Results 1 - 10
of
12,873
Physical Layer
"... Long Term Evolution (LTE) is an advanced standard of the mobile communication systems. LTE has been developed by the 3 rd Generation Partnership Project (3GPP). The new features exhibited by LTE is a direct impact of applying new modulation and coding techniques such as the Orthogonal Frequency Divi ..."
Abstract
- Add to MetaCart
Division Multiplexing (OFDM) for the Downlink and the Single Carrier Frequency Division Multiple Access (SC-FDMA) for the Uplink as well as turbo coding. This paper presents a Field Programmable Gate Array (FPGA) design and implementation of the transmitter of the LTE downlink physical layer according
PHYSICAL LAYER
, 2003
"... CCSDS Historical Document This document’s Historical status indicates that it is no longer current. It has either been replaced by a newer issue or withdrawn because it was deemed obsolete. Current CCSDS publications are maintained at the following location: ..."
Abstract
- Add to MetaCart
CCSDS Historical Document This document’s Historical status indicates that it is no longer current. It has either been replaced by a newer issue or withdrawn because it was deemed obsolete. Current CCSDS publications are maintained at the following location:
Hot topic: physical-layer network coding
- in Proc. of ACM Mobicom
, 2006
"... A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated ..."
Abstract
-
Cited by 190 (18 self)
- Add to MetaCart
more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). The goal of this paper is to show how the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks
Multicarrier Authentication at the Physical Layer
"... Authentication is the process where claims of identity are verified. Though authentication mechanisms typically exist above the physical layer, physical layer methods have recently been introduced that do not require extra bandwidth. In this paper we propose a multi-carrier extension to the work and ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Authentication is the process where claims of identity are verified. Though authentication mechanisms typically exist above the physical layer, physical layer methods have recently been introduced that do not require extra bandwidth. In this paper we propose a multi-carrier extension to the work
Physical-Layer Authentication
"... Abstract—Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread-spectrum communications) exist at the physical layer often with an additional cost in ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Abstract—Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread-spectrum communications) exist at the physical layer often with an additional cost
Development of the FDDI Physical Layer
- Digital Technical Journal
, 1991
"... The engineering development of the FDDI physical layer resulted in the delivery of components, specifications, and protocols. The development presented new design problems related to the technology and to the operation of token rings. The choice of the most appropriate technologies for the chip set ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The engineering development of the FDDI physical layer resulted in the delivery of components, specifications, and protocols. The development presented new design problems related to the technology and to the operation of token rings. The choice of the most appropriate technologies for the chip set
Attacks on physical-layer identification
- In Proc. of WiSec
, 2010
"... Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperfections exhibited by its radio transceiver. It can be used to improve access control in wireless networks, prevent device ..."
Abstract
-
Cited by 23 (1 self)
- Add to MetaCart
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperfections exhibited by its radio transceiver. It can be used to improve access control in wireless networks, prevent
Quantum security for the physical layer
- Communications Magazine, IEEE
, 2013
"... Abstract—The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections. In this tutorial, we describe how the field of quantum communication offe ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract—The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections. In this tutorial, we describe how the field of quantum communication
Physical-layer MIMO relaying
- In Proc. Int. Symp. Inform. Theory (ISIT
"... Abstract—The physical-layer network coding (PNC) approach provides improved performance in many scenarios over “tra-ditional ” relaying techniques or network coding. This work addresses the generalization of PNC to wireless scenarios where network nodes have multiple antennas. We use a recent ma-tri ..."
Abstract
-
Cited by 5 (5 self)
- Add to MetaCart
Abstract—The physical-layer network coding (PNC) approach provides improved performance in many scenarios over “tra-ditional ” relaying techniques or network coding. This work addresses the generalization of PNC to wireless scenarios where network nodes have multiple antennas. We use a recent ma
Results 1 - 10
of
12,873