Interference Robustness and Security of Impulse-Radio Ultra-Wide Band Networks
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Some impulse radio UWB (IR-UWB) networks may allow concurrent transmissions without power control (for example MAC protocols that do not use power control, or co-existing, non-coordinated piconets). In such cases, it has been proposed to mitigate multi-use ...
Diversity embedded codes are opportunistic codes designed for the wireless fading channel. They are high-rate space-time codes which have embedded within them a high-diversity (low rate) code. In this paper, we focus on the application of diversity embedde ...
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We have integrated this architecture in the popular ns-2 network simulator and used it to implement an impulse-radio ultra-wide band (IR-UWB) physica ...
In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. A well-known instance is with unreliable wireless links, where the probability that at least one node out ofnreceives a packet increas ...
This paper presents the research activities carried out within the scope of the Liaison project. Most of the work has been performed on WiFi location. WiFi is nowadays widely deployed in buildings such as hotels, hospitals, airports, train stations, public ...
We study analytically and experimentally the throughput of the packetized time-varying discrete erasure channel with feedback, which closely captures the behavior of many practical physical layers. We observe that the channel variability at different time ...
We develop three functions around the MAC layer: (1) Pseudo broadcast is a technique used to improve throughput of broadcast transmissions in case of congested networks. The mechanism consists in sending a packet in unicast to a station using RTS/CTS. Othe ...
Packet detection and timing acquisition for IR-UWB networks such as 802.15.4a relies on the presence of an acquisition sequence (or preamble) at the beginning of each packet. A simple network design choice is to use a common acquisition sequence for the wh ...
Packet detection and timing acquisition for IR-UWB networks such as 802.15.4a relies on the presence of an acquisition sequence (or preamble) at the beginning of each packet. A simple network design choice is to use a common acquisition sequence for the wh ...
We consider the design of the MAC layer for low power, low data-rate, impulse-radio ultra-wide band (IR-UWB) networks. In such networks, the primary concern is energy consumption rather than rate efficiency. We explore several dimensions such as power cont ...