIMIZATION IN AN LTE NETWORK TO REDUCE THE EFFECT OF CO-CHANNEL INTERFERENCE

    Get PDF
    In this thesis, synergy between the physical layer and the Medium Access Control (MAC) layer of a Long Term Evolution (LTE) network is exploited to reduce the co-channel interference in both the forward and reverse channels. By doing such cross-layer optimization analysis, physical and MAC layer control decisions reach their full potential when they are designed in an integrated manner. The proposed solution focuses on the integration of the concepts of orthogonal frequency-division multiple access (OFDMA), sectorization, and Latin Square to improve the signal-to-interference ratio (SIR) with the most effective resource utilization. Sectorization in the physical layer alone is able to improve the SIR, however, by also implementing OFDMA and Latin Square techniques to reduce the effect of co-channel interference, better SIR can be achieved. There is some impact on resource utilization, however. The solution seeks to achieve an optimum point of tradeoff between improvement in the SIR and the acceptable amount of the unutilized resources.Civilian, Defence Science and Technology Agency, SingaporeApproved for public release; distribution is unlimited
    corecore