144 research outputs found

    Time-Hopping Multicarrier Code-Division Multiple-Access

    No full text
    A time-hopping multicarrier code-division multiple-access (TH/MC-CDMA) scheme is proposed and investigated. In the proposed TH/MC-CDMA each information symbol is transmitted by a number of time-domain pulses with each time-domain pulse modulating a subcarrier. The transmitted information at the receiver is extracted from one of the, say MM, possible time-slot positions, i.e., assuming that MM-ary pulse position modulation is employed. Specifically, in this contribution we concentrate on the scenarios such as system design, power spectral density (PSD) and single-user based signal detection. The error performance of the TH/MC-CDMA system is investigated, when each subcarrier signal experiences flat Nakagami-mm fading in addition to additive white Gaussian noise (AWGN). According to our analysis and results, it can be shown that the TH/MC-CDMA signal is capable of providing a near ideal PSD, which is flat over the system bandwidth available, while decreases rapidly beyond that bandwidth. Explicitly, signals having this type of PSD is beneficial to both broadband and ultra-wide bandwidth (UWB) communications. Furthermore, our results show that, when optimum user address codes are employed, the single-user detector considered is near-far resistant, provided that the number of users supported by the system is lower than the number of subcarriers used for conveying an information symbol

    A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries

    Get PDF
    Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an efficient technique to increase data accessibility and availability, by sharing and coordination among mobile nodes. Due to nodes’ mobility, limited battery power and insufficient bandwidth, researchers addressed these challenges by developing many different collaborative caching schemes. The objective of this paper is to review various collaborative caching techniques in MANETs. Collaborative caching techniques are classified by methods used in serving queries, such as: hop-by-hop discovering, broadcasting messages, flooding, and query service differentiation. This review reveals that techniques utilizing hop-by-hop methods have better performance compared to others, especially techniques using additional strategies

    Cooperative Wireless Systems

    Get PDF
    This Ph.D. dissertation reports on the work performed at the Wireless Communication Laboratory - University of Bologna and National Research Council - as well as, for six months, at the Fraunhofer Institute for Integrated Circuit (IIS) in Nürnberg. The work of this thesis is in the area of wireless communications, especially with regards to cooperative communications aspects in narrow-band and ultra-wideband systems, cooperative links characterization, network geometry, power allocation techniques,and synchronization between nodes. The underpinning of this work is devoted to developing a general framework for design and analysis of wireless cooperative communication systems, which depends on propagation environment, transmission technique, diversity method, power allocation for various scenarios and relay positions. The optimal power allocation for minimizing the bit error probability at the destination is derived. In addition, a syncronization algorithm for master-slave communications is proposed with the aim of jointly compensate the clock drift and offset of wireless nodes composing the network

    Time Domain Measurements of Signals Backscattered by Wideband RFID Tags

    Get PDF
    Passive wideband RFID is increasing interest for its capability of providing high-accuracy tag localization in addition to identification and tag-reader communication. The measurement of backscattering capabilities of wideband antennas is usually conducted in the frequency domain by using network analyzers, which does not allow for the extraction of the antenna mode component of the backscattered signal when the antenna load is time variant. To overcome this issue, in this paper we present a novel setup for time domain measurements of signals backscattered by wideband RFID tags. Experimental evaluations are presented for comparing different wideband antennas and show the effects of the setup characteristics and of the processing schemes on the achievable measurement results

    Characterization of Ultra Wideband Multiple Access Performance Using Time Hopped-Biorthogonal Pulse Position Modulation

    Get PDF
    The FCC\u27s release of its UWB First Report and Order in April 2002 spawned renewed interest in impulse signaling research. This work combines Time Hopped (TH) multiple access coding with 4-ary UWB Biorthogonal Pulse Position Modulation (TH-BPPM). Multiple access performance is evaluated in a multipath environment for both synchronous and asynchronous networks. Fast time hopping is implemented by replicating and hopping each TH-BPPM symbol NH times. Bit error expressions are derived for biorthogonal TH-BPPM signaling and results compared with previous orthogonal TH-PPM work. Without fast time hopping (NH = 1), the biorthogonal TH-BPPM technique provided gains equivalent to Gray-coded QPSK; improved BER at a given Eb/No and an effective doubling of the data rate. A synchronized network containing up to NT = 15 transmitters yields an average BER improvement (relative to an asynchronous network) of approximately -6.30 dB with orthogonal TH-PPM and approximately 5.9 dB with biorthogonal TH-BPPM. Simulation results indicate that doubling the number of multipath replications (NMP) reduces BER by approximately 3.6 dB. Network performance degrades as NT and NMP increase and synchronized network advantages apparent in the NMP = 0 case diminish with multipath interference present. With fast time hopping (NH \u3e 1) improves BER performance whenever NMP \u3c NH while reducing effective data rate by 1/NH. Compared to the NH = 1 synchronized network, TH-BPPM modulation using NH = 10 provides approximately 5.9 dB improvement at NMP = 0 and approximately 3.6 dB improvement at NMP = 5. At NMP = 10, the BER for the hopped and NH = 1 cases are not statistically different; with NH = 10 hops, BER improvement varies from approximately 0.57 to 0.14 dB (minimal variation between synchronous and asynchronous network performance)

    Wireless Neurosensor for Full-Spectrum Electrophysiology Recordings during Free Behavior

    Get PDF
    SummaryBrain recordings in large animal models and humans typically rely on a tethered connection, which has restricted the spectrum of accessible experimental and clinical applications. To overcome this limitation, we have engineered a compact, lightweight, high data rate wireless neurosensor capable of recording the full spectrum of electrophysiological signals from the cortex of mobile subjects. The wireless communication system exploits a spatially distributed network of synchronized receivers that is scalable to hundreds of channels and vast environments. To demonstrate the versatility of our wireless neurosensor, we monitored cortical neuron populations in freely behaving nonhuman primates during natural locomotion and sleep-wake transitions in ecologically equivalent settings. The interface is electrically safe and compatible with the majority of existing neural probes, which may support previously inaccessible experimental and clinical research

    On Secure and Precise IR-UWB Ranging

    Get PDF
    To provide high ranging precision in multipath environments, a ranging protocol should find the first arriving path, rather than the strongest path. We demonstrate a new attack vector that disrupts such precise Time-of-Arrival (ToA) estimation, and allows an adversary to decrease the measured distance by a value in the order of the channel spread (10-20 meters). This attack vector can be used in previously reported physical-communication-layer (PHY) attacks against secure ranging (or distance bounding). Furthermore, it creates a new type of attack based on malicious interference: This attack is much easier to mount than the previously known external PHY attack (distance-decreasing relay) and it can work even if secret preamble codes are used. We evaluate the effectiveness of this attack for a PHY that is particularly well suited for precise ranging in multipath environments: Impulse Radio Ultra-Wideband (IR-UWB). We show, with PHY simulations and experiments, that the attack is effective against a variety of receivers and modulation schemes. Furthermore, we identify and evaluate three types of countermeasures that allow for precise and secure ranging
    corecore