A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:

Slides:



Advertisements
Similar presentations
Spread Spectrum Chapter 7.
Advertisements

Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Multiple Access Techniques for Wireless Communications
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Emulatore di Protocolli di Routing per reti Ad-hoc Alessandra Giovanardi DI – Università di Ferrara Pattern Project Area 3: Problematiche di instradamento.
Lecture 8: Spread Spectrum
RAKE Receiver Marcel Bautista February 12, Propagation of Tx Signal.
Ultra-Wideband Part II David Yee. Overview a.k.a. impulse radio because it sends pulses of tens of picoseconds( ) to nanoseconds (10 -9 ) Duty cycle.
SPREAD SPECTRUM In spread spectrum (SS), we combine signals from different sources to fit into a larger bandwidth, but our goals are to prevent eavesdropping.
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
The National Centres of Competence in Research are managed by the Swiss National Science Foundation on behalf of the Federal Authorities NCCR MICS review.
1 Lecture 9: Diversity Chapter 7 – Equalization, Diversity, and Coding.
Medium Access Control Sublayer
Done by Sarah Hussein 10\05\2012. Trends in modern communication systems place high demands on low power consumption, high-speed transmission, and anti-
Spread Spectrum Techniques
Spread Spectrum. Introduction to Spread Spectrum Problems such as capacity limits, propagation effects, synchronization occur with wireless systems Spread.
Wireless Transmission Fundamentals (Physical Layer) Professor Honggang Wang
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING(OFDM)
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology.
1 Techniques to control noise and fading l Noise and fading are the primary sources of distortion in communication channels l Techniques to reduce noise.
April 25th 2005Doc: IEEE a Zafer Sahinoglu, Mitsubishi Electric SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
1/ , Graz, Austria Power Spectral Density of Convolutional Coded Pulse Interval Modulation Z. Ghassemlooy, S. K. Hashemi and M. Amiri Optical Communications.
Supervisor: Supervisor: Dr. Ahmed Masri Dr. Ahmed Masri Prepared by: Prepared by: 1. Aya Hamarsheh 1. Aya Hamarsheh 2. Safaa Hamdan 2. Safaa Hamdan Novel.
Automatic Gain Control Response Delay and Acquisition in Direct- Sequence Packet Radio Communications Sure 2007 Stephanie Gramc Dr. Noneaker.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Doc.: n-proposal-statistical-channel-error-model.ppt Submission Jan 2004 UCLA - STMicroelectronics, Inc.Slide 1 Proposal for Statistical.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
TransmitterChannel Receiver Abstract This project involves the analysis and simulation of direct- sequence spread-spectrum (DSSS) communication systems.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
OFDM Based WLAN System Song Ziqi Zhang Zhuo.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
1 Orthogonal Frequency- Division Multiplexing (OFDM) Used in DSL, WLAN, DAB, WIMAX, 4G.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Code Division Multiple Access (CDMA) Transmission Technology
Doc.: IEEE a TG4a July 18th 2005 P.Orlik, A. Molisch, Z. SahinogluSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Lecture 24-27: Ultra Wideband Communications Aliazam Abbasfar.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Doc: IEEE a 27 June Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Qualitative.
TUNALIData Communication1 Spread Spectrum Chapter 9.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
April 25th 2005Doc: IEEE a Zafer Sahinoglu, Mitsubishi Electric SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area.
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
1.) Acquisition Phase Task:
Advanced Wireless Networks
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
Chapter 4: Digital Transmission
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
doc.: IEEE <doc#>
Hidden Terminal Decoding and Mesh Network Capacity
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Ranging Signal Waveforms: Non-coherent Ranging Proposals.
Date Submitted: [24 June 2005]
doc.: IEEE <doc#>
Submission Title: Code Shift Keying for UWB PHY
Correlation (Packet detection)
Date Submitted: November 11, 2005]
WUR FDMA Padding Content
Signal Waveform Comparisons
Signal Waveform Comparisons
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Introduction Communication Modes Transmission Modes
Presentation transcript:

A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005: workshop on UWB for Sensor Networks, Lausanne, November 4, 2005 MICS Mobile Information and Communication Systems

2 OUTLINE Introduction Conclusions Concurrent transmissions using the same code Conventional Synchronization Method Our Proposal: Power Independent Detection (PID) Method

3 Motivation and Objectives To achieve pulse level synchronization for UWB-IR systems in the presence of inter user interference (IUI), in particular we deal with Near-Far problem. Such scenarios occur mainly in uncoordinated systems, as it is proposed for some low bit rate low power networks. Even in coordinated systems, the inter user interference appears in the presence of multiple interfering piconets. All the work in the literature considers either the absence of the inter user interference or its presence but with equal transmission power. Why a new detection method? What about transmissions using the same time hopping code? We use our proposal to investigate this case that arises in: Broadcast or control channels, e.g. (UWB) 2 Competetion to the same destination, e,g, DCC-MAC

4 We do not consider any modulation for the preamble. Each user is identified by its unique TH code that determines the pulse positions in the frames. We consider the second derivative of the Gaussian pulse. Physical Layer and Preamble Structure PRP  T c TcTc Lc = 9 TH code = … Common for all IR modulation schemes: BPSK, PPM,... Preamble Packet Seq. Preamble Frame 1 Frame Lc... Sequence Frame Preamble: periodic sequence of frames. The number of frames in the seq. Defines the code length Lc. Preamble Structure: Physical Layer:

5 OUTLINE Introduction Conclusions Conventional Synchronization Method Our Proposal: Power Independent Detection (PID) Method Concurrent transmissions using the same code

6 It involves 2 ingredients: 1- Detection and 2- search algorithm. 1.Conventional detection method:  The receiver knows the transmitter code, i.e. the seq. structure  It generates a replica of the seq., which we call the Template Pulse Train (TPT)  It applies a correlation (coherent integration) between the received IR signal and the TPT followed by a threshold check. Conventional Synchronization Methods Frame 1Frame 2Frame Lc Received IR signal Template Pulse Train The correlation can modeled as Lc elementary correlations

7 2.Search algorithm: which shifts the TPT. Shifting aims to cover all combination between TPT and IR signal (e.g. serial search, look and jump K). Conventional Synchronization Method Shift the TPT Does the threshold check succeed? Sync achieved Search algorithm Detection Yes No Interaction between Detection and Search Algorithm Template pulse train Offset 2 Template pulse train Offset 1 Template pulse train Recieved signal : pulses + noise

8 Shortcoming of the Conventional Detetcion Method Failure example Based on measures done in [Win97]: The source is 10m away. An interferer is 1m away. Indoor environment. Source pulse amplitude: 0.03V Interferer pulse amplitude: 1V. To detect the source: γ < Lc x α 0, (Lc = 4), α 0 = output of the correlation of one source pulse with one TPT pulse. The correlation between one interferer pulse and one TPT pulse = 33x α 0 > γ ==> False Alarm Failure in the Near-Far scenario: The parasite in one elementary correlation corrupts all the results

9 OUTLINE Introduction Conclusions Conventional Synchronization Method Our Proposal: Power Independent Detection (PID) Method Concurrent transmissions using the same code

10 Our Proposal: Power Independent Detection (PID) Method Conventional Detection MethodPID Method 1.The outputs of the elementary correlations are summed together. 2.Main decision is based on the gathered energy from the elementary correlations. 3.A strong parasite in one elementary decision pollutes all the results. 1.The outputs of the elementary correlations pass through elementary decision blocks that decide about the existence of pulses, then the digitalized outputs are summed. 2.Main decision is based on the number of pulses detected. 3.A strong parasite in one elementary decision is minimized by the elementary decision.

11 The conventional and PID method are embedded in a complete synchronization method. The complete synchronization method involves 2 phases: 1- Identification phase. 2- Verification phase. Each phase contains both ingredients: 1- Detection (Conventional or PID) 2- Search algorithm (Serial search). Performance Evaluation of The PID Method Sync achieved Identification phase Threshold γ 1 Threshold check succeed Verification phase Threshold γ 2 Repeat A times Threshold check succeed at least B times Sync failed Yes No γ 2 > γ 1 A > B

12 Performance Evaluation of The PID Method The PID method outperforms the conventional method 1 – Proba of Good Detection Total Error: missing the signal + False Alarm a indoor LOS Multipath channel model. Tc = 0.2 ns, Nc = 200 chips (40 ns), guard time of 100 chips. Near-far scenarios: the source is the furthest one (-30 dBm). Interferer powers are uniformly distributed over [-30, -10] dBm (range equivalent to 17 m) 10 users, Lc = 20

13 OUTLINE Introduction Conclusions Conventional Synchronization Method Our Proposal: Power Independent Detection (PID) Method Concurrent transmissions using the same code

14 Concurrent Transmissions with the Same Code Each transmission encounters different multipath pattern Not all multipath components of the patterns collide The source is able to resolve one multipath component that does not collide with another. Channel 1: Channel 2: Channel 1 Channel 2 S1 S2 D Wireless channels

a indoor LOS Multipath channel model. Sources are uniformly distributed within a range of 17 m  receiving signals are with different power levels. E0/N0 = 15 dB with respect to the furthest source. Code length = 20 P GD > 0.9 Concurrent Transmissions with the Same Code 1 – Proba of Good Detection  With the PID method, detection is independent of the source power.  With the conventional detection method, always the source with the highest power is detected

16 OUTLINE Introduction Conclusions Performance Evaluation of the PID Method Conventional Synchronization Method Our Proposal: Power Independent Detection (PID) Method

17 Conclusions This was the first work that identifies the shortcoming of the conventional detection method in presence of concurrent transmissions with heterogeneous power level. We propose a new detection method that we call PID method. We evaluate the PID method: The PID method outperforms the conventional method Then, using UWB IR, we can envisage ad hoc network structures with simultaneous asynchronous transmissions without referring to any coordinator or centralized scheme. We continued this work and tested the case of concurrent transmissions with the same code and we could show that, with high proba (> 0.9), such transmissions do not result in collision. Hence, random access in UWB-IR systems using the same code can not be modeled as an Aloha scheme and further it performs much better.

18