Week 9 Spread Spectrum 9 Susmini I
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Strong Signal Cancellation to Enhance Processing Of
Europäisches Patentamt *EP001238485B1* (19) European Patent Office Office européen des brevets (11) EP 1 238 485 B1 (12) EUROPEAN PATENT SPECIFICATION (45) Date of publication and mention (51) Int Cl.7: H04J 13/04, G01S 3/16, of the grant of the patent: G01S 13/00, H04B 1/707 28.09.2005 Bulletin 2005/39 (86) International application number: (21) Application number: 00992803.7 PCT/US2000/042171 (22) Date of filing: 14.11.2000 (87) International publication number: WO 2001/047171 (28.06.2001 Gazette 2001/26) (54) STRONG SIGNAL CANCELLATION TO ENHANCE PROCESSING OF WEAK SPREAD SPECTRUM SIGNAL STARKE SIGNALUNTERDRÜCKUNG UM DIE VERARBEITUNG VON SCHWACHEN SPREIZSPEKTRUMSIGNALEN ZU VERBESSERN ANNULATION DE SIGNAL FORT DANS LE BUT D’AMELIORER LE TRAITEMENT D’UN SIGNAL FAIBLE A SPECTRE ETALE (84) Designated Contracting States: (74) Representative: Kramer - Barske - Schmidtchen AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU European Patent Attorneys MC NL PT SE TR Patenta Radeckestrasse 43 (30) Priority: 14.12.1999 US 461123 81245 München (DE) (43) Date of publication of application: (56) References cited: 11.09.2002 Bulletin 2002/37 WO-A-98/18210 US-A- 4 701 934 US-A- 5 493 588 US-A- 5 604 503 (73) Proprietor: Sirf Technology, Inc. San Jose, CA 95112 (US) • SUST M K ET AL: "Code and frequency acquisition for fully digital CDMA-VSATs" (72) Inventors: COUNTDOWN TO THE NEW MILENNIUM. • NORMAN, Charles, P. PHOENIX, DEC. 2 - 5, 1991, PROCEEDINGS OF Huntington Beach, CA 92647 (US) THE GLOBAL TELECOMMUNICATIONS • CAHN, Charles, R. CONFERENCE. (GLOBECOM), NEW YORK, Manhattan Beach, CA 90266 (US) IEEE, US, vol. -
Spread Spectrum and Wi-Fi Basics Syed Masud Mahmud, Ph.D
Spread Spectrum and Wi-Fi Basics Syed Masud Mahmud, Ph.D. Electrical and Computer Engineering Dept. Wayne State University Detroit MI 48202 Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 1 Spread Spectrum Spread Spectrum techniques are used to deliberately spread the frequency domain of a signal from its narrow band domain. These techniques are used for a variety of reasons such as: establishment of secure communications, increasing resistance to natural interference and jamming Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 2 Spread Spectrum Techniques Frequency Hopping Spread Spectrum (FHSS) Direct -Sequence Spread Spectrum (DSSS) Orthogonal Frequency-Division Multiplexing (OFDM) Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 3 The FHSS Technology FHSS is a method of transmitting signals by rapidly switching channels, using a pseudorandom sequence known to both the transmitter and receiver. FHSS offers three main advantages over a fixed- frequency transmission: Resistant to narrowband interference. Difficult to intercept. An eavesdropper would only be able to intercept the transmission if they knew the pseudorandom sequence. Can share a frequency band with many types of conventional transmissions with minimal interference. Spread Spectrum and Wi-Fi Basics by Syed M. Mahmud 4 The FHSS Technology If the hop sequence of two transmitters are different and never transmit the same frequency at the same time, then there will be no interference among them. A hopping code determines the frequencies the radio will transmit and in which order. A set of hopping codes that never use the same frequencies at the same time are considered orthogonal . -
A Software-Defined Receiver Architecture for Cellular CDMA
A Software-Defined Receiver Architecture for Cellular CDMA-Based Navigation Joe Khalife, Kimia Shamaei, and Zaher M. Kassas Department of Electrical and Computer Engineering University of California, Riverside [email protected], [email protected], [email protected] { } Abstract—A detailed software-defined receiver (SDR) architec- and need to be estimated. Although, the IS-95 standard states ture for navigation using cellular code division multiple access that a CDMA BTS should transmit its position, local wireless (CDMA) signals is presented. The cellular forward-link signal providers do not usually transmit such information [16], [17]. structure is described and models for the transmitted and received signals are developed. Particular attention is paid to Hence, the position of the BTSs need to be manually surveyed relevant information that could be extracted and subsequently or estimated on-the-fly individually or collaboratively [18], exploited for navigation and timing purposes. The differences [19]. Nevertheless, while the position states of a BTS are between a typical GPS receiver and the proposed cellular CDMA static, the clock error states of the BTS are dynamic and receiver are highlighted. Moreover, a framework that is based on need to be continuously estimated via (1) a mapping receiver, a mapping/navigating receiver scheme for navigation in a cellular CDMA environment is studied. The position and timing errors which shares such estimates with the navigating receiver or (2) arising due to estimating the base transceiver station clock biases by the navigating receiver itself by adopting a simultaneous in different cell sectors are also analyzed. Experimental results localization and mapping approach [20], [21], [22]. -
F. Circuit Switching
CSE 3461: Introduction to Computer Networking and Internet Technologies Circuit Switching Presentation F Study: 10.1, 10.2, 8 .1, 8.2 (without SONET/SDH), 8.4 10-02-2012 A Closer Look At Network Structure: • network edge: applications and hosts • network core: —routers —network of networks • access networks, physical media: communication links d. xuan 2 1 The Network Core • mesh of interconnected routers • the fundamental question: how is data transferred through net? —circuit switching: dedicated circuit per call: telephone net —packet-switching: data sent thru net in discrete “chunks” d. xuan 3 Network Layer Functions • transport packet from sending to receiving hosts application transport • network layer protocols in network data link network physical every host, router network data link network data link physical data link three important functions: physical physical network data link • path determination: route physical network data link taken by packets from source physical to dest. Routing algorithms network network data link • switching: move packets from data link physical physical router’s input to appropriate network data link application router output physical transport network data link • call setup: some network physical architectures require router call setup along path before data flows d. xuan 4 2 Network Core: Circuit Switching End-end resources reserved for “call” • link bandwidth, switch capacity • dedicated resources: no sharing • circuit-like (guaranteed) performance • call setup required d. xuan 5 Circuit Switching • Dedicated communication path between two stations • Three phases — Establish (set up connection) — Data Transfer — Disconnect • Must have switching capacity and channel capacity to establish connection • Must have intelligence to work out routing • Inefficient — Channel capacity dedicated for duration of connection — If no data, capacity wasted • Set up (connection) takes time • Once connected, transfer is transparent • Developed for voice traffic (phone) g. -
On Cracking Direct-Sequence Spread-Spectrum Systems †
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–15 (2008) Published online in Wiley InterScience (www.interscience.wiley.com) DOI: 10.1002/wcm.0000 On Cracking Direct-Sequence Spread-Spectrum Systems y Youngho Jo and Dapeng Wu¤ Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, 32611, U.S.A. Summary Secure transmission of information over hostile wireless environments is desired by both military and civilian parties. Direct-sequence spread spectrum (DS-SS) is such a covert technique resistant to interference, interception and multipath fading. Identifying spread-spectrum signals or cracking DS-SS systems by an unintended receiver (or eavesdropper) without a priori knowledge is a challenging problem. To address this problem, we first search for the start position of data symbols in the spread signal (for symbol synchronization); our method is based on maximizing the spectral norm of a sample covariance matrix, which achieves smaller estimation error than the existing method of maximizing the Frobenius norm. After synchronization, we remove a spread sequence by a cross-correlation based method, and identify the spread sequence by a matched filter. The proposed identification method is less expensive and more accurate than the existing methods. We also propose a zigzag searching method to identify a generator polynomial that reduces memory requirement and is capable of correcting polarity errors existing in the previous methods. In addition, we analyze the bit error performance of our proposed method. The simulation results agree well with our analytical results, indicating the accuracy of our analysis in additive white Gaussian noise (AWGN) channel. -
2016 GNSS User Technology Report
USER TECHNOLOGY REPORT ISSUE 1 2016 Issue 1 More information on the European Union is available on the Internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN 978-92-9206-029-9 doi: 10.2878/760803 Copyright © European GNSS Agency, 2016 Information contained in the document may be excerpted, copied, printed and provided to third parties only under the condition that the source and copyright owner is clearly stated as follows: “Source: GNSS User Technology Report, Issue 1, copyright © European GNSS Agency, 2016”. For reproduction or use of photos and any other artistic material, permission must be sought directly from the copyright holder. The designations employed, the presentation of the materials and the views expressed by authors, editors, or expert groups do not necessarily represent the opinions, decisions or the stated policy of neither GSA nor the European Commission. The mention of specific companies or of certain manufacturers’ products does not imply that they are endorsed or recommended by the GSA in preference to others of a similar nature that are not mentioned. Errors and omissions excepted, the names of proprietary products and copyright holders are distinguished by initial capital letters. The present document is being distributed without warranty of any kind, either express or implied in relation to its content and/or use. In no event shall the GSA be liable for damages arising from the content and use of the present document. This document and the information contained in it is subject to applicable copyright and other intellectual property rights under the laws of the Czech Republic and other states. -
POLITECNICO DI TORINO Repository ISTITUZIONALE
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by PORTO@iris (Publications Open Repository TOrino - Politecnico di Torino) POLITECNICO DI TORINO Repository ISTITUZIONALE Sensitivity Analysis of a Neural Network based Avionic System by Simulated Fault and Noise Injection Original Sensitivity Analysis of a Neural Network based Avionic System by Simulated Fault and Noise Injection / Brandl, Alberto; Battipede, Manuela; Gili, Piero; Lerro, Angelo. - ELETTRONICO. - (2018), pp. 1-19. ((Intervento presentato al convegno AIAA SciTech Forum tenutosi a Kissimmee, Florida, USA nel 8-12 January 2018. Availability: This version is available at: 11583/2699969 since: 2019-03-11T19:00:55Z Publisher: AIAA Published DOI:10.2514/6.2018-0122 Terms of use: openAccess This article is made available under terms and conditions as specified in the corresponding bibliographic description in the repository Publisher copyright default_conf_editorial - (Article begins on next page) 04 August 2020 Sensitivity Analysis of a Neural Network based Avionic System by Simulated Fault and Noise Injection Alberto Brandl∗ Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129, Turin, Italy Manuela Battipede† Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129, Turin, Italy Piero Gili‡ Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129, Turin, Italy Angelo Lerro§ AeroSmart s.r.l., Caserta, Italy The application of virtual sensor is widely discussed in literature as a cost effective solution compared to classical physical architectures. RAMS (Reliability, Availability, Maintainabil- ity and Safety) performance of the entire avionic system seem to be greatly improved using analytical redundancy. However, commercial applications are still uncommon. A complete analysis of the behavior of these models must be conducted before implementing them as an effective alternative for aircraft sensors. -
Avoiding Interference in the 2
Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor As more and more companies produce products that use the 2.4-GHz portion of the radio spectrum, designers have had to deal with increased signals from other sources. Regulations governing unlicensed parts of the spectrum state that your device must expect interference. How can designers get the best performance out of their 2.4-GHz solution under these hostile conditions? Often the product works in a controlled lab environment but then suffers performance degradation from the storm of interference from other 2.4GHz solutions in the field. With existing standards like Wi-Fi, Bluetooth, and ZigBee there is little that can be done beyond what the architects of the standard provide. But when the designer controls the protocol there are procedures that will minimize the interference from other sources. In this article,we'll examine the various interference management techniques provided by 2.4 GHz wireless systems. We'll then show how low-level tools can be used to create frequency-stability in a 2.4 GHz design. Wi-Fi The two methods for radio frequency modulation in the unlicensed 2.4 GHz ISM band are frequency-hopping spread spectrum (FHSS) and direct-sequence spread spectrum (DSSS). Bluetooth uses FHSS while WirelessUSB, 802.11b/g/a (commonly known as Wi-Fi), and 802.15.4 (known as ZigBee when combined with the upper networking layers) use DSSS. -
Pseudorandom Noise Code-Based Technique for Cloud and Aerosol Discrimination Applications
Pseudorandom noise code-based technique for cloud and aerosol discrimination applications Joel Campbell, Narasimha S. Prasad, Michael Flood, Wallace Harrison NASA Langley Research Center, 5 N. Dryden St., Hampton, VA 23681 Abstract NASA Langley Research Center is working on a continuous wave (CW) laser based remote sensing scheme for the detection of CO2 and O2 from space based platforms suitable for ACTIVE SENSING OF CO2 EMISSIONS OVER NIGHTS, DAYS, AND SEASONS (ASCENDS) mission. ASCENDS is a future space-based mission to determine the global distribution of sources and sinks of atmospheric carbon dioxide (CO2). A unique, multi-frequency, intensity modulated CW (IMCW) laser absorption spectrometer (LAS) operating at 1.57 micron for CO2 sensing has been developed. Effective aerosol and cloud discrimination techniques are being investigated in order to determine concentration values with accuracies less than 0.3%. In this paper, we discuss the demonstration of a PN code based technique for cloud and aerosol discrimination applications. The possibility of using maximum length (ML)-sequences for range and absorption measurements is investigated. A simple model for accomplishing this objective is formulated, Proof-of-concept experiments carried out using SONAR based LIDAR simulator that was built using simple audio hardware provided promising results for extension into optical wavelengths. Keywords: ASCENDS, CO2 sensing, O2 sensing, PN codes, CW lidar 1. INTRODUCTION The National Research Council’s (NRC) Decadal Survey (DS) of Earth Science and Applications from Space has identified the Active Sensing of CO2 Emissions over Nights, Days, and Seasons (ASCENDS) as an important Tier II space-based atmospheric science mission. The CO2 mixing ratio needs to be measured to a precision of 0.5 percent of background or better (slightly less than 2 ppm) at 100-km horizontal resolution overland and 200-km resolution over oceans. -
MIMO Technology in Wifi Systems
MIMO in WiFi Systems Rohit U. Nabar Smart Antenna Workshop Aug. 1, 2014 WiFi • Local area wireless technology that allows communication with the internet using 2.4 GHz or 5 GHz radio waves per IEEE 802.11 • Proliferation in the number of devices that use WiFi today: smartphones, tablets, digital cameras, video-game consoles, TVs, etc • Devices connect to the internet via wireless network access point (AP) Advantages • Allows convenient setup of local area networks without cabling – rapid network connection and expansion • Deployed in unlicensed spectrum – no regulatory approval required for individual deployment • Significant competition between vendors has driven costs lower • WiFi governed by a set of global standards (IEEE 802.11) – hardware compatible across geographical regions WiFi IC Shipment Growth 1.25x 15x Cumulative WiFi Devices in Use Data by Local Access The IEEE 802.11 Standards Family Standard Year Ratified Frequency Modulation Channel Max. Data Band Bandwidth Rate 802.11b 1999 2.4 GHz DSSS 22MHz 11 Mbps 802.11a 1999 5 GHz OFDM 20 MHz 54 Mbps 802.11g 2003 2.4 GHz OFDM 20 MHz 54 Mbps 802.11n 2009 2.4/5 GHz MIMO- 20,40 MHz 600 Mbps OFDM 802.11ac 2013 5 GHz MIMO- 20, 40, 80, 6.93 Gbps OFDM 160 MHz 802.11a/ac PHY Comparison 802.11a 802.11ac Modulation OFDM MIMO-OFDM Subcarrier spacing 312.5 KHz 312.5 KHz Symbol Duration 4 us (800 ns guard interval) 3.6 us (400 ns guard interval) FFT size 64 64(20 MHz)/512 (160 MHz) FEC BCC BCC or LDPC Coding rates 1/2, 2/3, 3/4 1/2, 2/3, 3/4, 5/6 QAM BPSK, QPSK, 16-,64-QAM BPSK, QPSK, 16-,64-,256- QAM Factors Driving the Data Rate Increase 6.93 Gbps QAM 802.11ac (1.3x) FEC rate (1.1x) MIMO (8x) 802.11a Bandwidth (8x) 54 Mbps 802.11 Medium Access Control (MAC) Contention MEDIUM BUSY DIFS PACKET Window • Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) • A wireless node that wants to transmit performs the following sequence 1. -
Multiple Access Techniques for 4G Mobile Wireless Networks Dr Rupesh Singh, Associate Professor & HOD ECE, HMRITM, New Delhi
International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 5, Issue 11 (February 2013), PP. 86-94 Multiple Access Techniques For 4G Mobile Wireless Networks Dr Rupesh Singh, Associate Professor & HOD ECE, HMRITM, New Delhi Abstract:- A number of new technologies are being integrated by the telecommunications industry as it prepares for the next generation mobile services. One of the key changes incorporated in the multiple channel access techniques is the choice of Orthogonal Frequency Division Multiple Access (OFDMA) for the air interface. This paper presents a survey of various multiple channel access schemes for 4G networks and explains the importance of these schemes for the improvement of spectral efficiencies of digital radio links. The paper also discusses about the use of Multiple Input/Multiple Output (MIMO) techniques to improve signal reception and to combat the effects of multipath fading. A comparative performance analysis of different multiple access schemes such as Time Division Multiple Access (TDMA), FDMA, Code Division Multiple Access (CDMA) & Orthogonal Frequency Division Multiple Access (OFDMA) is made vis-à-vis design parameters to highlight the advantages and limitations of these schemes. Finally simulation results of implementing some access schemes in MATLAB are provided. I. INTRODUCTION 4G (also known as Beyond 3G), an abbreviation of Fourth-Generation, is used for describing the next complete evolution in wireless communications. A 4G system will be a complete replacement for current networks and will be able to provide a comprehensive and secure IP solution. Here, voice, data, and streamed multimedia can be given to users on an "Anytime, Anywhere" basis, and at much higher data rates than the previous generations [1], [2], [3]. -
Multiplexing and Sampling Theory
Multiplexing and Sampling Theory THE ECONOMY OF MULTIPLEXING contact type determine its current carrying capacity. For instance, laboratory instrument relays typically switch Sampled-Data Systems up to 3A, while industrial applications use larger relays An ideal data acquisition system uses a single ADC for to switch higher currents, often 5 to 10A. each measurement channel. In this way, all data are captured in parallel and events in each channel can be Solid-state switches, on the other hand, are much faster compared in real time. But using a multiplexer, Figure than relays and can reach sampling rates of several MHz. 3.01, that switches among the inputs of multiple chan- However, these devices can’t handle inputs higher than nels and drives a single ADC can substantially reduce 25V, and they are not well suited for isolated applica- the cost of a system. This approach is used in so-called tions. Moreover, solid-state devices are typically limited sampled-data systems. The higher the sample rate, the to handling currents of only one mA or less. closer the system mimics the ideal data acquisition system. But only a few specialized data acquisition Another characteristic that varies between mechani- systems require sample rates of extraordinary speed. cal relays and solid-state switches is called ON resis- Most applications can cope with the more modest tance. An ideal mechanical switch or relay contact sample rates typically offered by mainstream data pair has zero ON resistance. But real devices such acquisition systems. as common reed-relay contacts are 0.010 W or less, a quality analog switch can be 10 to 100 W, and an Solid State Switches vs.