Localization & positioning

Size: px
Start display at page:

Download "Localization & positioning"

Transcription

1

2 In many circumstances, it is useful or even necessary for a node in a wireless sensor network to be aware of its location in the physical world. For example, tracking or event-detection functions are not particularly useful if the WSN cannot provide any information where an event has happened.

3 To do so, usually, the reporting nodes location has to be known. Manually configuring location information into each node during deployment is not an option. Similarly, equipping every node with a Global Positioning System (GPS) receiver fails because of cost and deployment limitations (GPS, e.g. does not work indoors).

4 - Goals - Means for a node to determine its physical position (with respect to some coordinate system) or symbolic location Using the help of Anchor nodes that know their position Directly adjacent Over multiple hops Using different means to determine distances and/or angles locally

5 - Properties - Physical position vs symbolic location Does the system provide data about the physical position of a node (in some numeric coordinate system) or does a node learn about a symbolic location for example, living room, office 123 in building 4? Is it, in addition, possible to match physical position with a symbolic location name (out of possibly several applicable ones)?

6 - Properties - Absolute vs relative coordinates An absolute coordinate system is valid for all objects and embedded in some general frame of reference. E.g. positions in the UTM coordinates form an absolute coordinate system for any place on earth. Relative coordinates can differ for any located object or set of objects a WSN where nodes have correct coordinates wrt each other but have no relationship to absolute coordinates is an example.

7 - Properties - Absolute vs relative coordinates (cont.) To provide absolute coordinates, a few anchors (aka beacons or landmarks) are necessary (at least three for a 2D system). These anchors are nodes that know their own position in the absolute coordinate system. Anchors can rotate, translate, and possibly scale a relative coordinate system so that it coincides with the absolute coordinate system.

8 - Properties - Localized versus centralized computation Are any required computations performed locally, by the participants, on the basis of some locally available measurements? or Are measurements reported to a central station that computes positions or locations and distributes them back to the participants?

9 - Properties - Localized versus centralized computation (cont.) Apart from scaling and efficiency considerations (both wrt computational and communication overhead), privacy issues are important here as it might not be desirable for a participant to reveal its position to a central entity.

10 - Properties - Accuracy and precision Positioning accuracy is the largest distance between the estimated and the true position of an entity (high accuracy indicates a small maximal mismatch). Precision is the ratio with which a given accuracy is reached, averaged over many repeated attempts to determine a position.

11 - Properties - Accuracy and precision (cont.) For example, a system could claim to provide a 20-cm accuracy with at least 95% precision. Evidently, accuracy and precision values only make sense when considered together, forming the accuracy/precision characteristic of a system.

12 - Properties - Scale A system can be intended for different scales, for example in indoor deployment the size of a room or a building or in outdoor deployment a parking lot or even worldwide operation. Two important metrics here are, the area the system can cover per unit of infrastructure, and the number of locatable objects per unit of infrastructure per time interval.

13 - Properties - Limitations For some positioning techniques, there are inherent deployment limitations. GPS, for example, does not work indoors; other systems have only limited ranges over which they operate.

14 - Properties - Costs Positioning systems cause costs: in time (installation, administration), space (device size, space for infrastructure), energy (during operation), and capital (price of a node and infrastructure).

15

16 - Overview - Basic approaches Single-hop schemes Multi-hop schemes

17 - Overview - Basic approaches Single-hop schemes Multi-hop schemes

18 - Overview - Basic approaches Proximity (Tri)lateration and (tri)angulation Scene analysis

19 - Basic Approaches - Proximity The simplest technique is to exploit the finite range of wireless communication. It can be used to decide whether a node that wants to determine its position or location is in the proximity of an anchor. Only provides coarse-grain information, but OK. One example is the natural restriction of infrared communication by walls, which can be used to provide a node with simple location information about the room it is in.

20 - Basic Approaches - Proximity (cont.) Proximity-based systems can be quite sophisticated and can even be used for approximate positioning when a node can analyze proximity information of several overlapping anchors. They can also be relatively robust to the uncertainties of the wireless channel deciding whether a node is in the proximity of another node is tantamount to deciding connectivity, which can happen on relatively long time scales, averaging out short-term fluctuations.

21 - Basic Approaches - Trilateration and triangulation Lateration versus angulation In addition to mere connectivity/proximity information, the communication between two nodes often allows to extract information about their geometric relationship. E.g. the distance between two nodes or the angle in a triangle can be estimated. Using elementary geometry, this information can be used to derive information about node positions.

22 - Basic Approaches - Trilateration and triangulation Lateration versus angulation When distances between entities are used, the approach is called lateration. When angles between nodes are used, one talks about angulation.

23 - Basic Approaches - Trilateration and triangulation Lateration

24 - Basic Approaches - Trilateration and triangulation Lateration For lateration in a plane, the simplest case is for a node to have precise distance measurements to three noncolinear anchors. The extension to a 3D space is trivial (four anchors are needed). Using distances and anchor positions, the node s position has to be at the intersection of three circles around the anchors.

25 - Basic Approaches - (x = 5, y = 4) r 2 r 3 (x = 8, y = 2) r 1 (x = 2, y = 1)

26 - Basic Approaches - Trilateration and triangulation Lateration The problem here is that, in reality, distance measurements are never perfect and the intersection of these three circles will, in general, not result in a single point. To overcome these imperfections, distance measurements form more that three anchors can be used, resulting in a multilateration problem.

27 - Basic Approaches - Trilateration and triangulation Lateration The most important characteristics are: Received Signal Strength Indicator (RSSI), Time of Arrival (ToA), and Time Difference of Arrival (TDoA).

28 - Basic Approaches - Trilateration and triangulation Angulation It exploits the fact that in a triangle once the length of two sides and two angles are known the position of the third point is known as the intersection of the two remaining sides of the triangle. The problem of imprecise measurements arises here as well and can also be solved using multiple measurements.

29 - Basic Approaches - Angle 1 Length known Angle 2

30 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator In theory, the energy of a radio signal diminishes with the square of the distance from the signal's source. As a result, a node listening to a radio transmission should be able to use the strength of the received signal to calculate its distance from the transmitter.

31 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) Assuming that the transmission power P tx, the path loss model, and the path loss coefficient α are known, the receiver can use the received signal strength P rcvd to solve for the distance d in a pathloss equation like:

32 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) No additional hardware is necessary and distance estimates can even be derived without additional overhead from communication that is taking place anyway. However, RSSI values are not constant but can heavily oscillate, even when sender and receiver do not move. This is caused by effects like fast fading and mobility of the environment.

33 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) Use statistics... (PDF for a fixed RSSI)

34 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) In addition, simple, cheap radio transceivers are often not calibrated and the same actual signal strength can result in different RSSI values on different devices. Other problems are the presence of obstacles, and the multipath fading (the signal attenuation along the path can lead to incorrectly assuming a longer distance than it is in reality).

35 - Basic Approaches - Trilateration and triangulation Lateration: Time of arrival (ToA) It exploits the relationship between distance and transmission time when the propagation speed is known. Assuming both sender and receiver know the time when a transmission for example, a short ultrasound pulse starts, the time of arrival of this transmission at the receiver can be used to compute propagation time and, thus, distance.

36 - Basic Approaches - Trilateration and triangulation Lateration: Time of arrival (cont.) Depending on the transmission medium that is used, time of arrival requires very high resolution clocks to produce results of acceptable accuracy. E.g., for sound waves, these resolution requirements are modest, although propagation speed depends on external factors such as temperature or humidity and careful calibration is necessary. However, they are hard for radio waves.

37 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (TDoA) It utilizes implicit synchronization by directly providing the start of transmission information to the receiver. This can be done if two transmission mediums of very different propagation speeds are used for example, radio waves propagating at the speed of light and ultrasound.

38 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.) Hence, when a sender starts an ultrasound and a radio transmission simultaneously, the receiver can use the arrival of the radio transmission to start measuring the time until arrival of the ultrasound transmission, safely ignoring the propagation time of the radio communication.

39 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.)

40 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.) The obvious disadvantage of this approach is the need for two types of senders and receivers on each node. The advantage, on the other hand, is a considerably better accuracy compared to RSSI-based approaches. Many localization methods use it.

41 - Basic Approaches - Trilateration and triangulation Lateration What is then better? RSSI: simpler and based on standard hardware TdoA: provide superior ranging results but need more complex and additional hardware, and thus also more energy consumption.

42 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Assuming distances to three points with known location are exactly given. Solve system of equations (Pythagoras!).

43 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration where: (xi,y i ) : coordinates of anchor point i ri distance to anchor i (xu, y u ) : unknown coordinates of node

44 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Subtracting eq. 3 from 1 & 2: Rearranging terms gives a linear equation in (x u, y u )!

45 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Rewriting as a matrix equation:

46 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Example: (x 1, y 1 ) = (2,1), (x 2, y 2 ) = (5,4), (x 3, y 3 ) = (8,2), r 1 = , r 2 = 2, r 3 = 3! (x u,y u ) = (5,2) (x = 2, y = 1) r 1 (x = 5, y = 4) r 2 r 3 (x = 8, y = 2)

47 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Example: (x = 5, y = 4) r 2! (x u,y u ) = (5,2) (x = 2, y = 1) r 1 r 3 (x = 8, y = 2)

48 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration What if only distance estimation r i 0 = r i + i available? Then use multiple anchors, that define a different system of equations:

49 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration And choose the (x u, y u ) that minimize mean square error.

50 - Basic Approaches - Trilateration and triangulation Angulation

51 - Basic Approaches - Trilateration and triangulation Angulation Measure angles as alternative to distances. Either the angle of a connecting line between an anchor and a position-unaware node to a given reference direction ( 0 north ). Or the angle between two such connecting lines if no reference direction is commonly known to all nodes.

52 - Basic Approaches - Trilateration and triangulation Angulation Angle 1 Length known Angle 2

53 - Basic Approaches - Trilateration and triangulation Angulation A traditional approach to measuring angles is to use directional antennas, rotating on their axis, similar to a radar station or a conventional lighthouse. This makes angle measurements conceptually simple, but such devices are quite inappropriate for sensors nodes; they can be useful for supporting infrastructure anchors.

54 - Basic Approaches - Trilateration and triangulation Angulation

55 - Basic Approaches - Trilateration and triangulation Angulation Another technique is to have multiple antennas mounted on a device at known separation and measuring the time difference between a signal s arrival at the different antennas, the direction from which a wavefront arrived at the device can be computed. This results in strenuous timing requirements. Overall, angulation is a less frequent used technique compared to lateration.

56 - Basic Approaches - Scene analysis

57 - Basic Approaches - Scene analysis A quite different technique. IDEA: Radio environment has characteristic signatures ; they can be measured beforehand, stored, and compared with current situation.

58 - Basic Approaches - Scene analysis The most evident form of it is to analyze pictures taken by a camera and to try to derive the position from this picture. This requires substantial computational effort and is hardly appropriate for sensor nodes. Other measurable characteristic fingerprints of a given location can be used for scene analysis, for example, radio wave propagation patterns.

59 - Basic Approaches - Scene analysis One option is to use signal strength measurements of (one or more anchors) transmitting a known signal strength and compare the actually measured values with those stored in a database of previously off-line measured values for each location (e.g. the RADAR system is one example that uses this approach to determine positions in a building). Using other physical characteristics such as multipath behavior is also conceivable.

60 - Basic Approaches - Scene analysis While scene analysis is interesting for systems that have a dedicated deployment phase and where off-line measurements are acceptable, this is not always the case for WSNs. Hence, this approach is not the main focus of attention.

61 - Overview - Basic approaches Single-hop schemes Multi-hop schemes

62 - Single-hop schemes - Overlapping connectivity Approximate point in triangle

63 - Single-hop schemes - Overlapping connectivity Approximate point in triangle

64 - Single-hop schemes - Overlapping connectivity It tries to use only the observation of connectivity to a set of anchors to determine a node s position. The underlying assumption is that transmissions (of known and fixed transmission power) from an anchor can be received within a circular area of known radius. Anchor nodes periodically send out transmissions identifying themselves (or, equivalently, containing their positions).

65 - Single-hop schemes - Overlapping connectivity (cont.)

66 - Single-hop schemes - Overlapping connectivity (cont.) Once a node has received these announcements from all anchors of which it is in reach (typically waiting for a few periods to smooth out the effect of random packet losses), it can determine that it is in the intersection of the circles around these anchors. The estimated position is then the arithmetic average of the received anchors positions.

67 - Single-hop schemes - Overlapping connectivity (cont.) Moreover, assuming that the node knows about all the anchors that are deployed, the fact that some anchor announcements are not received implies that the node is outside the respective circles. This information further allows to restrict the node s possible position.

68 - Single-hop schemes - Overlapping connectivity (cont.) The achievable absolute accuracy depends on the number of anchors more anchors allow a finergrained resolution of the area. Accuracy degrades if the real coverage range deviates from a perfect sphere (as it usually does in reality). In addition, the transmission range has to be chosen carefully to result in a minimal positioning error, given a set of anchors.

69 - Single-hop schemes - Overlapping connectivity Approximate point in triangle

70 - Single-hop schemes - Approximate point in triangle The idea is to decide whether a node is within or outside of a triangle formed by any three anchors. Using this information, a node can intersect the triangles and estimate its own position, similar to the intersection of circles from before.

71 - Single-hop schemes - Approximate point in triangle (cont.) A B G F C E D

72 - Single-hop schemes - Approximate point in triangle (cont.) The node has detected that it is inside the triangles BDF, BDE, and CDF and also that it is outside the triangle ADF (and ABF, AFC, and others). Hence, it can estimate its own position to be somewhere within the dark gray area for example, this area s center of gravity. A B G F C E D

73 - Single-hop schemes - Approximate point in triangle (cont.) The interesting question is how to decide whether a node is inside or outside the triangle formed by any three arbitrarily selected anchors. Look at what happens when a node inside a triangle is moved: Irrespective of the direction of the movement, the node must be closer to at least one of the corners of the triangle than it was before the movement. Conversely, for a node outside a triangle, there is at least one direction for which the node s distance to all corners increases.

74 - Single-hop schemes - Approximate point in triangle (cont.) Moving a sensor node to determine its position is hardly practical. But one possibility to approximate movements is for a node to inquire all its neighbors about their distance to the given three corner anchors, compared to the enquiring node s distance. Deciding which of two nodes is closer to an anchor can be approximated by comparing their corresponding RSSI values.

75 - Single-hop schemes - Approximate point in triangle (cont.) If, for all neighbors, there is at least one corner such that the neighbor is closer to the corner than the enquiring node, it is assumed to be inside the triangle, else outside.??

76 - Overview - Basic approaches Single-hop schemes Multi-hop schemes

77 - Multi-hop schemes - How to estimate range to a node to which no direct radio communication exists? No RSSI, TDoA, But: Multihop communication is possible B X A C

78 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration

79 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration

80 - Multi-hop schemes - Ideas: State it as a semidefinite program Connectivity between any two nodes is only possible if nodes are at most R distance units apart. The fact that two nodes are connected introduces a constraint to the feasibility problem for two connected nodes, it is impossible to choose positions that would place them further than R away.

81 - Multi-hop schemes - Ideas: State it as a semidefinite program (cont.) This problem can be solved, but only centrally, requiring all connectivity information at one point. Because of its essentially centralized character and computationally expensive to solve, it is only of limited applicability to WSNs.

82 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration

83 - Multi-hop schemes - Ideas: Count the number of hops Assume length of one hop is known. The idea is to count the number of hops (along the shortest path) between any two anchors and to use it to estimate the average length of a single hop by dividing the sum of the distances to other anchors by the sum of the hop counts.

84 - Multi-hop schemes - Ideas: Count the number of hops (cont.) Every anchor computes this estimated hop length and propagates it into the network. A node with unknown position can then use this estimated hop length (and the known number of hops to other anchors) to compute a multihop range estimate and perform multilateration.

85 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration

86 - Multi-hop schemes - Ideas: Use also range estimation between neighbors If range estimates between neighbors exist, use them to improve total length of route estimation in previous method.

87 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration

88 - Multi-hop schemes - Ideas: Collaborative multilateration Assume some nodes can hear at least three anchors (to perform triangulation), but not all. Idea: let more and more nodes compute position estimates, spread position knowledge in the network. Problem: Errors accumulate.

89 Ideas: Collaborative multilateration (cont.) Localization & positioning - Multi-hop schemes - (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C I: II: III: IV:

90 - Multi-hop schemes - Ideas: Collaborative multilateration (cont.) Similar idea to previous one, but accept problem that position of nodes is only probabilistically known. Represent this probability explicitly, use it to compute probabilities for further nodes.

91 - Multi-hop schemes - Ideas: Collaborative multilateration (cont.)

92 - Conclusions - Determining location or position is a vitally important function in WSN, but fraught with many errors and shortcomings: Range estimates often not sufficiently accurate Many anchors are needed for acceptable results Anchors might need external position sources (GPS) Multilateration problematic (convergence, accuracy)

Omni Antenna vs. Directional Antenna

Omni Antenna vs. Directional Antenna Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros

More information

Robot Perception Continued

Robot Perception Continued Robot Perception Continued 1 Visual Perception Visual Odometry Reconstruction Recognition CS 685 11 Range Sensing strategies Active range sensors Ultrasound Laser range sensor Slides adopted from Siegwart

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Indoor Location Tracking using Received Signal Strength Indicator

Indoor Location Tracking using Received Signal Strength Indicator Indoor Location Tracking using Received Signal Strength Indicator 9 11 X Indoor Location Tracking using Received Signal Strength Indicator Chuan-Chin Pu 1, Chuan-Hsian Pu, and Hoon-Jae Lee 3 1 Sunway University

More information

Experiences in positioning and sensor network applications with Ultra Wide Band technology

Experiences in positioning and sensor network applications with Ultra Wide Band technology Experiences in positioning and sensor network applications with Ultra Wide Band technology WAMS LANGATTOMUUDESTA UUTTA BISNESTÄ Timo Lehikoinen VTT Technical Research Centre of Finland 10/14/2013 2 Contents

More information

A comparison of radio direction-finding technologies. Paul Denisowski, Applications Engineer Rohde & Schwarz

A comparison of radio direction-finding technologies. Paul Denisowski, Applications Engineer Rohde & Schwarz A comparison of radio direction-finding technologies Paul Denisowski, Applications Engineer Rohde & Schwarz Topics General introduction to radiolocation Manual DF techniques Doppler DF Time difference

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

Antenna Deployment Technical Brief

Antenna Deployment Technical Brief ProCurve Networking Antenna Deployment Technical Brief Introduction... 2 Antenna types... 2 Omni directional antennas... 2 Directional antennas... 2 Diversity antennas... 3 High gain directional antennas...

More information

Understanding Range for RF Devices

Understanding Range for RF Devices Understanding Range for RF Devices October 2012 White Paper Understanding how environmental factors can affect range is one of the key aspects to deploying a radio frequency (RF) solution. This paper will

More information

Antenna Diversity in Wireless Local Area Network Devices

Antenna Diversity in Wireless Local Area Network Devices Antenna Diversity in Wireless Local Area Network Devices Frank M. Caimi, Ph.D. Kerry L. Greer Jason M. Hendler January 2002 Introduction Antenna diversity has been used in wireless communication systems

More information

Synthetic Sensing: Proximity / Distance Sensors

Synthetic Sensing: Proximity / Distance Sensors Synthetic Sensing: Proximity / Distance Sensors MediaRobotics Lab, February 2010 Proximity detection is dependent on the object of interest. One size does not fit all For non-contact distance measurement,

More information

Location of Mobile Terminals Using Time Measurements and Survey Points

Location of Mobile Terminals Using Time Measurements and Survey Points IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 999 Location of Mobile Terminals Using Time Measurements and Survey Points Michael McGuire, Member, IEEE, Konstantinos N. Plataniotis,

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Evaluation and testing of techniques for indoor positioning

Evaluation and testing of techniques for indoor positioning Master s Thesis Evaluation and testing of techniques for indoor positioning Hampus Engström Fredrik Helander Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University,

More information

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,

More information

Wireless Technologies take Personnel Safety in the Process Industries to a New Level

Wireless Technologies take Personnel Safety in the Process Industries to a New Level 324808 Issue 3 Wireless Technologies take Personnel Safety in the Process Industries to a New Level October 2010 WHITE PAPER John Hartley Managing Director Copyright Extronics Ltd 2009 The information

More information

Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point

Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point Overview To optimize the overall performance of a WLAN in an outdoor deployment it is important to understand how to maximize coverage

More information

What is 802.11? Why are standards important?

What is 802.11? Why are standards important? What is 802.11? The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical and Electronic Engineers (IEEE). Commonly referred to as Wi Fi the 802.11 standards define

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Math 215 Project (25 pts) : Using Linear Algebra to solve GPS problem

Math 215 Project (25 pts) : Using Linear Algebra to solve GPS problem Due Thursday March 1, 2012 NAME(S): Math 215 Project (25 pts) : Using Linear Algebra to solve GPS problem 0.1 Introduction The age old question, Where in the world am I? can easily be solved nowadays by

More information

Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network

Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 78-3075, Volume-, Issue-, January 013 Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Robot Sensors. Outline. The Robot Structure. Robots and Sensors. Henrik I Christensen

Robot Sensors. Outline. The Robot Structure. Robots and Sensors. Henrik I Christensen Robot Sensors Henrik I Christensen Robotics & Intelligent Machines @ GT Georgia Institute of Technology, Atlanta, GA 30332-0760 hic@cc.gatech.edu Henrik I Christensen (RIM@GT) Sensors 1 / 38 Outline 1

More information

Multihopping for OFDM based Wireless Networks

Multihopping for OFDM based Wireless Networks Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:

More information

Multipath fading in wireless sensor mote

Multipath fading in wireless sensor mote Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,

More information

E190Q Lecture 5 Autonomous Robot Navigation

E190Q Lecture 5 Autonomous Robot Navigation E190Q Lecture 5 Autonomous Robot Navigation Instructor: Chris Clark Semester: Spring 2014 1 Figures courtesy of Siegwart & Nourbakhsh Control Structures Planning Based Control Prior Knowledge Operator

More information

Copyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass

Copyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass Centre of Mass A central theme in mathematical modelling is that of reducing complex problems to simpler, and hopefully, equivalent problems for which mathematical analysis is possible. The concept of

More information

SURVEYING WITH GPS. GPS has become a standard surveying technique in most surveying practices

SURVEYING WITH GPS. GPS has become a standard surveying technique in most surveying practices SURVEYING WITH GPS Key Words: Static, Fast-static, Kinematic, Pseudo- Kinematic, Real-time kinematic, Receiver Initialization, On The Fly (OTF), Baselines, Redundant baselines, Base Receiver, Rover GPS

More information

Mobile Phone Tracking & Positioning Techniques

Mobile Phone Tracking & Positioning Techniques Mobile Phone Tracking & Positioning Techniques Laxmana Siridhara Arigela #1, Putta Aditya Veerendra *2, Simhadri Anvesh *2, Kolisetty Sandeep Satya Hanuman #3 1 Assistant Professor, Department of ECE,

More information

University of L Aquila Center of Excellence DEWS Poggio di Roio 67040 L Aquila, Italy http://www.diel.univaq.it/dews

University of L Aquila Center of Excellence DEWS Poggio di Roio 67040 L Aquila, Italy http://www.diel.univaq.it/dews University of L Aquila Center of Excellence DEWS Poggio di Roio 67040 L Aquila, Italy http://www.diel.univaq.it/dews Locating ZigBee Nodes Using the TI s CC2431 Location Engine: A Testbed Platform and

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

PART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES RECOMMENDATION ITU-R M.1188

PART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES RECOMMENDATION ITU-R M.1188 Rec. ITU-R M.1188 1 PART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES Rec. ITU-R M.1188 RECOMMENDATION ITU-R M.1188 IMPACT OF PROPAGATION ON THE DESIGN OF NON-GSO MOBILE-SATELLITE

More information

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman Antennas & Propagation CS 6710 Spring 2010 Rajmohan Rajaraman Introduction An antenna is an electrical conductor or system of conductors o Transmission - radiates electromagnetic energy into space o Reception

More information

Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios

Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios H. Fathi, J. Figueiras, F. Fitzek, T. Madsen, R. Olsen, P. Popovski, HP Schwefel Session 1 Network Evolution

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Least-Squares Intersection of Lines

Least-Squares Intersection of Lines Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a

More information

The Basics of FEA Procedure

The Basics of FEA Procedure CHAPTER 2 The Basics of FEA Procedure 2.1 Introduction This chapter discusses the spring element, especially for the purpose of introducing various concepts involved in use of the FEA technique. A spring

More information

3D Scanner using Line Laser. 1. Introduction. 2. Theory

3D Scanner using Line Laser. 1. Introduction. 2. Theory . Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

AP Physics 1 and 2 Lab Investigations

AP Physics 1 and 2 Lab Investigations AP Physics 1 and 2 Lab Investigations Student Guide to Data Analysis New York, NY. College Board, Advanced Placement, Advanced Placement Program, AP, AP Central, and the acorn logo are registered trademarks

More information

Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface

Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS. A Thesis Presented. Changfei Chen. The University of Vermont.

FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS. A Thesis Presented. Changfei Chen. The University of Vermont. FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS A Thesis Presented by Changfei Chen to The Faculty of the Graduate College of The University of Vermont In Partial Fulfillment

More information

Introduction to the Smith Chart for the MSA Sam Wetterlin 10/12/09 Z +

Introduction to the Smith Chart for the MSA Sam Wetterlin 10/12/09 Z + Introduction to the Smith Chart for the MSA Sam Wetterlin 10/12/09 Quick Review of Reflection Coefficient The Smith chart is a method of graphing reflection coefficients and impedance, and is often useful

More information

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency

More information

Antenna Properties and their impact on Wireless System Performance. Dr. Steven R. Best. Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013

Antenna Properties and their impact on Wireless System Performance. Dr. Steven R. Best. Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013 Antenna Properties and their impact on Wireless System Performance Dr. Steven R. Best Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013 Phone (603) 627-7877 FAX: (603) 627-1764 Email: sbest@cushcraft.com

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.

In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Key Priorities for Sub-GHz Wireless Deployment

Key Priorities for Sub-GHz Wireless Deployment Key Priorities for Sub-GHz Wireless Deployment Silicon Laboratories Inc., Austin, TX Introduction To build an advanced wireless system, most developers will end up choosing between two industrial, scientific

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

1 of 9 2/9/2010 3:38 PM

1 of 9 2/9/2010 3:38 PM 1 of 9 2/9/2010 3:38 PM Chapter 23 Homework Due: 8:00am on Monday, February 8, 2010 Note: To understand how points are awarded, read your instructor's Grading Policy. [Return to Standard Assignment View]

More information

Build Panoramas on Android Phones

Build Panoramas on Android Phones Build Panoramas on Android Phones Tao Chu, Bowen Meng, Zixuan Wang Stanford University, Stanford CA Abstract The purpose of this work is to implement panorama stitching from a sequence of photos taken

More information

Indoor Positioning Systems WLAN Positioning

Indoor Positioning Systems WLAN Positioning Praktikum Mobile und Verteilte Systeme Indoor Positioning Systems WLAN Positioning Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de Wintersemester 2015/16 WLAN Positioning

More information

Common Core State Standards for Mathematics Accelerated 7th Grade

Common Core State Standards for Mathematics Accelerated 7th Grade A Correlation of 2013 To the to the Introduction This document demonstrates how Mathematics Accelerated Grade 7, 2013, meets the. Correlation references are to the pages within the Student Edition. Meeting

More information

TIME DOMAIN. PulsON Ranging & Communications. Part Four: Tracking Architectures Using Two-Way Time-of-Flight (TW-TOF) Ranging

TIME DOMAIN. PulsON Ranging & Communications. Part Four: Tracking Architectures Using Two-Way Time-of-Flight (TW-TOF) Ranging TIME DOMIN PulsON Ranging & Communications Part Four: Tracking rchitectures Using Two-Way Time-of-Flight (TW-TOF) Ranging 320-0293 C June 2012 4955 Corporate Drive, Suite 101, Huntsville, labama 35805

More information

A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme

A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Troubleshooting Problems Affecting Radio Frequency Communication

Troubleshooting Problems Affecting Radio Frequency Communication Troubleshooting Problems Affecting Radio Frequency Communication Document ID: 8630 Refer to the Cisco Wireless Downloads (registered customers only) page in order to get Cisco Aironet drivers, firmware

More information

Epipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R.

Epipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R. Epipolar Geometry We consider two perspective images of a scene as taken from a stereo pair of cameras (or equivalently, assume the scene is rigid and imaged with a single camera from two different locations).

More information

A Real-Time Indoor Position Tracking System Using IR-UWB

A Real-Time Indoor Position Tracking System Using IR-UWB ASEAN IVO Forum 2015 @ Kuala Lumpur, Malaysia November 26th A Real-Time Indoor Position Tracking System Using IR-UWB Huan-Bang Li, Toshinori Kagawa, and Ryu Miura National Institute of Information and

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Frequency Assignment in Mobile Phone Systems

Frequency Assignment in Mobile Phone Systems Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Attacks on neighbor discovery

Attacks on neighbor discovery Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

At the completion of this guide you should be comfortable with the following:

At the completion of this guide you should be comfortable with the following: This guide provides instructions and best practices for deployment of the Yealink W52P IP DECT phones and repeaters RT10, which is intended for qualified technicians (or administrator) who will deploy

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

The Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008

The Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008 For Metro and Rural Wi-Fi Executive summary The current generation of conventional Wi-Fi metro access points use commoditized chipsets originally designed specifically for indoor environments. When brought

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Analog and Digital Signals, Time and Frequency Representation of Signals

Analog and Digital Signals, Time and Frequency Representation of Signals 1 Analog and Digital Signals, Time and Frequency Representation of Signals Required reading: Garcia 3.1, 3.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Data vs. Signal Analog vs. Digital Analog Signals

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Mobile Tracking and Resource Reservation Scheme for Cellular Networks

Mobile Tracking and Resource Reservation Scheme for Cellular Networks Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

You will need the following pieces of equipment to complete this experiment:

You will need the following pieces of equipment to complete this experiment: UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING The Edward S. Rogers Sr. Department of Electrical and Computer Engineering ECE422H1S: RADIO AND MICROWAVE WIRELESS SYSTEMS EXPERIMENT 3:

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 2007 Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Christof Röhrig and Frank

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength

Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength Mr. G.V.V.S.N. Babji, E. Nageswara Rao M.Tech Scholar, Prof & HOD, Abstract - Locating the site of a mobile user with a high

More information

The Graphical Method: An Example

The Graphical Method: An Example The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,

More information

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE As a general purpose e-mail system, IBM Lotus Notes/Domino (Domino) provides powerful e-mail authoring, transport,

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Lecture 1. Introduction to Wireless Communications 1

Lecture 1. Introduction to Wireless Communications 1 896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Sensors and Cellphones

Sensors and Cellphones Sensors and Cellphones What is a sensor? A converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument What are some sensors we use every

More information

Scanning with Sony Ericsson TEMS Phones. Technical Paper

Scanning with Sony Ericsson TEMS Phones. Technical Paper Scanning with Sony Ericsson TEMS Phones Technical Paper Scanning with Sony Ericsson TEMS Phones 2009-05-13 Ascom 2009. All rights reserved. TEMS is a trademark of Ascom. All other trademarks are the property

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information