191 research outputs found

    Energy-efficient wireless communication

    Get PDF
    In this chapter we present an energy-efficient highly adaptive network interface architecture and a novel data link layer protocol for wireless networks that provides Quality of Service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations in bandwidth scheduling and error control are necessary to achieve energy efficiency and an acceptable quality of service. In our approach we apply adaptability through all layers of the protocol stack, and provide feedback to the applications. In this way the applications can adapt the data streams, and the network protocols can adapt the communication parameters

    A Review of UWB MAC Protocols

    Get PDF
    In this paper, we review several ultra-wideband (UWB) medium access control (MAC) protocols that have been proposed to date. This review then considers the possibility of developing an optimal MAC layer for high data rate UWB transmission systems that transmit very little power especially in application to mobile devices. MAC in UWB wireless networks is necessary to coordinate channel access among competing devices. Unique UWB characteristics offer great challenges and opportunities in effective UWB MAC design. We first present the background of UWB and the concept of MAC protocols for UWB. Secondly, we summarize four UWB MAC protocols that have been proposed by other researchers and finally, a conclusion with a view to the planned future work. The main contribution of this paper is that it presents a summarised version of several MAC protocols applicable to UWB systems. This will hopefully initiate further research and developments in UWB MAC protocol design

    3G Wideband CDMA : packet-based optimisation for high data-rate downlink transmission

    No full text
    A third generation (3G) of mobile communication systems, based on Wideband CDMA, are intended to offer high-speed packet-based services. Network operators wish to maximise the throughput in the downlink of3G systems, which requires efficient allocation ofresources. This thesis considers the problem ofmaximising throughput in an interference dominated channel. Cooperative broadcasting is a theoretical technique to mitigate this problem. Its implementation in practical systems requires efficient resource allocati.on to maximise the thr(oughput whilst meeting system and user-imposed constramts. A resource allocation approach is presented for implementing cooperative broadcasting. Users are paired and a teclmique for allocating resources between the pair is developed. Then, a method for pairing the users is considered. Simulation results are presented, which show a throughput improvement over existing resource allocation approaches. The problem ofcontrolling the distribution ofrandomly arriving data to meet the resource allocation specifications is examined. A single-threshold buffer is proposed, which requires fewer calculations than an existing double-threshold buffer. Simulation results are presented which show a throughput improvement may be realised, greater than that which would achievable using other rate control schemes. Cooperative broadcasting may lead to transmissions to some users being allocated low power. When full channel infonnation is available at the transmitter, a water filling solution may be used to maximise capacity. However, when combined with buffer management, erasure may result. This erasure may be overcome using an erasure protection code. Such a code is examined. When combined with Turbo coding, ajoint detector may be used for providing error and erasure protection. Analysis ofthis detector shows a lower limit on the error rate, dependent on the probability of erasure. Simulation results show that using this approach the error rate is significantly improved. This code can then be used to increase capacity, whilst achieving low error rates.Imperial Users onl

    Adaptive robust video broadcast via satellite

    Get PDF
    © 2016 Springer Science+Business Media New YorkWith increasing demand for multimedia content over channels with limited bandwidth and heavy packet losses, higher coding efficiency and stronger error resiliency is required more than ever before. Both the coding efficiency and error resiliency are two opposing processes that require appropriate balancing. On the source encoding side the video encoder H.264/AVC can provide higher compression with strong error resiliency, while on the channel error correction coding side the raptor code has proven its effectiveness, with only modest overhead required for the recovery of lost data. This paper compares the efficiency and overhead of both the raptor codes and the error resiliency techniques of video standards so that both can be balanced for better compression and quality. The result is also improved by confining the robust stream to the period of poor channel conditions by adaptively switching between the video streams using switching frames introduced in H.264/AVC. In this case the video stream is initially transmitted without error resiliency assuming the channel to be completely error free, and then the robustness is increased based on the channel conditions and/or user demand. The results showed that although switching can increase the peak signal to noise ratio in the presence of losses but at the same time its excessive repetition can be irritating to the viewers. Therefore to evaluate the perceptual quality of the video streams and to find the optimum number of switching during a session, these streams were scored by different viewers for quality of enhancement. The results of the proposed scheme show an increase of 3 to 4 dB in peak signal to noise ratio with acceptable quality of enhancement

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    • …
    corecore