Ren SAKATA Tazuko TOMIOKA Takahiro KOBAYASHI
When cognitive radio (CR) systems dynamically use the frequency band, a control signal is necessary to indicate which carrier frequencies are currently available in the network. In order to keep efficient spectrum utilization, this control signal also should be transmitted based on the channel conditions. If transmitters dynamically select carrier frequencies, receivers have to receive control signals without knowledge of their carrier frequencies. To enable such transmission and reception, this paper proposes a novel scheme called DCPT (Differential Code Parallel Transmission). With DCPT, receivers can receive low-rate information with no knowledge of the carrier frequencies. The transmitter transmits two signals whose carrier frequencies are spaced by a predefined value. The absolute values of the carrier frequencies can be varied. When the receiver acquires the DCPT signal, it multiplies the signal by a frequency-shifted version of the signal; this yields a DC component that represents the data signal which is then demodulated. The performance was evaluated by means of numerical analysis and computer simulation. We confirmed that DCPT operates successfully even under severe interference if its parameters are appropriately configured.
UHF band passive RFID systems are being steadily adopted by industries because of their capability of long range automatic identification with passive tags. For an application which demands a large number of readers located in a limited geographical area, referred to as dense reader mode, interference rejection among readers is important. The coding method, baseband or subcarrier coding, in the tag-to-reader communication link results in a significant influence on the interference rejection performance. This paper examines the frequency sharing of baseband and subcarrier coding UHF RFID systems from the perspective of their transmission delay using a media access control (MAC) simulator. The validity of the numerical simulation was verified by an experiment. It is revealed that, in a mixed operation of baseband and subcarrier systems, assigning as many channels as possible to baseband system unless they do not exploit the subcarrier channels is the general principle for efficient frequency sharing. This frequency sharing principle is effective both to baseband and subcarrier coding systems. Otherwise, mixed operation fundamentally increases the transmission delay in subcarrier coding systems.
Motohiro TANABE Masahiro UMEHIRA Koichi ISHIHARA Yasushi TAKATORI
An OFDMA based channel access scheme is proposed for dynamic spectrum access to utilize frequency spectrum efficiently. Though the OFDMA based scheme is flexible enough to change the bandwidth and channel of the transmitted signals, the OFDMA signal has large PAPR (Peak to Average Power Ratio). In addition, if the OFDMA receiver does not use a filter to extract sub-carriers before FFT (Fast Fourier Transform) processing, the designated sub-carriers suffer large interference from the adjacent channel signals in the FFT processing on the receiving side. To solve the problems such as PAPR and adjacent channel interference encountered in the OFDMA based scheme, this paper proposes a novel dynamic channel access scheme using overlap FFT filter-bank based on single carrier modulation. It also shows performance evaluation results of the proposed scheme by computer simulation.
Hyoungsuk JEON Sooyeol IM Youmin KIM Seunghee KIM Jinup KIM Hyuckjae LEE
The public safety spectrum is generally under-utilized due to the unique traffic characteristics of bursty and mission critical. This letter considers the application of dynamic spectrum access (DSA) to the combined spectrum of public safety (PS) and commercial (CMR) users in a common shared network that can provide both PS and CMR services. Our scenario includes the 700 MHz Public/Private Partnership which was recently issued by the Federal Communications Commission. We first propose an efficient DSA mechanism to coordinate the combined spectrum, and then establish a call admission control that reflects the proposed DSA in a wideband code division multiple access based network. The essentials of our proposed DSA are opportunistic access to the public safety spectrum and priority access to the commercial spectrum. Simulation results show that these schemes are well harmonized in various network environments.
Abdorasoul GHASEMI S. Mohammad RAZAVIZADEH
A simple distributed Medium Access Control (MAC) protocol for cognitive wireless networks is proposed. It is assumed that the network is slotted, the spectrum is divided into a number of channels, and the primary network statistical aggregate traffic model on each channel is given by independent Bernoulli random variables. The objective of the cognitive MAC is to maximize the exploitation of the channels idle time slots. The cognitive users can achieve this aim by appropriate hopping between the channels at each decision stage. The proposed protocol is based on the rule of least failures that is deployed by each user independently. Using this rule, at each decision stage, a channel with the least number of recorded collisions with the primary and other cognitive users is selected for exploitation. The performance of the proposed protocol for multiple cognitive users is investigated analytically and verified by simulation. It is shown that as the number of users increases the user decision under this protocol comes close to the optimum decision to maximize its own utilization. In addition, to improve opportunity utilization in the case of a large number of cognitive users, an extension to the proposed MAC protocol is presented and evaluated by simulation.
Ruiqin MIAO Jun SUN Lin GUI Jian XIONG
In this paper, the issue of carrier frequency offset (CFO) compensation in interleaved orthogonal frequency division multiple access (OFDMA) uplink system is investigated. To mitigate the effect of multiple access interference (MAI) caused by CFOs of different users, a new parallel interference cancellation (PIC) compensation algorithm is proposed. This scheme uses minimum mean square error (MMSE) criterion to obtain the estimation of interference users, then circular convolutions are employed to restore MAI and compensate CFO. To tackle the complexity problem of circular convolutions, an efficient MAI restoration and cancellation method is developed. Simulations illustrate the good performance and low computational complexity of the proposed algorithm.
Athanassios V. ADAMIS Konstantinos N. MALIATSOS Philip CONSTANTINOU
Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.
In conjunction with a first-order Taylor series approximation of the spatial scanning vector, this letter presents an iterative multiple signal classification (MUSIC) direction-of-arrival (DOA) estimation for code-division multiple access signals. This approach leads to a simple one-dimensional optimization problem to find each iterative optimal search grid. It can not only accurately estimate DOA, but also speed up the estimating process. Computer results demonstrate the effectiveness of the proposed algorithm.
Akira YAMADA Ayumu KUBOTA Yutaka MIYAKE Kazuo HASHIMOTO
Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.
Shoukei KOBAYASHI Yoshiaki YAMADA Kenji HISADOME Osamu KAMATANI Osamu ISHIDA
We propose a scalable parallel interface that provides an ideal aggregated bandwidth link for an application. The scalable parallel interface uses time information to align packets and allows dynamic lane and/or path change, a large difference in transmission delays among lanes, and so on. The basic performance of the scalable parallel interface in 10 Gb/s 2 lanes is verified using an estimation board that is newly developed to evaluate the basic functions used in a Terabit LAN. The evaluation shows that the scalable parallel interface achieves a very low delay variation that is almost the same as that under back-to-back conditions. The difference in the delay variation between the scalable parallel interface and the back-to-back condition is approximately 10 ns when the transmission delay time varies from 10 µs to 1 s.
Gen NISHIKAWA Tomoko IZUMI Fukuhito OOSHITA Hirotsugu KAKUGAWA Toshimitsu MASUZAWA
Wireless LANs, which consist of access points and wireless stations, have widely spread in recent years. Routing in wireless LANs suffers the problem that each wireless station selects an access point and a wired path to its destination station. It is desired to design an adaptive routing protocol for wireless LANs since throughputs of communications are dynamically affected by selections of other wireless stations and external environmental changes. In this paper, we propose a routing protocol for wireless LANs based on attractor selection. Attractor selection is a biologically inspired approach, and it has high adaptability to dynamic environmental changes. By applying attractor selection, each wireless station can adaptively select its access point and wired path with high throughput against environmental changes. In addition, we design the protocol with a new technique: combination of multiple attractor selections. The technique is useful because it enables us to divide a problem into several simpler problems. To the best of our knowledge, our protocol is the first one designed around a combination of multiple attractor selections. We show the effectiveness and adaptability of our protocol by simulations.
If ranging processes are not frequent in an uplink OFDMA system, timing synchronization between the base and mobile stations may not be maintained and the performance may be degraded. This paper proposes a random access scheme in which a short OFDMA symbol is transmitted to maintain the orthogonality with timing offsets. A short symbol is constructed by inserting zero-padding to an OFDMA symbol.
Chin-Sean SUM Mohammad Azizur RAHMAN Shigenobu SASAKI Hiroshi HARADA Shuzo KATO
This paper proposes a hybrid multiband (MB) ultra wideband (UWB) system with direct sequence (DS) spreading. The theoretical error analysis for the DS-MB-UWB multiple access system with Rake receiver in the presence of multipath and narrowband interference is developed. The developed theoretical framework models the multiple access interference (MAI), multipath interference (MI) and narrowband interference for the designed UWB system. It is shown that the system error performance corresponding to the combining effects of these interference can be accurately modeled and calculated. Monte Carlo simulation results are provided to validate the accuracy of the model. Additionally, it is found that narrowband interference can be mitigated effectively in the multiband UWB system by suppressing the particular UWB sub-band co-existing with the interfering narrowband signal. A typical improvement of 5 dB can be achieved with 75% sub-band power suppression. On the other hand, suppression of UWB sub-band is also found to decrease frequency diversity, thus facilitating the increase of MAI. In this paper, the developed model is utilized to determine the parameters that optimize the UWB system performance by minimizing the effective interference.
Masakatsu OGAWA Takefumi HIRAGURI
This paper proposes a power saving control function for battery-powered portable wireless LAN (WLAN) access points (APs) to extend the battery life. The IEEE802.11 standard does not support power saving control for APs. To enable a sleep state for an AP, the AP forces the stations (STAs) to refrain from transmitting frames using the network allocation vector (NAV) while the AP is sleeping. Thus the sleep state for the AP can be employed without causing frame loss at the STAs. Numerical analysis and computer simulation reveal that the newly proposed control technique conserves power compared to the conventional control.
This letter proposes a busy-tone based scheme for reliable and efficient broadcasting in mobile ad hoc networks. Control packets such as RTS, CTS and ACK are ignored in the broadcast scheme, and two busy tones are used, one for channel reservation and the other for negative acknowledgement. Unlike traditional schemes for reliable broadcasting, the proposed scheme is highly efficient as it achieves both collision avoidance and fast packet loss recovery. Simulation results are presented which show the effectiveness of the proposed scheme.
In this paper, we study the capacity and performance of nonorthogonal pulse position modulation (NPPM) for Ultra-Wideband (UWB) communication systems over both AWGN and IEEE802.15.3a channels. The channel capacity of NPPM is determined for a time-hopping multiple access UWB communication system. The error probability and performance bounds are derived for a multiuser environment. It is shown that with proper selection of the pulse waveform and modulation index, NPPM can achieve a higher capacity than orthogonal PPM, and also provide better performance than orthogonal PPM with the same throughput.
Ya-Ting WU Wai-Ki WONG Shu-Hung LEUNG Yue-Sheng ZHU
This paper presents the performance analysis of a De-correlated Modified Code Tracking Loop (D-MCTL) for synchronous direct-sequence code-division multiple-access (DS-CDMA) systems under multiuser environment. Previous studies have shown that the imbalance of multiple access interference (MAI) in the time lead and time lag portions of the signal causes tracking bias or instability problem in the traditional correlating tracking loop like delay lock loop (DLL) or modified code tracking loop (MCTL). In this paper, we exploit the de-correlating technique to combat the MAI at the on-time code position of the MCTL. Unlike applying the same technique to DLL which requires an extensive search algorithm to compensate the noise imbalance which may introduce small tracking bias under low signal-to-noise ratio (SNR), the proposed D-MCTL has much lower computational complexity and exhibits zero tracking bias for the whole range of SNR, regardless of the number of interfering users. Furthermore, performance analysis and simulations based on Gold codes show that the proposed scheme has better mean square tracking error, mean-time-to-lose-lock and near-far resistance than the other tracking schemes, including traditional DLL (T-DLL), traditional MCTL (T-MCTL) and modified de-correlated DLL (MD-DLL).
Multiple access based on energy spreading transform (EST) in [1] has been shown to effectively separate multiuser signals in an iterative manner. In this paper, an optimum hard-decision detector for the EST-based multiple access is proposed. The proposed scheme employs minimum mean square error (MMSE) processing at each iteration to enhance the performance of the original scheme. Analysis and simulation results show the significant performance improvement of the proposed scheme over the original method.
This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection.
This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.