59 results on '"Physical layers"'
Search Results
2. Energy Reduction in Cell-Free Massive MIMO through Fine-Grained Resource Management
- Author
-
Demir, O.T., Bastianello, N., Fitzgerald, E., Callebaut, G., Mendez-Monsanto, L., Demir, O.T., Bastianello, N., Fitzgerald, E., Callebaut, G., and Mendez-Monsanto, L.
- Abstract
2024 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2024 -- 3 June 2024 through 6 June 2024 -- Antwerp -- 201153, The physical layer foundations of cell-free massive MIMO (CF-mMIMO) have been well-established. As a next step, researchers are investigating practical and energy-efficient network implementations. This paper focuses on multiple sets of access points (APs) where user equipments (UEs) are served in each set, termed a federation, without inter-federation interference. The combination of federations and CF-mMIMO shows promise for highly-loaded scenarios. Our aim is to minimize the total energy consumption while adhering to UE downlink data rate constraints. The energy expenditure of the full system is modelled using a detailed hardware model of the APs. We jointly design the AP-UE association variables, determine active APs, and assign APs and UEs to federations. To solve this highly combinatorial problem, we develop a novel alternating optimization algorithm. Simulation results for an indoor factory demonstrate the advantages of considering multiple federations, particularly when facing large data rate requirements. Furthermore, we show that adopting a more distributed CF-mMIMO architecture is necessary to meet the data rate requirements. Conversely, if feasible, using a less distributed system with more antennas at each AP is more advantageous from an energy savings perspective. © 2024 IEEE., Excellence Center at Linköping – Lund in Information Technology, ELLIIT; Scientific and Technological Research Council of Türkiye, (PID2020- 115323RB-C33/AEI/10.13039/501100011033, CHIST-ERA-22-WAI-04); AEI, (PCI2023-145990-2, 101013425)
- Published
- 2024
3. Telemetry Applications For A Space Launch
- Author
-
Şen, C.C., Can, M.G., Aktaş, M., Şen, C.C., Can, M.G., and Aktaş, M.
- Abstract
Delta Information Systems, Inc.;Dewesoft;International Foundation for Telemetering;L3Harris;Orolia;Scientific Research Corporation (SRC), 56th Annual International Telemetering Conference, ITC 2021 -- 25 October 2021 through 28 October 2021 -- 183726, In space launch applications, a telemetry ground station is designed to ensure launch vehicle traceability and so the flight safety. In this study, the characterization of telemetry ground stations to be used for a space launch operation is explained with applied studies, flight characteristics of vehicle, and international practices. Present study explains step-by-step development process of a telemetry ground station for a space launch mission. Study is limited on the physical layer. At least two independent position information sources are required to ensure flight safety, so the network between telemetry ground stations and localization systems is needed. As a result, the characteristics of the telemetry ground station are determined to be used for a low earth orbit space launch mission considering mission objective, requirements and constraints. © 2021 International Foundation for Telemetering. All rights reserved.
- Published
- 2022
4. Telemetry Applications For A Space Launch
- Author
-
Aktaş, M., Can, M.G., Şen, C.C., Aktaş, M., Can, M.G., and Şen, C.C.
- Abstract
Delta Information Systems, Inc.;Dewesoft;International Foundation for Telemetering;L3Harris;Orolia;Scientific Research Corporation (SRC), 56th Annual International Telemetering Conference, ITC 2021 -- 25 October 2021 through 28 October 2021 -- 183726, In space launch applications, a telemetry ground station is designed to ensure launch vehicle traceability and so the flight safety. In this study, the characterization of telemetry ground stations to be used for a space launch operation is explained with applied studies, flight characteristics of vehicle, and international practices. Present study explains step-by-step development process of a telemetry ground station for a space launch mission. Study is limited on the physical layer. At least two independent position information sources are required to ensure flight safety, so the network between telemetry ground stations and localization systems is needed. As a result, the characteristics of the telemetry ground station are determined to be used for a low earth orbit space launch mission considering mission objective, requirements and constraints. © 2021 International Foundation for Telemetering. All rights reserved.
- Published
- 2022
5. An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks.
- Author
-
Al-Jemeli, Marwan and Hussin, Fawnizu A.
- Abstract
IEEE 802.15.4 mobile wireless sensor networks (MWSNs) have been investigated in literature. One major finding is that these networks suffer from control packet overhead and delivery ratio degradation. This increases the network's energy consumption. This paper introduces a cross-layer operation model that can improve the energy consumption and system throughput of IEEE 802.15.4 MWSNs. The proposed model integrates four layers in the network operation: 1) application (node location); 2) network (routing); 3) medium access control (MAC); and 4) physical layers. The location of the mobile nodes is embedded in the routing operation after the route discovery process. The location information is then utilized by the MAC layer transmission power control to adjust the transmission range of the node. This is used to minimize the power utilized by the network interface to reduce the energy consumption of the node(s). The model employs a mechanism to minimize the neighbor discovery broadcasts to the active routes only. Reducing control packet broadcasts between the nodes reduces the network's consumed energy. It also decreases the occupation period of the wireless channel. The model operation leads the network to consume less energy while maintaining the network packet delivery ratio. To the best of our knowledge, the presented operational model with its simplicity has never been introduced. Through simulation-based evaluations, the proposed model outperforms the conventional operation of IEEE 802.15.4-based network and the energy efficient and QoS aware multipath routing protocol in terms of energy consumption by roughly 10%, twice less control packet overhead, on-par end-to-end delays and comparative packet delivery ratios. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
6. Code Flexibility of 2-D Time-Spreading Wavelength-Hopping In OCDMA Systems.
- Author
-
Bazan, T.M., Harle, D., and Andonovic, I.
- Abstract
The potential performance and successful experimental demonstrations of two-dimensional time-spreading wavelength-hopping (TW) optical code-division multiple access systems have motivated a large volume of research into the development of new TW codes. The choice of the code is crucial in network design since the code not only affects the overall system performance but also sets limits on the physical implementation of the encoding-decoding process. In this paper, ldquoflexibilityrdquo of TW codes is investigated, providing clarity on the tradeoff between key code factors, specifically the number of available wavelengths and time chips. Network performance is evaluated by taking into consideration multiple access interference and beat noise at both the physical and link layers. Furthermore, a general formula describing the impact of the extinction ratio (ER) on the bit-error probability is explored. The results indicate the importance of code flexibility and ER in system performance optimization. [ABSTRACT FROM PUBLISHER]
- Published
- 2007
- Full Text
- View/download PDF
7. IEEE 802.20: mobile broadband wireless access.
- Author
-
Bolton, W., Yang Xiao, and Guizani, M.
- Abstract
This article provides a survey of the emerging IEEE 802.20 standard, also known as mobile broadband wireless access. It provides an introduction to the activities with regard to this standard, including purpose and scope that the specification defines. The relationship with other similar standards such as IEEE 802.16e and 3G are discussed as well. Various technical details of the standard are presented, including quality of service parameters, data rates available to end users, application support, and security. Characteristics that the air interface should provide, specifically in regard to the physical and medium access control layers, are detailed as well [ABSTRACT FROM PUBLISHER]
- Published
- 2007
- Full Text
- View/download PDF
8. Impact of space-time block codes on 802.11 network throughput.
- Author
-
Stamoulis, A. and Al-Dhahir, N.
- Abstract
By employing more than one antenna at the transmitter and by properly coding data across the transmit antennas, physical layers (PHYs) with space-time block codes (STBCs) promise increased data rates with minimal decoding complexity at the receiver. This paper presents a comprehensive study of how the STBC gains at the PHY translate to significant network performance improvement in 802.11a wireless local area networks. We base our study on a detailed, across-all-layers, simulation of an 802.11a system. We have extended the network simulator with an implementation of the 802.11a PHY, which allows us to assess the impact of STBC not only at the PHY layer, but at the higher layers as well. An extensive set of simulations illustrates the merits of transmit diversity (in the form of STBC) and sheds light on how performance can be improved for transmission control protocol (TCP) traffic. Essentially, STBC presents to TCP a "smoother" wireless channel; this is corroborated by a brief theoretical analysis as well. [ABSTRACT FROM PUBLISHER]
- Published
- 2003
- Full Text
- View/download PDF
9. Authentication based on channel state information for industrial wireless communications
- Author
-
Pan, F., Pang, Z., Luvisotto, M., Jiang, Xiaolin, Jansson, R. N., Xiao, Ming, Wen, H., Pan, F., Pang, Z., Luvisotto, M., Jiang, Xiaolin, Jansson, R. N., Xiao, Ming, and Wen, H.
- Abstract
Physical layer authentication based on channel state information is an effective solution to preventing spoofing attacks in wireless communications by comparing the channel impulse responses. Existing theoretical analyses and experiments have proved the feasibility and efficiency in labs or offices. However, the environment of industrial wireless communication is significantly different. This paper applies physical layer authentication based on channel state information to measurements from four different industrial wireless communication scenarios, including indoor, outdoor, moving, and stationary scenarios. The analysis of the results allows to derive meaningful insights on the applicability of such a method to industrial wireless communications., QC 20200624
- Published
- 2018
- Full Text
- View/download PDF
10. Towards Secure and Self-Diagnosable Optical Networks
- Author
-
Furdek, Marija and Furdek, Marija
- Abstract
Given the pivotal role of optical networks in supporting critical societal services, their robustness to deliberate attacks targeting disruption at the physical layer requires advanced approaches for security assurance, diagnostics and response. This paper analyzes the necessary advancements in optical network security needed to achieve secure and self-diagnosable systems., QC 20191104
- Published
- 2018
- Full Text
- View/download PDF
11. Digital wireless broadband corporate and private networks: RNET concepts and applications.
- Author
-
Chelouche, N., Hethuin, S., and Ramel, L.
- Subjects
BROADBAND communication systems ,WIRELESS LANs ,IEEE 802.11 (Standard) ,LOCAL area networks ,TIME division multiple access ,CARRIER sense multiple access ,FREQUENCY division multiple access ,RADIO transmitter-receivers - Abstract
The radio broadband networks suffer from some specific constraints-access protocol efficiency, multipath effects, and limited available frequency bands-which have to be overcome by choosing the best possible compromises in cost/performance on physical and MAC layers. Current WLAN products (1-2 Mb/s at 2.45 GHz), which provide mainly data exchange service, are able to make seamless handover for an indoor cellular network but suffer from relatively low data rates. Even if compliant with the IEEE 802.11 future standard, they do not necessarily lead to interoperability. New generations become necessary for higher data transfer rates, real-time video, and multimedia applications compatible with the future ATM transfer mode. ETSI is proposing the HIPERLAN concept, working in the 5.3 and 17.2 GHz bands. Our contribution to this new standard, called RNET (Radio Network), uses a spread spectrum linear ramp waveform with enhanced capabilities (relative to the TDMA, CSMA/CA, and FDMA structures). The advantages of the MAC layer are highlighted and the first results of a transceiver demonstrator are given. [ABSTRACT FROM PUBLISHER]
- Published
- 1997
- Full Text
- View/download PDF
12. Physical Layer Design of High-Performance Wireless Transmission for Critical Control Applications
- Author
-
Luvisotto, M., Pang, Z., Dzung, D., Zhan, M., Jiang, Xiaolin, Luvisotto, M., Pang, Z., Dzung, D., Zhan, M., and Jiang, Xiaolin
- Abstract
The next generations of industrial control systems will require high-performance wireless networks (named WirelessHP) able to provide extremely low latency, ultrahigh reliability, and high data rates. The current strategy toward the realization of industrial wireless networks relies on adopting the bottom layers of general purpose wireless standards and customizing only the upper layers. In this paper, a new bottom-up approach is proposed through the realization of a WirelessHP physical layer specifically targeted at reducing the communication latency through the minimization of packet transmission time. Theoretical analysis shows that the proposed design allows a substantial reduction in packet transmission time, down to 1 $\mu$ s, with respect to the general purpose IEEE 802.11 physical layer. The design is validated by an experimental demonstrator, which shows that reliable communications up to 20 m range can be established with the proposed physical layer., QC 20180508
- Published
- 2017
- Full Text
- View/download PDF
13. Adopting Ethernet in space : the SEPHY project
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes, Universidad Antonio de Nebrija, Reviriego, Pedro, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes, Universidad Antonio de Nebrija, and Reviriego, Pedro
- Abstract
Presentació del projecte SEPHY (Space Ethernet Physical Layer) dins del marc del 2nd International Workshop on Elastic Networks Design and Optimisation (ELASTICNETS 2017).
- Published
- 2017
14. ACCENT5 A vision for D2D communications within 5G networks
- Author
-
Rostom Zakaria, Lorenzo Iacobelli, Quentin Bodinier, Mylene Pischella, Faouzi Bader, Alain Untersee, Ali Dziri, Olivier Rousset, Anael Bourrous, Thales Communications and Security, Conservatoire National des Arts et Métiers [CNAM] (CNAM), Teamcast, Institut d'Electronique et de Télécommunications de Rennes (IETR), Université de Nantes (UN)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Research agency ,Cover (telecommunications) ,Computer science ,050801 communication & media studies ,02 engineering and technology ,Deviceto-device (D2D) communication ,Base station ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0508 media and communications ,5G mobile communication systems ,D2D communications ,0202 electrical engineering, electronic engineering, information engineering ,Wireless telecommunication systems ,Thales Communications ,Protocol (object-oriented programming) ,Wireless network ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Frame (networking) ,LTE Networks ,Physical layer ,Medium access control ,020206 networking & telecommunications ,Network layers ,[SPI.TRON]Engineering Sciences [physics]/Electronics ,Mobile telecommunication systems ,Queueing networks ,Design and dynamics ,Physical layers ,business ,5G ,Radio resource allocation ,Computer network - Abstract
International audience; The paper presents the studies that have been led toward the integration of device-to-device (D2D) communications within LTE networks in the frame of the project ACCENT5 (Advanced Waveforms, MAC Design and Dynamic Radio Resource Allocation for Device-to-Device in 5G Wireless Networks) supported by the French National Research Agency. The solutions presented in this paper cover several aspects of D2D communications; they are the result of a close cooperation between four partners Thales Communications and Security, CNAM, TeamCast and CentraleSupélec. Physical Layer aspects have been investigated, especially concerning waveforms envisioned for D2D communications within 5G networks. Also, a new MAC protocol has been designed to address the issues raised by the integration of D2D transmissions within LTE cells. The solution coming out of the study guarantees a minimum QoS for both types of users (D2D users and regular users) and aims at reusing spectrum while offloading the burden on the base station. © 2017 IEEE.
- Published
- 2017
- Full Text
- View/download PDF
15. ACCENTS: a Vision for D2D Communications within 5G Networks
- Author
-
Bader, Faouzi, Bodinier, Quentin, Rousset, Olivier, Untersee, Alain, Dziri, Aii, Rostom Zakaria, Pischella, Mylene, Iacobelli, Lorenzo, Bourrous, Anael, Conservatoire National des Arts et Métiers [CNAM] (CNAM), Centre d'études et de recherche en informatique et communications (CEDRIC), Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM), Teamcast, Institut d'Électronique et des Technologies du numéRique (IETR), Nantes Université (NU)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), French National Research Agency (ANR) through the ACCENTS project [ANR-14-CE28-0026-01], ANR-14-CE28-0026,ACCENT5,Formes d'onde avancées, MAC et allocation dynamique de ressource radio pour les communications directes de terminal à terminal dans les réseaux 5G(2014), Université de Nantes (UN)-Université de Rennes 1 (UR1), HESAM Université - Communauté d'universités et d'établissements Hautes écoles Sorbonne Arts et métiers université (HESAM), HESAM Université - Communauté d'universités et d'établissements Hautes écoles Sorbonne Arts et métiers université (HESAM)-HESAM Université - Communauté d'universités et d'établissements Hautes écoles Sorbonne Arts et métiers université (HESAM), Université de Nantes (UN)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Research agency ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,LTE Networks ,Medium access control ,Network layers ,[SPI.TRON]Engineering Sciences [physics]/Electronics ,Deviceto-device (D2D) communication ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,5G mobile communication systems ,Mobile telecommunication systems ,D2D communications ,Queueing networks ,Design and dynamics ,Wireless telecommunication systems ,Thales Communications ,Physical layers ,Radio resource allocation - Abstract
International audience; The paper presents the studies that have been led toward the integration of device-to-device (D2D) communications within LTE networks in the frame of the project ACCENTS (Advanced Waveforms, MAC Design and Dynamic Radio Resource Allocation for Device-to-Device in SG Wireless Networks) supported by the French National Research Agency. The solutions presented in this paper cover several aspects of D2D communications; they are the result of a close cooperation between four partners: Thales Communications and Security, CNAM, TeamCast and CentraleSupelec. Physical Layer aspects have been investigated, especially concerning waveforms envisioned for D2D communications within SG networks. Also, a new MAC protocol has been designed to address the issues raised by the integration of D2D transmissions within LTE cells. The solution coming out of the study guarantees a minimum QoS for both types of users (D2D users and regular users) and aims at reusing spectrum while offloading the burden on the base station.
- Published
- 2017
- Full Text
- View/download PDF
16. Data link layer considerations for future 100 Gbps terahertz band transceivers
- Author
-
Lopacinski, Lukasz, Brzozowski, Marcin, and Kraemer, Rolf
- Subjects
Data link layer ,Link adaptation algorithm ,Consumed energy ,Hardware processor ,Physical layers ,Reed Solomon decoder ,State of the art ,Wireless Data links - Abstract
This paper presents a hardware processor for 100Gbps wireless data link layer. A serial Reed-Solomon decoder requires a clock of 12.5GHz to fulfill timings constraints of the transmission. Receiving a single Ethernet frame on a 100 Gbps physical layer may be faster than accessing DDR3 memory. Processing so fast streams on a state-of-the-art FPGA (field programmable gate arrays) requires a dedicated approach. Thus, the paper presents lightweight RS FEC engine, frames fragmentation, aggregation, and a protocol with selective fragment retransmission. The implemented FPGA demonstrator achieves nearly 120 Gbps and accepts bit error rate (BER) up to 2e - 3. Moreover, redundancy added to the frames is adopted according to the channel BER by a dedicated link adaptation algorithm. At the end, ASIC synthesis results are presented including detailed statistics of consumed energy per bit.
- Published
- 2017
- Full Text
- View/download PDF
17. Secure multiple-users transmission using multi-path directional modulation
- Author
-
Mohammed Abdel-Hafez, Mohammed Hafez, Tarek Elfouly, Tamer Khattab, and Huseyin Arslan
- Subjects
Spatial correlation ,Computer science ,Physical-Layer Security ,050801 communication & media studies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Precoding ,Worst case scenario ,0508 media and communications ,Secure communication ,Secrecy outage probabilities ,Secrecy ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Antenna arrays ,Physical layer security ,Antenna Arrays ,Wireless channel ,Modulation ,Antenna element ,business.industry ,05 social sciences ,Communication schemes ,020206 networking & telecommunications ,Network layers ,Legitimate users ,Transmission (telecommunications) ,Antennas ,Directional Modulation ,Physical layers ,Antenna (radio) ,business ,Communication channel ,Computer network - Abstract
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate users. We show that the proposed scheme highly degrades the eavesdroppers channel even for the worst case scenarios. We also provide the secrecy capacity and secrecy outage probability for the proposed scheme. We analyze the effect of the number of users, channel paths, and antenna elements on the secrecy performance of the scheme. Institute of Engineers and Everyone Else IEEE Communications Society
- Published
- 2016
- Full Text
- View/download PDF
18. Energy and data cooperation in energy harvesting multiple access channel
- Author
-
Berrak Sisman, Onur Kaya, Berk Gurakan, Sennur Ulukus, Işık Üniversitesi, Mühendislik Fakültesi, Elektrik-Elektronik Mühendisliği Bölümü, Işık University, Faculty of Engineering, Department of Electrical-Electronics Engineering, Şişman, Berrak, and Kaya, Onur
- Subjects
Energy cooperation ,Computer science ,Energy transfer ,02 engineering and technology ,Multiple access channels ,Energy arrival ,Inductive power transmission ,0202 electrical engineering, electronic engineering, information engineering ,Wireless telecommunication systems ,Policies ,Data communication ,MAC ,Energy harvesting ,Resource management ,Access protocols ,Physical layer ,Energy transfer policy ,Energy harvesting two-user Gaussian MAC ,Telecommunication power management ,Network layers ,Transmit power ,Rate allocation policy ,Battery levels ,Overheard signals ,Common messages ,020201 artificial intelligence & image processing ,Joint optimal offline transmit power and rate allocation policy ,Computer network ,Communication channel ,Allocation ,Wireless communication ,Sensor nodes ,Wireless energy transfer ,Gaussian multiple-access channels ,Radio networks ,Batteries ,Energy harvesting multiple access channel ,Gaussian channels ,Transmission ,Rate allocation ,Wireless ,Data cooperation ,Two user Gaussian multiple access channel ,Radiofrequency power transmission ,Multi-access systems ,business.industry ,020206 networking & telecommunications ,Optimal transmit policy ,Transmitter power output ,Optimal offline transmit power ,Multiuser channels ,Transmitters ,Transmission (telecommunications) ,Overheard signal ,Battery level ,Networks ,Physical layers ,business ,Energy exchange ,Energy (signal processing) - Abstract
We consider the energy harvesting two user Gaussian multiple access channel (MAC), where both users harvest energy from nature. The users cooperate at the physical layer (data cooperation) by establishing common messages through overheard signals and then cooperatively sending them. In addition, the users cooperate at the battery level (energy cooperation) by wirelessly transferring energy to each other. We find the jointly optimal offline transmit power and rate allocation policy together with the energy transfer policy that maximizes the departure region. We provide necessary conditions for energy transfer, and prove some properties of the optimal transmit policy, thereby shedding some light on the interplay between energy and data cooperation. Publisher's Version
- Published
- 2016
- Full Text
- View/download PDF
19. Ring versus bus: A BER comparison of photonic integrated networks-on-chip
- Author
-
Fabrizio Gambini, Stefano Faralli, Isabella Cerutti, Nicola Andriolli, and Paolo Pintus
- Subjects
Ring (mathematics) ,Silicon photonics ,Buses ,Microprocessor chips ,business.industry ,Computer science ,Optical interconnects ,Physical layer ,Ring architecture ,Network layers ,Transfer function ,Ring networks ,Computer Science::Hardware Architecture ,Bit (horse) ,Integrated networks ,Electronic engineering ,Photonics 10 Gb/ S ,Networks on chip ,Photonics ,Physical layers ,business - Abstract
Silicon-photonics bus and ring networks-on-chip are evaluated in terms of transfer function and bit error rates at 10Gb/s, demonstrating that the ring architecture can be effectively used with physical layer performance similar to the bus.
- Published
- 2015
20. Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
- Author
-
Ridha Hamila, Kaouthar Sethom, Mazen O. Hasna, and Seifeddine Bouallegue
- Subjects
Computer science ,Physical characteristics ,Secure wireless communication ,security ,Data_CODINGANDINFORMATIONTHEORY ,Average error probability ,Encryption ,law.invention ,Communication channels (information theory) ,Channel capacity ,Secure communication ,Relay ,law ,PHY ,Wireless telecommunication systems ,Wireless ,Cooperative communication ,Probability ,Decode - and - forwards ,Signal to noise ratio ,business.industry ,Wireless network ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,Eavesdropping ,Network security ,Network layers ,Cooperative wireless networks ,Cryptography ,Physical layers ,Outage probability ,business ,Relay channel ,Computer network ,Communication channel - Abstract
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper (illegitimate destination) to interpret the intercepted information. Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without encryption. It exploits the physical characteristics of the wireless channel in order to transmit messages securely. They are typically feasible when the source-destination channel is better than the source-eavesdropper channel. Cooperative schemes are a means to improve the performance of secure wireless communications. We propose an improved relay selection scheme, based on source-eavesdropper channel SNR restriction, that will guarantee the best secrecy rate at the destination under QoS condition. Performance has been studied in terms of secrecy rate, outage probability and average error probability. Simulations shows that the proposed scheme outperforms in terms of the secrecy rate at the destination when compared to techniques in the literature. Scopus
- Published
- 2014
- Full Text
- View/download PDF
21. Seek and Decode: Random Access with Physical-Layer Network Coding and Multiuser Detection
- Author
-
Cocco, Giuseppe, Pfletschinger, Stephan Franz, Navarro, Monica, and Dohler, Mischa
- Subjects
FOS: Computer and information sciences ,Packet networks ,Computer Science - Information Theory ,Decoding ,Linear combinations ,Performance measure ,Packet loss rates ,block-fading channel ,Physical-layer network coding ,Computer Science - Networking and Internet Architecture ,Random access systems ,Network coding ,multiuser detection ,wireless random access ,Networking and Internet Architecture (cs.NI) ,Packet loss ,Cross-layer approach ,Information Theory (cs.IT) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Satellitennetze ,Physical layer network coding (PNC) ,Multiuser detection ,Network layers ,Slotted Aloha ,Energy efficiency ,Physical layers - Abstract
We present a novel cross layer approach to random access (RA) that combines physical-layer network coding (PLNC) with multiuser detection (MUD). PLNC and MUD are applied jointly at the physical level in order to extract any linear combination of messages experiencing a collision. The set of combinations extracted from a whole frame is then processed by the receiver to recover the original packets. A simple pre-coding stage at the transmitting terminals allows the receiver to further increase system diversity. We derive an analytical bound on the system throughput and present simulation results for the decoding at the physical level as well as several performance measures at frame level in block fading channels, namely throughput, packet loss rate and energy efficiency. The results we present are promising and suggest that a cross layer approach leveraging on the joint use of PLNC and MUD can significantly improve the performance of RA systems.
- Published
- 2014
- Full Text
- View/download PDF
22. Secret key generation based on channel and distance measurements
- Author
-
Amr Mohamed, Ahmed Badawy, Daniele Trinchero, Tamer Khattab, and Tarek Elfouly
- Subjects
Bit Mismatch Rate ,Channel Estimation ,Localization ,Secret Key ,Computer Networks and Communications ,Control and Systems Engineering ,Theoretical computer science ,Computer science ,Channel estimation ,Information hiding ,Physical-layer secrecies ,Worst case scenario ,Channel measurements ,Parameter estimation ,Entropy (information theory) ,Field-programmable gate array ,Randomness ,Computer Science::Cryptography and Security ,Key generation ,Secret key generations ,Physical layer ,Secret key ,Network layers ,Key generator ,Cryptography ,Physical layers ,Algorithm ,Reciprocal - Abstract
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key generation algorithm based on two reciprocal physical layer parameters; the channel measurements and the distances between the two communicating nodes. The two parameters are estimated experimentally using implementations of our algorithm on three FPGA-based WARP kits emulating the two communicating nodes and the eavesdropper. The parameters are used as common sources of randomness to generate the secret key. We evaluate the performance of our algorithm through extensive iterations. We compare the bit mismatch rate as well as the entropy of the generated secret key of our algorithm versus classical channel only and distance only based algorithms. Our results reveal that even in the worst case scenarios, our algorithm outperforms the two other algorithms and overcomes their vulnerabilities. 2014 IEEE. Scopus
- Published
- 2014
23. Implementation of physical layer key distribution using software defined radios
- Author
-
Kambala, S., Vaidyanathaswami, R., and Andrew Thangaraj
- Subjects
Software radio ,Mechanical Engineering ,General Chemical Engineering ,Channel characteristics ,Wiretap channel ,Biomedical Engineering ,Key-distribution protocols ,General Physics and Astronomy ,Key exchange protocols ,Side effect ,Network security ,Network layers ,Radio ,Key distribution ,Security protocols ,Computer Science Applications ,Reliable communication ,Software-defined radios ,Physical channels ,Computer based simulation ,RF hardware ,Physical layer security ,Electrical and Electronic Engineering ,Physical layers - Abstract
It was well known from Shannon's days that characteristics of the physical channel like attenuation, fading and noise can impair reliable communication. But it was more recently that the beneficial side effects of channel characteristics in ensuring secret communication started getting attention. Studies have been made to quantify the amount of secrecy that can be reaped by combining channel coding with security protocols. The Wiretap channel proposed by Wyner is arguably one of the oldest models of physical layer security protocols. In this paper, we present a brief tutorial introduction to the Wiretap channel, followed by an application of the physical layer model to a class of Key Distribution protocols. We present results from an implementation of key distribution protocols using Software Defined Radio tools along with physical RF hardware peripherals. We believe this approach is much more tangible and informative than computer based simulation studies. � 2013, DESIDOC.
- Published
- 2013
24. Energy-efficient physical layer packet authenticator for machine-to-machine networks
- Author
-
Bartoli A., Hernández-Serrano J., León O., Kountouris A., and Barthel D.
- Subjects
Standards ,Network operations ,Authentication scheme ,Synchronization protocols ,Machine to machines ,Network layers ,Physical layers ,Self-organisation ,Energy conservation ,Energy efficient ,Human intervention - Abstract
Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility of human intervention. In this sense, every step forward into avoiding early exhaustion of the network nodes is of paramount importance. We have introduced a novel authentication scheme that is able to discard non-intended and/or non-legitimate packets just after the reception of the physical preamble. This proposal was shown to yield enormous energy saving with regard to both node exhaustion attacks and normal network operation. In this paper, we extend that work with a novel synchronization protocol that addresses previous desynchronisation issues. Besides, we analyse and propose the more appropriate deployment parameters that maximise the overall energy savings. We also detail the necessary key generation and key updating processes required to manage the in use keying material. Moreover, we show how to fit the proposed mechanism into the IEEE 802.15.4e amendment to the IEEE 802.15.4-2006 standard, as many companies have decide to go for this technology for the development of machine-to-machine networks. © 2013 John Wiley & Sons, Ltd.
- Published
- 2013
25. Configuration Schemes and Assessment of NS3 Models Using a Wireless Testbed
- Author
-
Kremer, Guillaume, Carvin, Denis, Berthou, Pascal, Owezarski, Philippe, Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT), Université Toulouse III - Paul Sabatier (UT3), Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées, and Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1)
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Wireless Networks ,Cross layer Metrology ,Physical Layers - Abstract
In the field of Networking and Telecommunications, researchers have often the choice between several environments (real, experimental, emulated or simulated) to validate their results. Each facet of our work, from the study of network behavior, to protocol improvements, including the characterization of specific phenomena, can be related to different environments more or less realistic. We are thus confronted to a trade-off mixing the level of abstraction, bias of measurement, and implementation complexity (in term of cost and time). Nevertheless, because simulations are often regarded as quicker, easier to use and simpler environments than real testbeds, they are mostly used despite their accuracy limits. This is particularly true when simulating wireless communication, where cross-layer effects and physical medium are complex to isolate and understand.While some effort have been made to improve simulators, their comparison with real environments are still in progress and requires experimental equipments, especially for wireless networks. In this context, we built a controlled test-bed environment to calibrate wireless simulators. This paper compares the results obtained for scenarii respectively played within this environment and the Ns3 platform. Our analysis method is based on network traces comparison using classification trees. On a first basis the construction of the tree is supervised, but later, it could be unsupervised and feed the need for a comparison tool of different network environments.
- Published
- 2013
26. Radio propagation in industrial wireless sensor network environments
- Author
-
Zinonos, Z., Vassiliou, Vasos, Christofides, Tasos C., Vassiliou, Vasos [0000-0001-8647-0860], and Christofides, Tasos C. [0000-0001-6121-0683]
- Subjects
Performance Evaluation ,Computer science ,Radio Propagation ,Real-time computing ,Mathematical analysis ,Industrial environments ,Oil refineries ,Mobility Management ,Radio transmission ,Mobility management ,Industrial wireless sensor networks ,Simulation ,Mathematical tools ,Oil refinery ,Testbed ,Radio waves ,Physical layer ,Network layers ,Wireless sensor networks ,Refinery ,Radio propagation ,Radio propagation model ,Evaluation results ,Testbeds ,Physical layers ,Simulation evaluation ,Industrial testbed ,Wireless sensor network ,Radio model - Abstract
In recent years, sensor networks characteristics have led to incremental utilization in different types of applications. Several techniques have been proposed to evaluate the performance of WSNs the two most popular being mathematical analysis and simulations. An important drawback of these techniques is that they provide evaluation results that usually are not similar to those of real deployments. One reason for this is the fact that both techniques introduce physical layer modeling assumptions, which do not usually corresponded to real-life environments. In this paper, we used measurements from an industrial environment to develop a new radio propagation model for use in simulators and mathematical tools. The proposed radio model was implemented in the COOJA simulator and validated against real-life results obtained from a testbed inside a running oil refinery, which were found not to conform to any legacy radio propagation model. The proposed model has been shown to successfully match the refinery testbed behavior. 125 131 Sponsors: ACM SIGSIM Conference code: 93968 Cited By :5
- Published
- 2012
- Full Text
- View/download PDF
27. Çift Yönlü Röleli Kanallarda Uyarlamalı Eşleme
- Author
-
Türkel, Burhanettin, Aygölü, Ümit, Telekomünikasyon Mühendisliği, Telecommunication Engineering, Aygölü, Hasan Ümit, and Elektronik ve Haberleşme Mühendisliği Ana Bilim Dalı
- Subjects
Telsiz ,wireless ,adaptive coding ,singular fade states ,Elektrik ve Elektronik Mühendisliği ,Wireless ,sönümleme noktaları ,fiziksel katman ağ kodlama ,Numerical relay ,uyarlamalı kodlama ,Physical layers ,physical layer network coding ,Electrical and Electronics Engineering - Abstract
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2012, Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2012, Son yıllarda telsiz iletişim sistemleri için kaliteli ses iletimi yanında yüksek hızlı veri iletimi gereksinimi de artmaktadır. Artan bu gereksinimi karşılamak için iletişim sistemlerinin başarım oranları ve sığaları artırılmalıdır. Bu amaçla bu çalışmada çift-yönlü röle ağları ele alınmaktadır. Çalışmada ele alınan sistem iki uç düğüm ve aralarında röleden oluşmaktadır. İki uç birim birbirlerine röle üzerinden bilgi iletmektedir. Klasik durumda bu iş dört evrede, geleneksel ağ kodlama yönteminde üç evrede, bu tezde ele alınan fiziksel katman ağ kodlamada (PNC) ise iki evrede gerçekleşmektedir. PNC’de rölenin yarı dupleks çalışmasından kaynaklanan zaman kaybı giderilmektedir. Bu yöntemde, telsiz iletişim sistemlerinde oluşan bozucu etki girişimden yararlanarak sistem başarımı iyileştirilmektedir. Fiziksel katman ağ kodlama yönteminde kanal sönümleme durumları dikkate alınmadığı için derin sönümleme noktaları oluşur. Yeni önerilen uyarlamalı ağ kodlama yönteminde, uç düğümlerde kullanılan modülasyon tipine göre rölede oluşan derin sönümleme noktaları dikkate alınmaktadır. Kanal durumlarına göre, rölede kullanılan ağ kodlama matrisinin seçilmesi hata başarımını artırmaktadır. Özellikle Rician sönümlemeli kanallarda kanal parametresi K’nın yüksek değerleri için kodlama kazancı artmaktadır. Kanal durumlarına göre, rölede kullanılan ağ kodlama matrislerinin oluşturulması için Latin kareler yöntemi basit ve etkin bir yöntemdir. Literatürde uyarlamalı eşleme ile ilgili pek çok çalışma vardır. Ancak asimetrik hızlarda çalışan uç düğümlerden oluşan röle ağı için uyarlamalı eşleme ile ilgili çalışma bulunmamaktadır. Bu tez çalışmasının ilk kısmında, iki uç düğümün röle yardımıyla bilgi alışverişi yaptığı çift yönlü röleli kanallarda fiziksel katman ağ kodlama ve uyarlamalı eşleme yöntemi incelenmektedir. Sistemde QPSK modülasyonu ve çöz-aktar iletim tekniği kullanılmaktadır. Her düğümün ve rölenin yarı dupleks çalıştığı ve bir anteni olduğu varsayılmaktadır. Farklı Rician sönümleme parametreleri için her iki sistemin bilgisayar benzetim sonuçları karşılaştırılmaktadır. Çalışmanın ikinci kısmında uyarlamalı eşlemenin asimetrik hızlarda çalışan çift yönlü röleli kanallara uygulanması gerçekleştirilmektedir. İlk olarak iki uç düğümde BPSK ve QPSK modülasyonu ile uyarlamalı eşleme yönteminin kullanıldığı sistem için derin sönümleme noktaları ve kanal bölgeleri elde edilmektedir. Bu sistem için sönümleme noktaları ve çevrelerindeki bölgelerde hata başarımını iyileştiren ağ kodlama matrisleri Latin dikdörtgenler yardımıyla oluşturulmaktadır. Bilgisayar benzetimleri yardımıyla elde edilen hata olasılığı eğrileri incelendiğinde, Rician kanal parametresi K=10 iken 〖10〗^(-4) lük bir bit hata başarımını sağlamak için E_b⁄N_0 oranında uyarlamalı eşleme yöntemi PNC yöntemine göre 4.5 dB kazanç sağlamaktadır. Daha sonra uç düğümlerde BPSK ve 8-PSK modülasyonu ile uyarlamalı eşleme yönteminin kullanıldığı sistem için derin sönümleme noktaları ve kanal bölgeleri elde edilmektedir. Bu sistemler için Latin dikdörtgenler yardımıyla ağ kodlama matrisleri bulunarak hata başarımları bilgisayar benzetimleri yardımıyla değerlendirilmektedir. Benzetim sonuçları incelendiğinde, Rician kanal parametresi K=10 iken 〖10〗^(-3) lük bir bit hata başarımı sağlamak için uyarlamalı eşleme yöntemi PNC yöntemine göre E_b⁄N_0 oranında 1.5 dB kazanç sağlamaktadır., In recent years, besides the need for high quality voice transmission for wireless communication systems, the need for high-speed data transmission is also increasing. In order to respond to these needs, the reliability and capacity of the communication systems should be increased. In the current 3G systems, increase in data rates has been provided by larger bandwidths and multiple antennas techniques. However, in a typical cellular system, the signal to noise ratio required to use multiple antennas techniques is observed on a very small fraction of the cell. The motivation for relay-based architecture comes from achieving larger gains by using this techniques for all cell. For this reason, two-way relay channel has been studied in this thesis. In a wireless two-way relay channel, intermediate node called relay assists communication between two end nodes. The relay receives the signal from the source, processes and transmits the signal to the destination. The relays are classified into two classes as analog relays or digital relays. Analog relays that also known as nonregenerative relays just amplify and transmit the received signal to the destination. Digital relays also known as regenerative relays process the received signal. The received signal first demodulated and then modulated before transmission to the destination. In literature, analog relays are called amplify and forward whereas digital relays are called decode and forward. In relay-based wireless systems frequency division duplexing or time division duplexing techniques are used frequently. In a TDD technique, the transmissions need to be orthogonal in time in order to avoid from interference since the same frequency is used for all tranmissions. There are efficient coding strategies at the relay that provide utilization of the channel in literature. One of the well studied coding strategy is called physical-layer network coding. In PNC, the relay receives the signal from both sources, process and forwards an appropriate signal satisfying the exclusive law to the end nodes. In PNC, the bi-directional transmission is completed in two phases whereas in classical and conventional network-coding systems it is completed in four phases and three phases, respectively. Thus, the PNC protocol avoids the loss in spectral efficiency that occurs due to the half-duplex nature of the communication devices. PNC and its counterpart adaptive network coding (ANC) are the latest protocols for two-way communication systems. Conventional network coding is implemented in the network layer, where relay node combines bits by XOR operation and forwards to the end nodes. In PNC strategy, two end nodes send information to the relay simultaneously. Naturally, the signals from end nodes overlap in free space as electromagnetic waves. Then, the relay decodes the superposition of mixed signals. Although broadcast nature of wireless communication system makes interference a destructive nuisance in common case, PNC turns the broadcast property into a capacity-increasing advantage. Nevertheless, PNC scheme does not give the best performance for all channel fade coefficients. To reduce the impact of multiple access interference which occurs at the relay during the MA phase a new scheme that is called adaptive network coding is introduced. In ANC, network coding mapping employed at the relay during the broadcast phase is adaptively changed according to the channel fade coefficients. Thus, the impact of the multiple access interference is decreased. The set of all possible channel realizations is quantized into a finite number of regions. In each region a specific network coding map is used to reach the best error performance. These network coding maps should satisfy the exclusive law. In certain regions any network coding map which satisfies the exclusive law gives the best performance and changing network coding map doesn’t impact error performance. These regions are called non-removable singular fade states. The non-removable singular fade states ocur due to channel outage. In certain regions the choice of the network coding map affects the performance. These ones are called removable singular fade states. An upper bound on the average end-to-end Symbol Error Rate is given with and without adaptive network coding at the relay, for a Rician fading scenario. It is clear that without ANC, at high Signal to Noise Ratio, three error events contribute to the end-to-end SER. The first error event is associated with the removable singular fade states. The second one is associated with the non-removable singular fade states. The third one comes from the error event during the BC phase. All these error events decrease as SNR-1 without ANC. In the other hand, when adaptive network coding is used at the relay, the error events associated with the removable singular fade states decrease as SNR-2. As a result adaptive network coding strategy provides a coding gain over the physical layer network coding. In TWRC, the contribution to the average end-to-end SER during the MA phase is dominant for a Rician fading channel. Since adaptive network coding improves the error performance during the MA phase, ANC provides more coding gain in a Rician fading environment than in a Rayleigh fading environment. Network coding map that satisfies the exclusive law can be obtained by Latin Square. It is shown that the requirement of satisfying the exclusive law is same as the clustering being constructed by a Latin squares. An adaptive network coding has been well studied in the literature for systems where symmetric data rates are used at the end nodes, such as M-PSK modulations. However, there is not too much study for asymmetric systems for which transmission rates of the two end nodes differ. On the other hand, end-nodes can be located on different distances to the relay. The quality of the signal that reaches the relay from one of the end nodes can be weak while that of the other end node signal being strong. Thus, different modulation schemes can be used at the end nodes. In the first part of the thesis, adaptive physical layer network coding in two-way relay systems is investigated for the symmetric scheme where both end nodes employ the same signal constellation. It is assumed that the same QPSK modulation is employed at the end-nodes and decode-and-forward relaying strategy is applied in the considered system. In addition, each nodes and relay are assumed having each one antenna and cannot receive and transmit simultaneously. The BER and SER performances of the PNC and ANC schemes are evaluated via computer simulations are compared for both Rayleigh and Rician channels. In the second part, adaptive network coding is implemented for the scenario that the data rates of the end nodes are asymmetric. First, quantization of the complex plane is obtained for the scenario that the end nodes use BPSK and QPSK modulation. In this scenario network coding maps that give the best performance for a given region are determined by Latin Rectangles. It is shown that for the Rician fading scenarios considered for the Rician fading parameter K=10, at a BER of 〖10〗^(-4), the ANC provides an SNR gain of 4.5 dB over the classical PNC system. Second, quantization of the complex plane is obtained for the scenario that the end nodes employ BPSK and 8-PSK modulation. For all regions, specific network coding maps that satisfy the exclusive law are acquired by Latin rectangles. It is shown that to achieve a bit error rate of 〖10〗^(-3) ANC scheme provides a coding gain of 1.5 dB compared to the reference PNC scheme for a Rician fading parameter value of K=10. Finally, theoretical error probability upper bounds valid at high SNR values are obtained for the considered asymmetrical two-way relaying systems. As well as these upper bounds are loose, their relative behaviour compares well with the simulation curves., Yüksek Lisans, M.Sc.
- Published
- 2012
28. Métrologie des réseaux sans-fil
- Author
-
Kremer, Guillaume, LAAS-OLC, Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Wireless Networks ,Cross layer Metrology ,Physical Layers - Abstract
Les réseaux sans-fil se généralisent, notamment en tant que techniques d'accès à l'Internet avec les dispositifs sans-fils portatifs actuels (ordinateurs portables, tablettes, smartphones...). Cependant, la nature de ces réseaux offrant des ressources réduites par rapport aux réseaux filaires ou mettant en oeuvre des techniques d'accès indéterministes temporellement posent des problèmes au niveau de la gestion des ressources. Par conséquent la métrologie de ces réseaux sans fil est un élément prépondérant. Etant donnée la nature spécifique de ces réseaux, cette article introduit une approche "cross-layer" de la métrologie, i.e. une approche qui va réaliser des mesures et des observations à tous les niveaux du réseau sans fil: couches physique, MAC, liaison et réseau. Cet article insiste sur l'importance et la difficulté de réaliser des mesures fiables au niveau de la couche physique et du médium hertzien. Il illustre au travers d'une expérience, l'impact de la qualité du support hertzien sur la qualité et les performances du service réseau.
- Published
- 2011
29. Time Diversity in Mobile DVB-T2 Systems
- Author
-
David Gomez-Barquero, Narcis Cardona, David Gozalvez, and David Vargas
- Subjects
Fast fading ,Mobile channels ,Time diversity ,Orthogonal frequency-division multiplexing ,Computer science ,Received signals ,Upper layer ,Time interleaving ,Fading channels ,Data_CODINGANDINFORMATIONTHEORY ,DVB-T2 ,Mobile reception ,Power savings ,Digital Video Broadcasting ,TEORIA DE LA SEÑAL Y COMUNICACIONES ,Media Technology ,Fading ,Forward error correction ,Electrical and Electronic Engineering ,Time-interleaving ,business.industry ,Deinterleaving ,Physical layer ,Channel coding ,Mobile TV ,FEC protection ,Mobile telephony ,Physical layers ,Television receivers ,business ,Computer network - Abstract
DVB-T2 implements a very flexible time interleaving that allows multiple tradeoffs in terms of time diversity, latency and power saving. In this paper, we study in detail these tradeoffs in the context of mobile reception. Together with time diversity, we also investigate the impact of reduced time de-interleaving memory and Alamouti-based MISO in the mobile reception of DVB-T2 services. In addition, we propose the utilization of upper layer FEC protection in order to overcome the limitations of the DVB-T2 physical layer for the provision of long time interleaving, and enable fast zapping. The performance is evaluated by means of simulations in mobile channels that include the presence of fast fading and shadowing in the received signal. © 2010 IEEE., Manuscript received October 13, 2010; revised April 22, 2011; accepted May 11, 2011. Date of publication July 25, 2011; date of current version August 24, 2011. This work was supported in part by the Spanish Ministry of Industry, Tourism, and Commerce under the Celtic project Enabling Next-Generation Networks for Broadcast Services ENGINES (TSI-020400-2010-108). The work of D. Gozalvez was supported by the FPU Grant AP2008-03293 of the Spanish Ministry of Education.
- Published
- 2011
- Full Text
- View/download PDF
30. Optimization of high-definition video coding and hybrid fiber-wireless transmission in the 60 GHz band
- Author
-
Marta Beltran, Soren Forchhammer, Tien Thang Pham, Idelfonso Tafur Monroy, Alexander Lebedev, Roberto Llorente, Xianbin Yu, and Anna Ukhanova
- Subjects
Video quality ,Image compression ,Computer science ,Experimental studies ,02 engineering and technology ,High quality ,7. Clean energy ,Envelope Detection ,Compressed video ,Low complexity ,020210 optoelectronics & photonics ,Optics ,Low delay ,TEORIA DE LA SEÑAL Y COMUNICACIONES ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Wireless ,Fiber-wireless ,Image communication systems ,60 GHz band ,business.industry ,Advanced video coding ,High-definition videos ,Physical layer ,High definition ,Image coding ,Codes (symbols) ,Network layers ,Atomic and Molecular Physics, and Optics ,Scalable Video Coding ,High-definition video ,020201 artificial intelligence & image processing ,Physical layers ,business ,Envelope detector ,Coding (social sciences) - Abstract
[EN] The paper addresses the problem of distribution of highdefinition video over fiber-wireless networks. The physical layer architecture with the low complexity envelope detection solution is investigated. We present both experimental studies and simulation of high quality high-definition compressed video transmission over 60 GHz fiberwireless link. Using advanced video coding we satisfy low complexity and low delay constraints, meanwhile preserving the superb video quality after significantly extended wireless distance. © 2011 Optical Society of America., This work has been partly funded by the European Commission under FP7 ICT-249142 FIVER project and by the by the Spanish Ministry of Science and Innovation under the TEC2009-14250 ULTRADEF project.
- Published
- 2011
- Full Text
- View/download PDF
31. Mobile wireless sensor networks applied to the survey of water infrastructures
- Author
-
Daniele Trinchero, Abdullah Kadri, Mazen O. Hasna, Riccardo Stefanelli, Adnan Abu-Dayya, Luca Cisoni, and Tamer Khattab
- Subjects
Optimization ,Engineering ,Design ,Wireless interfaces ,Wireless ad hoc network ,Battery life ,Application requirements ,Underground pipeline ,Mobile wireless sensor network ,Water supply ,Acoustic Sensors ,Electronic engineering ,Wireless ,Technology transfer ,Pipelines ,Sensors ,business.industry ,Mobile ad hoc network ,Different frequency ,Wireless sensor networks ,Wireless module ,Pipeline transport ,Water infrastructure ,Transmission protocols ,Wireless network interface controller ,Mobile telephony ,Physical layers ,business ,Wireless sensor network ,Realization (systems) - Abstract
The paper reports our last advances in the realization of mobile wireless sensor networks (WSNs), able to reveal unknown tracks and leakages within underground pipelines used to distribute water. This WSN technology is based on a concept recently proposed by the authors, which makes use of mobile acoustic sensors able to flow within a pipe, transported by the fluid, and equipped with a wireless interface that reports the acquired information to the surface. The paper starts from the early and simplified realization that has been already presented to demonstrate the feasibility of the concept and describes the realization of advanced prototypes, using wireless modules that work in different frequency ranges with specifically designed antennas with the auxiliary possibility to track the position of the device. Ad-hoc solutions have been identified for the construction of the microwave front-end, allowing an improved stability despite the mobility and the rotations. Battery life, compared to application requirements, have been investigated and optimized. Moreover, the technology has been adapted to different operational contexts, making use of different choices of the Physical Layers and various transmission protocol optimizations. At last, results are presented and discussed. Qatar National Research Fund Scopus
- Published
- 2010
- Full Text
- View/download PDF
32. Üçüncü nesil mobil telekomünikasyon sistemlerinin gelişimi ve radyo yükleme stratejileri
- Author
-
Şahin Tümer, Banu, Tağluk, Mehmet Emin, and Elektrik-Elektronik Mühendisliği Anabilim Dalı
- Subjects
Universal mobile telecommunication system ,Elektrik ve Elektronik Mühendisliği ,WCDMA ,Physical layers ,GSM ,Electrical and Electronics Engineering ,GSM system - Abstract
Mobil Haberleşme sistemleri; birinci nesil olarak adlandırılan analog mobil haberleşme sistemleri ile başlamıştır. Birinci nesil mobil haberleşme sistemlerinin sadece ses temelli hizmetler sunabilmesi, hizmet kalitesinde sıkıntılar yaşanması neden olmuş, ikinci nesil mobil haberleşme sistemlerine (2G) ihtiyaç duyulmuştur. İkinci nesil haberleşme sistemleri sesin yanında düşük hızlı veri iletimine de imkan tanıyan sayısal bir mobil haberleşme teknolojisidir. İkinci nesil haberleşme sistemlerinde düşük hızlarda oluşan veri iletimindeki yetersizlik 2,5 Nesil (2,5 G) sistemine geçişi gerçekleştirmiştir.2,5 Nesil, 2G ye göre daha hızlı veri iletimini sağlayan bir teknolojidir. 2,5 Nesilde GPRS ve EDGE teknolojisi maksimum 59,2Kbps hızına ulaşabilmiştir. 2,5G sisteminden sonra yeni bir kuşak olan hem ses hem de hızlı veri iletimine imkan sağlayan; zaman ve frekansı aynı anda kullanabilen üçüncü nesil (3G) genişband teknolojisi geliştirilmiştir. Üçüncü Nesil (3G) genişband haberleşme sistemlerinin en büyük avantajı ses ve görüntü datalarının belirlenmiş kodlar yardımıyla güvenli ve hızlı bir şekilde iletilmesine olanak sağlamasıdır. Genişband haberleşme sistemlerinde 5 Mhz bant genişliğinde data hızı 384 kbps/2 Mbps'na ulaşmaktadır.Bu çalışmada, mobil haberleşme sistemlerinin tarihçesi, çoklu erişim teknikleri, üçüncü nesil genişband haberleşme sistemlerinden W-CDMA tekniğinin hava arayüzü, fiziksel katman performansı, UMTS yayma ve derleme hesaplamaları, Rayo Kaynak Yönetimi, hava arabirim yukarı ve aşağı bağlantı yük faktörü hesaplamaları, 3GPP performans gereksinimleri ve iyileştirmeleri, uplink-downlik performans analizi ve hesapları incelenmiştir. Mobile Communication systems began with analog communication technology as first generation. Since the first generation mobile communication systems serve only voice-based service, there had been some problems with the service quality. Second generation communication systems (2G) had taken place because of these problems. Beside voice, second generation communication systems has digital mobile communication technology which presents the possibility to low rate data transmission. Because of insufficiency in low rate data transmission, 2.5 generation (2.5G) system had been developed temporarily.2.5 Generation serves higher rate of data transmission compared with 2G. GPRS and EDGE technology reaches to a maximum value of 59.2Kbps rate in 2.5G. Third generation (3G) wideband communication systems had been developed after the 2.5 G system, which serves higher rate of voice and data transmission and which makes it possible to use both time and frequency. The biggest advantage of the the third generation (3G) wideband communication systems is the ability of transmitting both the voice and image data?s in secure and with high rates by determined codes. Data rate reaches to a value of 384Kbps/2Mbps with 5 MHz of bandwidth in wideband communication systems.In this thesis, the development of mobile communication systems, the air interface of W-CDMA technique in third generation wideband mobile communication systems, physical layer performance, calculation of UMTS spreading and despreading, radyo resource management, 3GPP performance requirements and enhancements, uplink-downlink performance analysis and calculations have been studied. 138
- Published
- 2010
33. System verification of flexray communication networks through behavioral simulations
- Author
-
Candice Muller and Maurizio Valle
- Subjects
Engineering ,Reliability (computer networking) ,Distributed computing ,Logical topology ,Lossless ,CPU time ,Network topology ,Distributed systems ,Automobile electronic equipment ,Topology ,FlexRay ,Bus network ,Flexray ,Electric network topology ,Network architecture ,Behavioral simulation ,business.industry ,Physical layer ,Behavioral simulation, Bus lines, Computational effort, Design verification, Distributed systems, Flexray, Lossless, Mixed mode, Network topology, Physical layers, Signal Integrity, System verifications, Vehicle electronics ,Automobile electronic equipment, Electric network topology, Network layers, Topology ,Computer simulation ,Network layers ,Signal Integrity ,Mixed mode ,System verifications ,Embedded system ,Computational effort ,Design verification ,Bus lines ,Physical layers ,business ,Vehicle electronics - Abstract
Internal vehicle communication networks are becoming highly distributed systems. The increase of the internal vehicle electronic system complexity requires higher performance and reliability, and the necessity of ensuring enough bus signal integrity increases the design verification effort. In this paper we present a system verification methodology of Flexray communication networks through behavioral simulations as well as the analysis of important parameters which influence the communication. The paper presents the verification of different network topologies through mixed-mode behavioral simulations and the evaluation of the most critical aspects of the physical layer. Modifications in the original topologies have been performed, and their effects have been analyzed. Additionally, we give special attention to the computational effort required for the behavioral simulations. The different topologies have been simulated with two bus line models (a lossless and a lossy), and the results are evaluated in terms of CPU usage time and accuracy.
- Published
- 2010
34. Physical layer bootstrapping protocol for cognitive radio networks
- Author
-
Doost-Mohammady, R., Paweczak, P., Janssen, G.J.M., Segers, J.C.M., and TNO Informatie- en Communicatietechnologie
- Subjects
Spectrum sensing ,Modulation schemes ,Cognitive radio ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Signaling protocol ,Cognitive radio network ,Spectrum bands ,Non-cooperative communication ,Radio ,Signaling ,Energy efficiency ,On-off keying ,Computer Science::Networking and Internet Architecture ,Network protocols ,Frequency channels ,Spectrum sharing ,Physical layers - Abstract
In this paper a novel signaling protocol for coexistence and spectrum sharing among cognitive radio nodes is proposed. This protocol allows the radios to rendezvous with each other in a statically allocated spectrum band through on-off keying signaling and reliable spectrum sensing. It enables the radios to have non-cooperative communication in the sense that they do not need to exchange their modulation schemes and frequency channel. The proposed protocol requires no synchronization and is augmented with power control mechanisms. Analysis of the proposed protocol in terms of timing, probability of a successful connection and energy efficiency is also given. ©2010 IEEE.
- Published
- 2010
35. Physical layer bootstrapping protocol for cognitive radio networks
- Subjects
Spectrum sensing ,Modulation schemes ,Cognitive radio ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Signaling protocol ,Cognitive radio network ,Spectrum bands ,Non-cooperative communication ,Radio ,Signaling ,Energy efficiency ,On-off keying ,Computer Science::Networking and Internet Architecture ,Network protocols ,Frequency channels ,Spectrum sharing ,Physical layers - Abstract
In this paper a novel signaling protocol for coexistence and spectrum sharing among cognitive radio nodes is proposed. This protocol allows the radios to rendezvous with each other in a statically allocated spectrum band through on-off keying signaling and reliable spectrum sensing. It enables the radios to have non-cooperative communication in the sense that they do not need to exchange their modulation schemes and frequency channel. The proposed protocol requires no synchronization and is augmented with power control mechanisms. Analysis of the proposed protocol in terms of timing, probability of a successful connection and energy efficiency is also given. ©2010 IEEE.
- Published
- 2010
36. Performance evaluation and traffic modeling
- Subjects
Future wireless networks ,Quality measures ,Internet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MAC layer ,Network management ,QoS parameters ,End users ,Packet loss rates ,Quality of experiences ,Mobile and wireless communication ,Traffic modeling ,Network performance ,Performance evaluation ,Traffic ,Physical layers ,Multimedia systems - Abstract
Mobile and wireless communication systems are becoming more and more complex, making understanding the interaction of different technologies on different layers a very difficult task. The introduction of sophisticated techniques on the physical layer that react to changes of the wireless channel on small timescales requires new paradigms for modeling, simulating, and analyzing current and future wireless networks. Investigating the relationship of new physical layer techniques, application-specific requirements and performance measures will become a major research topic for future wireless networks. A continuous change in the methodology for evaluating the network performance takes place in the Internet. In the past, network performance was mainly evaluated using concretely measurable values like packet loss rate, delay, or jitter. The current trend in the Internet goes toward application-specific quality measures that judge more the subjective experience of the end user than they do network parameters. In the terminology, this is expressed as the change from quality of service (QoS-Quality of Service (QoS)) to quality of experience (QoE). For wireless networks this leads to interesting consequences, as currently the traffic requirements for MAC layer connections are mainly formulated in terms of QoS parameters. Accomplishing the change from QoS to QoE also in the definition of connection parameters is a future challenge for wireless networks, for which the first approaches are presented.
- Published
- 2009
37. Performance Evaluation and Traffic Modeling
- Author
-
Fernando J. Velez, Dmitri Moltchanov, Dirk Staehle, Hans van den Berg, Thomas Michael Bohnert, Orlando Cabral, and TNO Informatie- en Communicatietechnologie
- Subjects
Future wireless networks ,Computer science ,MAC layer ,Network management ,QoS parameters ,Packet loss rates ,Quality of experiences ,Mobile and wireless communication ,Traffic modeling ,Traffic ,Wireless ,Network performance ,Quality of experience ,Quality measures ,Internet ,business.industry ,Wireless network ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,End users ,Performance evaluation ,The Internet ,Physical layers ,business ,Multimedia systems ,Computer network - Abstract
Mobile and wireless communication systems are becoming more and more complex, making understanding the interaction of different technologies on different layers a very difficult task. The introduction of sophisticated techniques on the physical layer that react to changes of the wireless channel on small timescales requires new paradigms for modeling, simulating, and analyzing current and future wireless networks. Investigating the relationship of new physical layer techniques, application-specific requirements and performance measures will become a major research topic for future wireless networks. A continuous change in the methodology for evaluating the network performance takes place in the Internet. In the past, network performance was mainly evaluated using concretely measurable values like packet loss rate, delay, or jitter. The current trend in the Internet goes toward application-specific quality measures that judge more the subjective experience of the end user than they do network parameters. In the terminology, this is expressed as the change from quality of service (QoS-Quality of Service (QoS)) to quality of experience (QoE). For wireless networks this leads to interesting consequences, as currently the traffic requirements for MAC layer connections are mainly formulated in terms of QoS parameters. Accomplishing the change from QoS to QoE also in the definition of connection parameters is a future challenge for wireless networks, for which the first approaches are presented.
- Published
- 2009
- Full Text
- View/download PDF
38. Μελέτη φυσικού επιπέδου τηλεπικοινωνιακών συστημάτων 3ης γενιάς και εξομοίωση καναλιού PRACH ανερχόμενης ζεύξης κατά την προτυποποίηση 3GPP
- Author
-
Οικονόμου, Γεώργιος, Panagiotakopoulou, Angeliki, Ζυγούρης, Ευάγγελος, and Φωτόπουλος, Σπυρίδων
- Subjects
Third generation ,Spread spectrum ,Gold sequences ,Pseudorandom sequences ,Telecommunication systems ,Φυσικά κανάλια ,Πολλαπλή πρόσβαση διαίρεσης κωδικών ,Τρίτη γενιά ,Τηλεπικοινωνιακά συστήματα ,Ακολουθίες gold ,Διάχυση φάσματος ,Διαμόρφωση QPSK ,CDMA ,Ανερχόμενη ζεύξη ,Physical channels ,Φυσικά επίπεδα ,Ψευδοτυχαίες ακολουθίες ,Spreading codes ,621.384 56 ,3GPP ,Κώδικες διάχυσης ,Physical layers ,QPSK modulation ,Uplink ,Scrambling codes - Abstract
Η παρούσα διπλωματική εργασία έγινε στα πλαίσια του Προγράμματος Μεταπτυχιακών Σπουδών Ηλεκτρονικής και Υπολογιστών, στο Τμήμα Φυσικής του Πανεπιστημίου Πατρών. Αντικείμενό της αποτελεί η μελέτη του φυσικού επιπέδου συστημάτων κινητής τηλεφωνίας τρίτης γενιάς και η εξομοίωση χαρακτηριστικού καναλιού του φυσικού επιπέδου σύμφωνα με την παγκόσμια προτυποποίηση 3GPP. Στο πρώτο κεφάλαιο γίνεται ιστορική ανασκόπηση των συστημάτων προηγούμενων γενεών. Αναφέρονται βασικά προβλήματα που πρέπει να αντιμετωπίσει ένα τηλεπικοινωνιακό σύστημα καθώς και η βασική δομή των κυψελοειδών συστημάτων. Γίνεται εισαγωγή στα συστήματα τρίτης γενιάς ως προς τις απαιτήσεις, τις υπηρεσίες που προσφέρουν, την προτυποποίηση και την αρχιτεκτονική τους. Στο δεύτερο κεφάλαιο μελετώνται οι τρόποι πολλαπλής πρόσβασης με ιδιαίτερη έμφαση στην προσπέλαση με διαίρεση κωδικών. Αναλύονται τα συστήματα διάχυσης φάσματος. Γίνεται εκτενής αναφορά και υλοποίηση προγραμμάτων για τις ψευδοτυχαίες ακολουθίες και τις ακολουθίες Gold. Στο τρίτο κεφάλαιο μελετάται η δομή δικτύων επικοινωνίας κατά το μοντέλο OSI. Αναφέρονται τα επίπεδα των τηλεπικοινωνιακών συστημάτων με διεξοδική μελέτη του φυσικού επιπέδου και στις διεπαφές που χρησιμοποιεί για επικοινωνία καθώς και στις υπηρεσίες που προσφέρει. Αναλύεται η δομή όλων των φυσικών καναλιών και εξομοιώνεται η διαδικασία ενθυλάκωσης του καναλιού PRACH. Στο τέταρτο κεφάλαιο αναλύονται οι κώδικες διάχυσης των φυσικών καναλιών ανερχόμενης ζεύξης καθώς και η διαδικασία διάχυσης τους. Δημιουργούνται προγράμματα που παράγουν αυτούς τους κώδικες και γίνεται εξομοίωση της διάχυσης και της αποδιάχυσης του PRACH καναλιού. Στο πέμπτο κεφάλαιο αναφέρεται η διαδικασία κωδικοποίησης πηγής και μελετάται η PSK διαμόρφωση και αποδιαμόρφωση που χρησιμοποιούν τα συστήματα τρίτης γενιάς. Υλοποιούνται προγράμματα που εξομοιώνουν τη συνολική διαδικασία σε ενθόρυβο κανάλι AWGN μελετώντας την επίδραση του θορύβου σε μεταδιδόμενο σήμα. Όλες οι εξομοιώσεις υλοποιήθηκαν με το πρόγραμμα Matlab 7.1. This master thesis is a part of the post-graduate course of the Physics department of the University of Patras, on Electronics and Computers. Its main objective is the study of the physical layer of 3rd generation telecommunication systems and the simulation of a particular channel, in accordance to 3GPP specifications. In the first chapter we review telecommunication systems of previous generations. We also refer to major problems that need to be dealt with and also the basic structure of cellular networks. 3rd generation telecommunication systems, their requirements, offered services, standardisation and architecture are all introduced. In the second chapter we study multiple access methods, emphasising CDMA methods. Moreover, spread spectrum systems are analysed. Finally we refer to pseudorandom and Gold sequences. Programs are created which generate these sequences. In the third chapter we look into the structure of communication networks according to the OSI model. The layers of telecommunication systems are mentioned, laying emphasis on the physical layer, the interfaces used for communication as well as the offered services. We report all physical channels and we simulate the encapsulation of the PRACH channel. In the fourth chapter we analyse the spreading and scrambling codes referring to the uplink channels. Next we point out the code allocation process. Programs are created which generate these spreading and scrambling codes and we finally simulate the spreading and de-spreading process of the PRACH channel. In the fifth chapter we outline the source coding process using PCM, and we study PSK modulation and demodulation which are used by 3rd generation telecommunication systems. We create programs that simulate the whole procedure in a noisy channel, and we study the effect of AWGN. The programs were created and the simulations were run using Matlab version 7.1.
- Published
- 2008
39. Joint DAMA-TCP protocol optimization through multiple cross layer interactions in DVB RCS scenario
- Author
-
Francesco Zampognaro, Fausto Vieira, T. Morell, and Michele Luglio
- Subjects
Optimization ,Adaptive coding ,NS2 ,Standards ,Band-width allocation ,Satellites ,Transmission Control Protocol ,Computer science ,Cross layering ,Weather conditions ,DVB-RCS ,Cross-layer ,Digital Video Broadcasting ,Programming theory ,Bandwidth Efficiency ,Channel conditions ,Telecommunication systems ,AC ,Cross-layer interactions ,DAMA ,NS2 network simulator ,Physical layers ,Propagation delays ,Return link ,Space communications ,TCP data ,TCP performances ,TCP protocols ,Variable delays ,Transmission control protocol ,Settore ING-INF/03 - Telecomunicazioni ,business.industry ,Spectral efficiency ,Propagation delay ,Demand Assigned Multiple Access ,Bandwidth allocation ,business ,Computer network ,Communication channel - Abstract
Two aspects of DVB-RCS standard can worsen performance of TCP data connections: DAMA access scheme, since it introduces additional and variable delay to the already significant propagation delay and the adoption of Adaptive Coding on the return link to maximize bandwidth efficiency to face variable weather conditions, because it results in variable bandwidth allocation. Both aspects can severely impact TCP performance, especially for what concerns flow adaptation to varying channel conditions and channel usage efficiency. To optimize performance, in this paper cross-layer signaling among transport, MAC and physical layers of a DVB-RCS system is addressed. In particular MAC-TCP cross-layer is analyzed through the use of NS2 network simulator, showing the possible benefit in a DVB-RCS scenario.
- Published
- 2007
- Full Text
- View/download PDF
40. Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks
- Author
-
L. De Nardis and M.-G. Di Benedetto
- Subjects
Scheme (programming language) ,business.industry ,Computer science ,Low data rate communications systems ,Physical layer ,Ranging ,Network topology ,Communications system ,Device functionalities ,Physical layers ,Wireless ,business ,Wireless sensor network ,computer ,IEEE 802.15 ,Computer network ,computer.programming_language - Abstract
The IEEE 802.15.4 standard provides a framework for low data rate communications systems, typically sensor networks. The 802.15.4a revision introduces new options for the physical layer, in order to support higher data rates and accurate ranging capability, enabling new applications based on information on distance and positions of the devices in the network. In this paper the differences among physical layers of 802.15.4 vs. 802.15.4a are briefly reviewed. Next, the MAC layer of 802.15.4 vs. 802.15.4a are reviewed and compared. Device functionalities, network topologies as well as access strategies in both standards are described, and the impact of the new physical layer features on MAC and higher layers are discussed, with particular attention to the ranging scheme adopted in the new revision of the standard.
- Published
- 2007
41. Time Diversity in Mobile DVB-T2 Systems
- Author
-
Universitat Politècnica de València. Instituto Universitario de Telecomunicación y Aplicaciones Multimedia - Institut Universitari de Telecomunicacions i Aplicacions Multimèdia, Universitat Politècnica de València. Escuela Técnica Superior de Ingenieros de Telecomunicación - Escola Tècnica Superior d'Enginyers de Telecomunicació, Gozálvez Serrano, David, Gómez Barquero, David, Vargas, D., Cardona Marcet, Narciso, Universitat Politècnica de València. Instituto Universitario de Telecomunicación y Aplicaciones Multimedia - Institut Universitari de Telecomunicacions i Aplicacions Multimèdia, Universitat Politècnica de València. Escuela Técnica Superior de Ingenieros de Telecomunicación - Escola Tècnica Superior d'Enginyers de Telecomunicació, Gozálvez Serrano, David, Gómez Barquero, David, Vargas, D., and Cardona Marcet, Narciso
- Abstract
DVB-T2 implements a very flexible time interleaving that allows multiple tradeoffs in terms of time diversity, latency and power saving. In this paper, we study in detail these tradeoffs in the context of mobile reception. Together with time diversity, we also investigate the impact of reduced time de-interleaving memory and Alamouti-based MISO in the mobile reception of DVB-T2 services. In addition, we propose the utilization of upper layer FEC protection in order to overcome the limitations of the DVB-T2 physical layer for the provision of long time interleaving, and enable fast zapping. The performance is evaluated by means of simulations in mobile channels that include the presence of fast fading and shadowing in the received signal. © 2010 IEEE.
- Published
- 2011
42. FPGA implementation of real-time Ethernet communication using RMII interface
- Author
-
Khalilzad, Nima Moghaddami, Yekeh, Farahnaz, Asplund, Lars, Pordel, M., Khalilzad, Nima Moghaddami, Yekeh, Farahnaz, Asplund, Lars, and Pordel, M.
- Abstract
FPGA-based solutions have become more common in embedded systems these days. These systems need to communicate with external world. Considering high-speed and popularity of Ethernet communication, a reliable real-time Ethernet component inside FPGA is of special value. To that end, this paper presents a new solution for 100 Mb/s FPGA-based Ethernet communications with timing analysis. The solution deals with "Reduced Media-Independent Interface" in its physical layer. UDP is the network protocol which is implemented from physical to transport layer. For getting used in real-time applications, timing analysis is done in the communication system. Component based software engineering is used in the design and development processes. In order to test the components inside FPGA, two different approaches are utilized. Signal measurement in combination with introduced windows based application contributes much in testing and validation phases.
- Published
- 2011
- Full Text
- View/download PDF
43. Optimization of high-definition video coding and hybrid fiber-wireless transmission in the 60 GHz band
- Author
-
Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions, European Commission, Ministerio de Ciencia e Innovación, Lebedev, A., Pham, T.T., Beltrán Ramírez, Marta, Yu, X., Ukhanova, A., Llorente Sáez, Roberto, Monroy, I.T., Forchhammer, S., Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions, European Commission, Ministerio de Ciencia e Innovación, Lebedev, A., Pham, T.T., Beltrán Ramírez, Marta, Yu, X., Ukhanova, A., Llorente Sáez, Roberto, Monroy, I.T., and Forchhammer, S.
- Abstract
This paper was published in OPTICS EXPRESS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OE.19.00B895. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under law, [EN] The paper addresses the problem of distribution of highdefinition video over fiber-wireless networks. The physical layer architecture with the low complexity envelope detection solution is investigated. We present both experimental studies and simulation of high quality high-definition compressed video transmission over 60 GHz fiberwireless link. Using advanced video coding we satisfy low complexity and low delay constraints, meanwhile preserving the superb video quality after significantly extended wireless distance. © 2011 Optical Society of America.
- Published
- 2011
44. A low delay multiple reader passive RFID system using orthogonal TH-PPM IR-UWB
- Author
-
Zhang, Zhi, Lu, Zhonghai, Pang, Zhibo, Chen, Qiang, Zheng, Li-Rong, Yan, Xiaolang, Zhang, Zhi, Lu, Zhonghai, Pang, Zhibo, Chen, Qiang, Zheng, Li-Rong, and Yan, Xiaolang
- Abstract
Current passive RFID systems face the challenges to locate mobile objects in real time in indoor environments, including the realization of low delay as well as effective cooperation among readers and accurate ranging ability in the physical layer. In order to overcome these challenges, this paper presents a low delay multi-reader passive RFID system using ultra high frequency (UHF) radio as the forward link from readers to tags and orthogonal time hopping pulse-position modulation (TH-PPM) impulse ultra-wideband radio (IR-UWB) over the dynamic framed slotted ALOHA algorithm as the backward link from tags to readers. The asymmetric radio links overlap parts of the forward and backward transmission and avoid reader-tag collisions. Readers cooperate via network synchronization by a server and a contention-based update strategy to acknowledge tags. An optimal system configured with 4 readers using 16 orthogonal TH sequences is suggested and operates 3 times faster than the theoretical potential of EPC Class-1 Generation-2 protocol with the listen-before-talk scheme., QC 20110121. QC 20160214
- Published
- 2010
- Full Text
- View/download PDF
45. Performance evaluation of OFDMA femtocells link-layers in uncontrolled deployments
- Author
-
Villa, Tania, Merz, R., Vidales, P., Villa, Tania, Merz, R., and Vidales, P.
- Abstract
The rapidly increasing use of smart phones with Internet access or data connectivity solutions for laptops is putting the infrastructure of cellular operators under stress. Both the number of devices and the bandwidth requirement are increasing. Indoor usage is also becoming prominent. One envisioned solution is the use of so-called femtocells. Femtocells are portable and low-cost base-stations for in-home usage. They are deployed by end-users and are connected to the operator network by a digital subscriber line (DSL), cable modem or optical fiber connection. The femtocells are operated along with the macrocell in a typical two-tier network structure. The regular base stations operate in one tier and the femtocells operate in the other tier. In a shared spectrum configuration, the uncontrolled deployment and loose control of the femtocells generate challenging interference management scenarios. With extensive simulations, we perform an evaluation of several femtocell to femtocell interference scenarios and one macrocell to femtocell scenario. We focus on typical 4G cases, with an orthogonal frequency-division multiple access (OFDMA) physical layer and full frequency reuse. Our results show that without any interference management, system performance is significantly degraded and that complete outages occur in specific cases., QC 20140821
- Published
- 2010
- Full Text
- View/download PDF
46. Duality-gap bounds for multi-carrier systems and their application to periodic scheduling
- Author
-
Wolkerstorfer, M., Statovci, D., Nordström, Tomas, Wolkerstorfer, M., Statovci, D., and Nordström, Tomas
- Abstract
We investigate a novel cross-layer optimization problem for jointly performing dynamic spectrum management (DSM) and periodic rate-scheduling in time. The large number of carriers used in digital subscriber lines (DSL) makes DSM a large-scale optimization problem for which dual optimization is a commonly used method. The duality-gap which potentially accompanies the dual optimization for non-convex problems is typically assumed to be small enough to be neglected. Also, previous theoretical results show a vanishing duality-gap as the number of subcarriers approaches infinity. We will bound the potential performance improvements that can be achieved by the additional rate-scheduling procedure. This bound is found to depend on the duality-gap in the physical layer DSM problem. Furthermore, we will derive bounds on the duality-gap of the two most important optimization problems in DSL, namely the maximization of the weighted sum-rate and the minimization of the weighted sum-power. These bounds are derived for a finite number of subcarriers and are also applicable to the respective problems in orthogonal frequency division multiplex (OFDM) systems. ©2010 IEEE.
- Published
- 2010
- Full Text
- View/download PDF
47. MAC protocol engine for sensor networks
- Author
-
Ergen, S. C., Di Marco, Piergiuseppe, Fischione, Carlo, Ergen, S. C., Di Marco, Piergiuseppe, and Fischione, Carlo
- Abstract
We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based on two steps: First the application specifications (such as network topology and packet generation rate), the requirements for energy consumption, delay and reliability, and the resource constraints from the underlying physical layer (such as energy consumption and data rate) are specified, and then the protocol that satisfies all these constraints is designed. Main drawback of this procedure is that we have to restart the design process for each possible application, which may be a waste of time and efforts. The goal of a MAC protocol engine is to provide a library of protocols together with their analysis such that for each new application the optimal protocol is chosen automatically among its library with optimal parameters. We illustrate the MAC engine idea by including an original analysis of IEEE 802.15.4 unslotted random access and Time Division Multiple Access (TDMA) protocols, and implementing these protocols in the software framework called SPINE, which runs on top of TinyOS and is designed for health care applications. Then we validate the analysis and demonstrate how the protocol engine chooses the optimal protocol under different application scenarios via an experimental implementation., QC 20110121
- Published
- 2009
- Full Text
- View/download PDF
48. Lightpath routing considering differentiated physical layer constraints in transparent WDM networks
- Author
-
Wosinska, Lena, Jirattigalachote, Amornrat, Monti, Paolo, Tzanakaki, A., Katrinis, K., Wosinska, Lena, Jirattigalachote, Amornrat, Monti, Paolo, Tzanakaki, A., and Katrinis, K.
- Abstract
Wavelength division multiplexing (WDM) technology is considered to be the ultimate answer to the rapidly growing capacity demand of next generation networks. Many routing and wavelength assignment (RWA) algorithms, proposed for lightpath provisioning, base their routing decisions on the availability of network resources, and assume that optical fibers and components are ideal. In reality, physical impairments degrade the quality of the optical signal propagating through fiber segments and optical components. To cope with this problem, Impairment Constraint Based Routing (ICBR) algorithms, that consider physical impairments during connection provisioning, are currently proposed to prevent selecting lightpaths with poor signal quality. However, these algorithms support only a single (highest) quality of transmission threshold, the same one for all connection requests. This does not fit well with the variety of services, with potentially disparate QoS requirements, that the next generation networks are expected to support. Consequently, the efficiency of network resource utilization is reduced. This paper demonstrates that a significant improvement, in terms of blocking probability, can be achieved when using an ICBR algorithm with differentiated physical layer constraints. Performance is compared with conventional impairment aware routing approaches when unprotected, shared path protected (SPP), and dedicated path protected (DPP) connection requests are considered. The achieved improvement is a result of more efficient resource utilization as unnecessary connection blocking can be avoided by selecting network resources offering optical signal quality that is "good enough" to satisfy a specific connection request., QC 20141021
- Published
- 2009
- Full Text
- View/download PDF
49. Impairment aware routing with service differentiation in heterogeneous WDM networks
- Author
-
Jirattigalachote, Amornrat, Wosinska, Lena, Monti, Paolo, Katrinis, Kostas, Tzanakaki, A., Jirattigalachote, Amornrat, Wosinska, Lena, Monti, Paolo, Katrinis, Kostas, and Tzanakaki, A.
- Abstract
In transparent Wavelength Division Multiplexing (WDM) networks, the signal is transported from source to destination in the optical domain through all-optical channels, or lightpaths. A lightpath may traverse several fiber segments and optical components that in general degrade the optical signal. This effect introduces the need for considering physical layer impairments during the connection-provisioning phase. Physical layer impairments can be divided into linear and non-linear. Both types of impairments are highly dependent on the fiber characteristics, which in turn are sensitive to length, temperature and age. A close look at the fiber infrastructure of today's network operators reveals a situation where old and newly deployed fibers coexist in the network. This heterogeneous fiber plant presents a challenge. A tradeoff should be found between the QoS requirements of connection requests and the use of the available (old and new) network resources. This calls for a provisioning mechanism able to adapt to the various fiber composition scenarios. In parallel, given the need for service differentiation, the authors recently proposed an Impairment Constraint Based Routing (ICBR) algorithm, referred to as ICBR-Diff, supporting differentiation of services at the BER (Bit Error Rate) level in a network with a homogeneous fiber infrastructure. In this paper the ICBR-Diff algorithm is extended to heterogeneous network; particularly, it is evaluated in WDM networks with fiber links having varying Polarization Mode Dispersion characteristics, i.e., with old and new fiber coexisting. Simulation results show that the ICBR-Diff algorithm exhibits high adaptability in a heterogeneous fiber composition scenario. This translates into improved performance in terms of blocking probability, when compared to traditional impairment aware routing algorithms., QC 20141014
- Published
- 2009
- Full Text
- View/download PDF
50. Delay-Constrained Scheduling for Interference-Limited Multi-Carrier Systems
- Author
-
Wolkerstorfer, M., Nordström, Tomas, Statovci, D., Wolkerstorfer, M., Nordström, Tomas, and Statovci, D.
- Abstract
The reduction of energy consumption in digital subscriber line (DSL) networks has obtained considerable attention recently. Today's DSL is designed under an "always on" principle to keep the crosstalk noise as stable as possible. Departuring from this restriction, one approach to achieve energy savings is by "lazy scheduling" which exploits the tradeoff between energy-consumption and transmission delay inherent in many communication systems. This work extends the scope of this idea to multi-user interference limited systems employing multi-carrier modulation. Mathematical decomposition appears to be a natural approach for cross-layer optimization when the physical-layer spectrum management algorithm is already based on dual relaxation. We identify Benders decomposition as the appropriate choice of an optimization scheme for rate and delay constrained energy-minimization. Based on this we propose a cross-layer scheduler for multi-user/multi-carrier systems. By simulations of a single-hop, multi-user DSL scenario this scheduler is shown to closely approximate the optimal solution to this nonconvex problem. Furthermore, by example we demonstrate that scheduling for interference avoidance in DSL yields negligible additional performance gains over sole physical layer spectrum balancing in practice. ©2009 IEEE.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.