63,280 research outputs found
High frequency band communication application in Malaysia
High frequency (HF) radio frequencies are between 3 and 30 MHz.[1] Also known as the decameter band or decameter wave as the wavelengths range from one to ten decameters. Shortwave (2.310 - 25.820 MHz)[1] overlaps and is slightly lower than HF. Since the ionosphere often reflects HF radio waves quite well (a phenomenon known as skywave), this range is extensively used for medium and long range terrestrial radio communication. However, suitability of this portion of the spectrum for such communication varies greatly with a complex combination of factors[1]:
ā¢ Sunlight/darkness at site of transmission and reception
ā¢ Transmitter/receiver proximity to terminator
ā¢ Season
ā¢ Sunspot cycle
ā¢ Solar activity
ā¢ Polar aurora
ā¢ Maximum usable frequency
ā¢ Lowest usable high frequency
ā¢ Frequency of operation within the HF rang
Wireless local area network planning: an overview
When planning a wireless local area network, there are design issues that need to be considered. In this paper, the fundamentals of planning a wireless local area network are introduced and discussed to highlight the requirements involved. Network constraints, as their relevance to wireless network design is investigated. The paper concludes with an overview of wireless network planning solutions including commercial and free software, and an introduction to the authorās research
Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks
Soaring capacity and coverage demands dictate that future cellular networks
need to soon migrate towards ultra-dense networks. However, network
densification comes with a host of challenges that include compromised energy
efficiency, complex interference management, cumbersome mobility management,
burdensome signaling overheads and higher backhaul costs. Interestingly, most
of the problems, that beleaguer network densification, stem from legacy
networks' one common feature i.e., tight coupling between the control and data
planes regardless of their degree of heterogeneity and cell density.
Consequently, in wake of 5G, control and data planes separation architecture
(SARC) has recently been conceived as a promising paradigm that has potential
to address most of aforementioned challenges. In this article, we review
various proposals that have been presented in literature so far to enable SARC.
More specifically, we analyze how and to what degree various SARC proposals
address the four main challenges in network densification namely: energy
efficiency, system level capacity maximization, interference management and
mobility management. We then focus on two salient features of future cellular
networks that have not yet been adapted in legacy networks at wide scale and
thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and
device-to-device (D2D) communications. After providing necessary background on
CoMP and D2D, we analyze how SARC can particularly act as a major enabler for
CoMP and D2D in context of 5G. This article thus serves as both a tutorial as
well as an up to date survey on SARC, CoMP and D2D. Most importantly, the
article provides an extensive outlook of challenges and opportunities that lie
at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
- ā¦