4,238 research outputs found
Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges
Underwater wireless optical communications is an emerging solution to the
expanding demand for broadband links in oceans and seas. In this paper, a
cellular underwater wireless optical code division multiple-access (UW-OCDMA)
network is proposed to provide broadband links for commercial and military
applications. The optical orthogonal codes (OOC) are employed as signature
codes of underwater mobile users. Fundamental key aspects of the network such
as its backhaul architecture, its potential applications and its design
challenges are presented. In particular, the proposed network is used as
infrastructure of centralized, decentralized and relay-assisted underwater
sensor networks for high-speed real-time monitoring. Furthermore, a promising
underwater localization and positioning scheme based on this cellular network
is presented. Finally, probable design challenges such as cell edge coverage,
blockage avoidance, power control and increasing the network capacity are
addressed.Comment: 11 pages, 10 figure
Synchronization in wireless communications
The last decade has witnessed an immense increase of wireless communications services in order to keep pace with the ever increasing demand for higher data rates combined with higher mobility. To satisfy this demand for higher data rates, the throughput over the existing transmission media had to be increased. Several techniques were proposed to boost up the data rate: multicarrier systems to combat selective fading, ultra wide band (UWB) communications systems to share the spectrum with other users, MIMO transmissions to increase the capacity of wireless links, iteratively decodable codes (e.g., turbo codes and LDPC codes) to improve the quality of the link, cognitive radios, and so forth
Energy-Efficient Power Control in Multipath CDMA Channels via Large System Analysis
This paper is focused on the design and analysis of power control procedures
for the uplink of multipath code-division-multiple-access (CDMA) channels based
on the large system analysis (LSA). Using the tools of LSA, a new decentralized
power control algorithm aimed at energy efficiency maximization and requiring
very little prior information on the interference background is proposed;
moreover, it is also shown that LSA can be used to predict with good accuracy
the performance and operational conditions of a large network operating at the
equilibrium over a multipath channel, i.e. the power,
signal-to-interference-plus-noise ratio (SINR) and utility profiles across
users, wherein the utility is defined as the number of bits reliably delivered
to the receiver for each energy-unit used for transmission. Additionally, an
LSA-based performance comparison among linear receivers is carried out in terms
of achieved energy efficiency at the equilibrium. Finally, the problem of the
choice of the utility-maximizing training length is also considered. Numerical
results show a very satisfactory agreement of the theoretical analysis with
simulation results obtained with reference to systems with finite (and not so
large) numbers of users.Comment: Proceedings of the IEEE International Symposium on Personal, Indoor
and Mobile Radio Communications, Cannes, France, September 15-18, 200
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
- …