GNU Radio with Fpgas Made Easy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier †
sensors Article Ultra-Low-Power Wide Range Backscatter Communication Using Cellular Generated Carrier † Muhammad Usman Sheikh * , Boxuan Xie , Kalle Ruttik , Hüseyin Yi˘gitler , Riku Jäntti and Jyri Hämäläinen Department of Communications and Networking, Aalto University, 02150 Espoo, Finland; boxuan.xie@aalto.fi (B.X.); kalle.ruttik@aalto.fi (K.R.); huseyin.yigitler@aalto.fi (H.Y.); riku.jantti@aalto.fi (R.J.); jyri.hamalainen@aalto.fi (J.H.) * Correspondence: muhammad.sheikh@aalto.fi † This paper is an extended version of our conference paper: Sheikh, M.U., Jameel, F., Yi˘gitler, H., Wang, X., Jäntti, R. “Monostatic Backscatter Communication in Urban Microcellular Environment Using Cellular Networks.” In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020. Abstract: With the popularization of Internet-of-things (IoT) and wireless communication systems, a diverse set of applications in smart cities are emerging to improve the city-life. These applications usually require a large coverage area and minimal operation and maintenance cost. To this end, the recently emerging backscatter communication (BC) is gaining interest in both industry and academia as a new communication paradigm that provides high energy efficient communications that may even work in a battery-less mode and, thus, it is well suited for smart city applications. However, the coverage of BC in urban area deployments is not available, and the feasibility of its utilization for smart city applications is not known. In this article, we present a comprehensive coverage study of a Citation: Sheikh, M.U.; Xie, B.; practical cellular carrier-based BC system for indoor and outdoor scenarios in a downtown area of a Ruttik, K.; Yi˘gitler, H.; Jäntti, R.; Helsinki city. -
Jamming Attacks and Anti-Jamming Strategies in Wireless Networks
1 Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey Hossein Pirayesh and Huacheng Zeng Department of Computer Science and Engineering, Michigan State University, East Lansing, MI USA Abstract—Wireless networks are a key component of the will become ubiquitously available for massive devices to telecommunications infrastructure in our society, and wireless realize the vision of Internet of Everything (IoE) in the near services become increasingly important as the applications of future [18]. wireless devices have penetrated every aspect of our lives. Although wireless technologies have significantly advanced in As we are increasingly reliant on wireless services, security the past decades, most wireless networks are still vulnerable to threats have become a big concern about the confidentiality, radio jamming attacks due to the openness nature of wireless integrity, and availability of wireless communications. Com- channels, and the progress in the design of jamming-resistant pared to other security threats such as eavesdropping and wireless networking systems remains limited. This stagnation can data fabrication, wireless networks are particularly vulnerable be attributed to the lack of practical physical-layer wireless tech- nologies that can efficiently decode data packets in the presence to radio jamming attacks for the following reasons. First, of jamming attacks. This article surveys existing jamming attacks jamming attacks are easy to launch. With the advances in and anti-jamming strategies in wireless local area networks software-defined radio, one can easily program a small $10 (WLANs), cellular networks, cognitive radio networks (CRNs), USB dongle device to a jammer that covers 20 MHz bandwidth ZigBee networks, Bluetooth networks, vehicular networks, LoRa below 6 GHz and up to 100 mW transmission power [34]. -
Bottle Documentation Release 0.12.19
Bottle Documentation Release 0.12.19 Marcel Hellkamp Sep 24, 2021 Contents 1 User’s Guide 3 1.1 Tutorial..................................................3 1.2 Configuration (DRAFT)......................................... 23 1.3 Request Routing............................................. 26 1.4 SimpleTemplate Engine......................................... 28 1.5 API Reference.............................................. 32 1.6 List of available Plugins......................................... 45 2 Knowledge Base 49 2.1 Tutorial: Todo-List Application..................................... 49 2.2 Primer to Asynchronous Applications.................................. 64 2.3 Recipes.................................................. 67 2.4 Frequently Asked Questions....................................... 71 3 Development and Contribution 73 3.1 Release Notes and Changelog...................................... 73 3.2 Contributors............................................... 76 3.3 Developer Notes............................................. 78 3.4 Plugin Development Guide....................................... 82 4 License 89 Python Module Index 91 Index 93 i ii Bottle Documentation, Release 0.12.19 Bottle is a fast, simple and lightweight WSGI micro web-framework for Python. It is distributed as a single file module and has no dependencies other than the Python Standard Library. • Routing: Requests to function-call mapping with support for clean and dynamic URLs. • Templates: Fast and pythonic built-in template engine and support for mako, -
An Efficient Scheme in IEEE 802.22 WRAN for Real Time and Non-Real Time
Master’s Thesis Electrical Engineering November 2012 An Efficient Scheme in IEEE 802.22 WRAN for Real time and Non-Real time Traffic Delay This thesis is presented as part of the Degree for Masters of Science in Electrical Engineering Nawfal AlZubaidi R-Smith Khaled Humood Blekinge Institute of Technology November 2012 School of Engineering Blekinge Institute of Technology Supervisor: (Doktorand) Maria Erman Examiner: Karlskrona, Sweden i “The Significant Problems We Face Cannot Be Solved At The Same Level Of Thinking We Were At When We Created Them.” Albert Einstein i ABSTRACT Cognitive radio network has emerged as a prevailing technique and an exciting and promising technology which has the potential of dealing with the inflexible prerequisites and the inadequacy of the radio spectrum usage. In cognitive radios, in-band sensing is fundamental for the protection of the licensed spectrum users, enabling secondary users to vacate channels immediately upon detection of primary users. This channel sensing scheme directly affects the quality-of-service of cognitive radio user and licensed user especially with the undesirable delay induced into the system. In this thesis, a combination of different delay reduction schemes from different papers has been introduced, the first paper [47] argues about performing fine sensing for non-real time traffic, while real time traffic continues transmission in the channel. The second paper [46] argues about performing fine sensing after multiple alarms that have been triggered. Both schemes have combined with applying data rate reservation as well in order to reduce as much as possible this crucial factor of delay for IEEE 802.22 wireless regional area network and to improve the channel utilization. -
Long-Term Spectral Occupancy Findings in Chicago
2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) Long-term Spectral Occupancy Findings in Chicago Tanim M. Taher, Roger B. Bacchus, Kenneth J. Zdunek Dennis A. Roberson, Department of Electrical and Computer Engineering Department of Computer Science Illinois Institute of Technology, Chicago, IL Illinois Institute of Technology, Chicago, IL. Abstract—This paper summarizes some of the results of mea- common; in other bands, observations indicate a much lower surements and related analysis efforts at the Illinois Institute of usage level [BAC08]. Technology (IIT) Spectrum Observatory in Chicago over the past Wireless occupancy studies that map how radio spectrum is three years. The results are unique in the sense that the spectral occupancy estimates are based on multiple years of observations, utilized in different bands are useful for planning purposes and whereas previous studies produced occupancy numbers based on developing new regulations to support and sustain the growth short term snapshot measurements, often of a few hours duration and value of radio related technologies and applications. or at most spanning a few days or weeks. The measurements are Spectrum also has a high economic value [KEL08]. The results also presented in a novel way: the occupancy data in a band of of spectral occupancy studies are useful for making decisions interest during a one year span is graphed as a 2-dimensional image that visually reveals daily, weekly, and yearly trends and on the reallocation of spectrum and/or valuation estimation. anomalies. The main objective of this paper is to present year Several short duration studies [ROB06, MCH05, ISL08] have by year first-order statistics about the spectral occupancy across audited spectrum occupancy in the past, but long term studies multiple bands, but more details are presented about radio usage are needed to track trends to develop a comprehensive picture in a few bands like the TV band. -
An Autonomous Channel Selection Algorithm for Wlans
Technological University Dublin ARROW@TU Dublin Doctoral Engineering 2013-11 An Autonomous Channel Selection Algorithm for WLANs Fuhu Deng Technological University Dublin, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engdoc Part of the Digital Communications and Networking Commons Recommended Citation Fuhu, D. (2013) An Autonomous Channel Selection Algorithm for WLANs. Doctoral Thesis, Technological University Dublin. doi:10.21427/D73S4K This Theses, Ph.D is brought to you for free and open access by the Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Doctoral by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Funder: China Scholarship Council Dublin Institute of Technology ARROW@DIT Articles Communications Network Research Institute 2014-02-12 An autonomous channel selection algorithm for WLANs Fuhu Deng Follow this and additional works at: http://arrow.dit.ie/commart Part of the Digital Communications and Networking Commons This Theses, Ph.D is brought to you for free and open access by the Communications Network Research Institute at ARROW@DIT. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@DIT. For more information, please contact [email protected], [email protected]. An Autonomous Channel Selection Algorithm for Wireless LANs By Fuhu Deng B. Eng., M. Eng. A thesis submitted to the Dublin Institute of Technology for the degree of Doctor of Philosophy Supervisor: Dr. -
Cobbler Documentation Release 3.0.1
Cobbler Documentation Release 3.0.1 Enno Gotthold May 27, 2020 Contents 1 Quickstart 3 1.1 Preparing your OS..........................................3 1.2 Changing settings..........................................3 1.3 DHCP management and DHCP server template...........................4 1.4 Notes on files and directories....................................5 1.5 Starting and enabling the Cobbler service..............................5 1.6 Checking for problems and your first sync..............................5 1.7 Importing your first distribution...................................6 2 Install Guide 9 2.1 Prerequisites.............................................9 2.2 Installation.............................................. 10 2.3 RPM................................................. 10 2.4 DEB................................................. 11 2.5 Relocating your installation..................................... 12 3 Cobbler CLI 13 3.1 General Principles.......................................... 13 3.2 CLI-Commands........................................... 14 3.3 EXIT_STATUS............................................ 24 3.4 Additional Help........................................... 24 4 Cobblerd 25 4.1 Preamble............................................... 25 4.2 Description.............................................. 25 4.3 Setup................................................. 26 4.4 Autoinstallation (Autoyast/Kickstart)................................ 26 4.5 Options................................................ 26 5 Cobbler Configuration -
Cobbler Documentation Release 2.8.5
Cobbler Documentation Release 2.8.5 Jörgen Maas Nov 19, 2020 Contents 1 About 3 1.1 Release Notes.........................................3 1.2 Distribution Support......................................5 1.3 Distribution Notes.......................................7 1.4 How We Model Things..................................... 13 2 Installation 15 2.1 Prerequisites.......................................... 15 2.2 Installing from packages.................................... 16 2.3 Installing from Source..................................... 18 2.4 Configuration Files....................................... 20 2.5 Relocating your installation.................................. 21 3 General 23 3.1 Cobbler Primitives....................................... 23 3.2 Cobbler Direct Commands................................... 54 3.3 Cobbler Settings........................................ 69 3.4 Managing Services with Cobbler............................... 90 3.5 Kickstart Templating...................................... 94 3.6 Snippets............................................ 102 3.7 Package Management and Mirroring............................. 112 3.8 File System Information.................................... 114 4 Advanced 119 4.1 Advanced Networking..................................... 119 4.2 SELinux............................................ 122 4.3 Configuration Management.................................. 123 4.4 Extending cobbler....................................... 131 4.5 Power Management...................................... 135 4.6 -
Technical Notes All Changes in Fedora 13
Fedora 13 Technical Notes All changes in Fedora 13 Edited by The Fedora Docs Team Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. All other trademarks are the property of their respective owners. Abstract This document lists all changed packages between Fedora 12 and Fedora 13. -
Paving the Path to Three Tier Spectrum Sharing
PAVING THE PATH TO THREE TIER SPECTRUM SHARING Manuel Uhm Chair of the Board of Directors, Wireless Innovation Forum Director of Marketing, National Instruments DySPAN 2017 Copyright © 2015 Software Defined Radio Forum, Inc. All Rights Reserved5 Ettus Research Overview • Leader in Software Defined Radio (SDR) and Signals Intelligence (SI) • Maker of Universal Software Radio Peripheral (USRP™) – more than 40,000 units shipped • Enables rapid development and deployment of SDR and cognitive radio systems • Supported by a strong software ecosystem, including National Instruments LabVIEW, GNURadio (open source, C++), MATLAB/Simulink by the MathWorks®, Xilinx® Vivado and Vivado HLS, VHDL and Verilog • DC-6 GHz, MIMO capability, Embedded, USB/GigE • Wireless Innovation Forum – 2010 Technology of the Year • Wireless Innovation Forum – 2014 International Achievement Award • About The Company • Founded in 2004 • Located in Santa Clara, CA – Silicon Valley • Acquired by National Instruments in 2010 Why Share Spectrum? • We have a spectrum efficiency problem, not a spectrum scarcity problem! • A key to maximizing the usage and value of RF spectrum • Starting to gain significant momentum worldwide • Used to lack a clear model on how to define and set up a system to enable spectrum sharing…that has now changed! • The FCC in the US has unanimously approved creation of the Citizens Broadband Radio Service (CBRS) which is now defining such a model • 150MHz band suitable for wireless broadband • Three tiers of shared use • The Wireless Innovation Forum (WINNF) is serving as the multistakeholder group to define the industry standards and procedures for coordinating use of the CBRS Copyright © 2017 Software Defined Radio Forum, Inc. -
The Apprentice's Notes Jurjen Bokma the Apprentice's Notes Jurjen Bokma
The Apprentice's Notes Jurjen Bokma The Apprentice's Notes Jurjen Bokma Table of Contents Introduction ...............................................................................................................x I. 2007 ......................................................................................................................1 1. June 2007 .......................................................................................................4 On writing DocBook documentation ............................................................... 4 On writing WebPlatform Documentation from Linux ......................................... 4 On creating ERDs for PostgreSQL ................................................................. 5 On installing Eclipse under Debian ................................................................. 5 On running a Subversion server ..................................................................... 5 On Using the G: drive under Linux ................................................................. 7 On using iPrint printers from Linux ................................................................ 8 On using SystemImager ............................................................................... 8 Enabling X11 forwarding for SSH by default ................................................... 9 HTML redirect ........................................................................................... 9 2. July 2007 .................................................................................................... -
Cheetah Users' Guide
Cheetah Users’ Guide Release 0.9.17rc1 Edited by Mike Orr and Tavis Rudd May 17, 2005 [email protected] Contents 1 Introduction 5 1.1 Who should read this Guide? ....................................... 5 1.2 What is Cheetah? ............................................. 5 1.3 What is the philosophy behind Cheetah? ................................. 5 Why Cheetah doesn’t use HTML-style tags ............................... 6 1.4 Give me an example! ........................................... 6 1.5 Give me an example of a Webware servlet! ............................... 7 1.6 How mature is Cheetah? ......................................... 8 1.7 Where can I get news? .......................................... 8 1.8 How can I contribute? ........................................... 9 Bug reports and patches .......................................... 9 Example sites and tutorials ........................................ 9 Template libraries and function libraries ................................. 9 Test cases ................................................. 9 Publicity .................................................. 9 1.9 Acknowledgements ............................................ 9 1.10 License .................................................. 10 2 Vocabulary 11 3 Getting Started 12 3.1 Requirements ............................................... 12 3.2 Installation ................................................ 12 3.3 Files .................................................... 12 3.4 Uninstalling ...............................................