SlideShare a Scribd company logo
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

Frame and Burst Acquisition in TDMA Satellite
Communication Networks with Transponder
Hopping
Vitalice K. Oduol and Cemal Ardil

International Science Index 28, 2009 waset.org/publications/6074

Abstract—The paper presents frame and burst acquisition in a
satellite communication network based on time division multiple
access (TDMA) in which the transmissions may be carried on
different transponders. A unique word pattern is used for the
acquisition process. The search for the frame is aided by
soft-decision of QPSK modulated signals in an additive white
Gaussian channel. Results show that when the false alarm rate is low
the probability of detection is also low, and the acquisition time is
long. Conversely when the false alarm rate is high, the probability of
detection is also high and the acquisition time is short. Thus the
system operators can trade high false alarm rates for high detection
probabilities and shorter acquisition times.
Keywords—burst acquisition, burst time plan, frame acquisition,
satellite access, satellite TDMA, unique word detection
I. INTRODUCTION

T

HE paper presents the frame and burst acquisition in a
satellite communication network consisting of a set of
traffic stations (also referred to as terminals) and a master
reference station as shown in Fig.1 The access to the satellite
resources can be achieved in many ways. Satellite
communications multiple access is discussed extensively in
several texts [1-6]. In the method of time division multiple
access (TDMA) a frame is divided into time slots, which are
shared among the terminals. A master station with visibility of
the whole network maintains access discipline and scheduling

of the transmissions as well as the position and duration of
each burst in the frame; additionally the name or identification
of the originating station is indicated. For some networks,
such as the INTELSAT system, the BTP also shows the
destination station as well as whether as order wires [7]. In
the example satellite communication network of Fig.1 there
are four traffic terminals that share the satellite resources via
TDMA. The terminals transmit their bursts in sequence as
shown, with the master reference station maintaining the
timing sequence.
For its proper operation TDMA requires synchronization so
that the bursts arrive at the satellite in the allotted time slots.
The success of synchronization depends on the co-operating
stations, reference station, motion of the satellite and
estimation methods. In some systems a secondary reference
station is used to send timing corrections to communicating
station pairs whose mutual bursts are visible from the
reference.
Fig.2 shows the frame and burst structure for the TDMA
satellite network. Each traffic terminal receives a reference
burst from the master station.
Frame

R

From
A

Satellite

Frame

From
B

R

From
A

From
B

Terminal A
Burst

A

B

C

Reference
Burst

D

TDMA Frame at the Satellite

G

CBR

G
CBTR UW SIC Q
-

Tr

A

a ff
ic
Te
rm

UW SIC G CBTR UW SIC OW

Data
To
B

To
C

To
Z

Q

guard time
carrier and bit timing recovery
unique word
station identification code
postamble

ina

B

Preamble

ls

C

D

Fig.2 Frame and burst structure for a TDMA satellite network

Master Reference
Terminal

Fig.1 Example TDMA satellite network consisting of traffic
terminals and a master reference terminal

during the frame each terminal is allowed to transmit a burst
according to a burst transmission plan (BTP). For every
transponder the BTP specifies the frequency and polarization
V. K. Oduol is with the Department of Electrical and Information
Engineering, University of Nairobi, Nairobi, Kenya (+254-02-318262
ext.28327, vkoduol@uonbi.ac.ke, http://www.uonbi.ac.ke )
Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan .

The reference burst consists of bit patterns for carrier and
bit timing recovery (CBTR), the unique word, used to resolve
phase ambiguity associated with coherent demodulation, and
finally the station identification code (SIC). Timing phase
ambiguity may arise due to the carrier and clock recovery
method used [2].
The analysis presented in this paper concentrates on the
unique word detection at a traffic terminal; it is assumed that
carrier recovery and bit timing have been partially

54
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

accomplished using the CBTR pattern. Fundamental to the
synchronization of any TDMA satellite communication
system is the acquisition of the frame.
Transponder Hopping
A single TDMA terminal can extend its capacity by having
access to several down link beams by transponder hopping. In
one frame the bursts can be sent on different frequencies or
different polarizations. That is a terminal is able in one frame
to send a burst on one transponder and another burst on
another transponder. In such a network each terminal trying
to gain acquisition must use the received signals and employ a
search strategy that accommodates the may transponders that
may be in use.

The rest of the paper is organized as follows. Section II
presents the system model in which the acquisition procedure
is outlined. It is in this section that the frame acquisition time
is derived in terms of the parameters to be obtained later from
the modulation and demodulation. Section III presents the
QPSK modulation and demodulation and prepares the for the
derivation of the detection variable of Section IV. Section V
discusses the probability of false alarm. Section VI presents
the probability of detection and finally Section VII presents
the results and conclusion.

When the search parameters are for any transponder other
than the one in use (k in this case) there can be one of two
subsequent events. Either a false detection occurs or the
systems proceeds to adjust the search parameters for the next
transponder. Any detection (false or otherwise) is followed
by a verification during the next frame, and therefore
consumes two frame times, as is indicated in Fig.2 by the
factor z2.
When there is no detection the system proceeds to the next
frame in one step. This is signified by the factor z. When there
is a false detection it is assumed that the verification stage will
indicate that there no unique word, and the system will
proceed to look over next transponder. Thus in both cases, the
receiver proceeds to the next transponder, one case occurring
in two frames, while the other takes only one frame.
When the receiver searches over transponder k, it is possible
to have detection of the unique word. It is also possible to
miss the unique word altogether; in which case the receiver
proceeds to the next transponder after one frame. This requires
two frames.
Unique Word Acquisition Time
Fig.3 shows the signal flow diagram for the generating
function TD(z) of the time to the acquisition of the unique
word pattern. The function H0(z) in the figure is given by
H 0 ( z)

II.

SYSTEM MODEL

The unique word search procedure is depicted in Fig.2,
which illustrates the case where the traffic terminal expects
one of N transponders. For purposes of definiteness the figure
is illustrated with N = 8. The labels, k, k+1, …, k+7, in the
circles are given modulo-8. Search procedures are commonly
employed in the acquisition of spread spectrum signals are
discussed in [8] and more recently in [9] and [10].

z 2 PF

PF

and represents the fact that there are two event paths for
proceeding to the next transponder when there is unique
word. The first block in the figure signifies the fact the system
may start the search q steps from the transponder containing
the unique word. Once the transponder with the unique word
is reached, the system proceeds in a sequence with a positive
feedback.

PD

PF

UW
Detected

z 2 PF

False
Detection

k+4

z 2 PF

z 2 PF

z1

z 2 PD

z 2 PF

k+1

F

z1

P

k

z 2 PF

1

z

z PF

k+2

k+3
z 1

Fig.3 Signal flow for the unique word acquisition time

PF

z 2 PF

z 1

k+7

N
z(1 PD )H0 1( z)

k+5

2

PF

z 2PD

H 0 ( z)

PF

k+6

z 1

1

(1)

z 1 PF

q

z 1

z

International Science Index 28, 2009 waset.org/publications/6074

A typical earth station attempts to gain synchronization
from one transponder, and if that fails it tries another one until
it succeeds. One advantage of this multi-frequency system is
that the transmissions can be achieved at lower peak
power [1]. Of course in the frequency domain the TDMA
carriers are separated by guard bands.

polarizations may be used to account for the transponders
used. The search can begin in any one of the circles, and it is
assumed that the unique word is present at location k (i.e.
transponder k).

PF

Fig.2 Search procedure for the unique word pattern

If the unique word is missed then all the intervening N-1
transponders must be searched before returning to the right
one. This explains the role of the block in the feedback path.
The block at the right of the figure represents detection ,
which requires two fames.
Depending on the starting transponder (q steps away), the
conditional moment generating function TD(z | q) is

The search method used in this paper resembles the serial
search method of [11] except that here several frequencies and

TD ( z | q )

55

q
z 2 PD H 0 ( z )
N
1 z 1 PD H 0 1 ( z )

(2)
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

(
anI )

When the transponder q is used with probability q, then the
moment generating function TD(z) for the acquisition time can
be obtained by averaging (2) over q to give
N 1

TD ( z )

q 0

q
q H 0 ( z)

2

International Science Index 28, 2009 waset.org/publications/6074

q 0

dz

1
z 1

1
P
D

1
P
D
P
F

1)

(5)

(
2 E b h (t ) q n I ) cos 2

r (t )

TAcq

1

1
1
2

(
2 Eb h(t ) a nI ) cos 2

q q

(
anQ ) sin 2

f 0t

q 0

P (N
F

1)

X

At the receiver the demodulator uses the structure shown in
Fig.5. As in Fig.4, two carriers in phase quadrature are used.

Y (I )
2

n 1

X
+

90O

X

Z

X

f 0t

(Q
an )

X

hM (t )

N

+

Y (Q )
2

n 1

Fig.5 QPSK Demodulator

The resulting signals have double frequency terms, which are
removed by the filter, leaving

The QPSK modulator and demodulator used in the TDMA
satellite system are shown Fig.4 and Fig.5, respectively. The
(I
(Q
in-phase and quadrature data streams a n ) and an ) are used as

These are then carried on two carriers of the same frequency
but in phase quadrature, and summed to produce the
transmitted signal, as shown at the bottom of the diagram of
Fig.4. On passing through the channel the signal incurs
additive white Gaussian noise.

N

+

(Q
an )

f 0t

2 sin 2

impulse inputs to pulse shaping linear systems of impulse
response h(t) and transfer function H(f).

(7)

f 0t

f 0t

X

hM (t )

(6)

QPSK MODULATION AND DEMODULATION

(
q nQ ) sin 2

f 0t

(
an I )

Since the probability PD of detection depends on the
probability PF of false alarm and the signal to noise ratio, the
dependence of the acquisition time on the system parameters
will be given after the contribution of the modulation and
demodulation. These are addressed in the next section.
III.

(
anQ ) sin 2 f 0t

(I
(I
(Q
(Q
The variables qn ) and qn ) are used in place of a n ) and an ) to
signify the fact that the latter pair could have been altered in
transit. In both the I and the Q channels, the received signal is
first multiplied by the corresponding carrier signal (cos2 fot
or sin2 fot) and then filtered by a matched filter with impulse
response hM(t) and transfer function is HM(f) = H*(f).

2 cos 2

1
P
D

X

The figure incorporates an unknown phase to account for
phase differences between the transmitting and receiving
carriers. The received signal (excluding the noise term) is
given by

If the transponders are deployed with equal probability the
sum in (5) equals (N-1)/2. In that case the mean acquisition
time (5) becomes
1
P
D

h(t)
(
2 Eb h(t ) anI ) cos 2 f 0t

N 1

1

sin( 2 f 0 t )

(Q
an )

Fig. 4. QPSK Modulator

P (N
F

1 1

+

90 o

(4)

The probabilities PD and PF of detection and false alarm,
respectively, appearing explicitly or otherwise in (2) and (3)
and also in Fig.2 and Fig.3, depend on the modulation and
channel type and conditions. The next section discusses how
these quantities are determined for a QPSK modulation
system that uses a soft-decision approach to the demodulation
in an additive Gaussian noise channel. Although the
discussion covers expressions that would incorporate timing
error, the results given assume perfect timing. Including the
effects of timing errors would make the paper too long. The
mean acquisition time is then obtained from TD(z) and taking
the derivative of TD(z) at z = 1.
dTD ( z )

cos( 2 f 0 t )

q = 1/N)

N
1 1 H 0 ( z)
N 1 H 0 ( z)

q
q H 0 ( z)

X

(3)

z PD
N
1 z 1 PD H 0 1 ( z )

If the transponders are used with equal probability (
then the sum in (3) becomes
N 1

h(t)

r (t )

r (t )

2 cos 2 f 0 t

2 sin 2 f 0 t

(
E b h ( t ) q n I ) cos

E b h (t )

q

(I )
n

sin

(
q n Q ) sin

q

(Q )
n

cos

(8)
(9)

The matched filter outputs are sampled at t = nT + . This
assumes a clock timing offset of seconds from the desired
instant. Letting R( ) be the relative matched filter output, it is
assumed in what follows that the sampling is done at t = .
That is,
2
(10)
R( ) 2
H ( f ) cos 2 f df
0
The two options of band-limited and time-limited forms are
given in [1] for the pulse-shaping function H(f), resulting in

56
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

R( )

R( )

/T

1

T

time-limited

(11)

T

0

band-limited

/T
/T

sin

(12)

In addition to (11) and (12), one pulse shape that has gained
popularity is the root raised cosine (RRC) pulse which in the
frequency domain has the following squared magnitude
representation

1
2

2

H f

1

f

1
1
cos
2

T

1

f

2T

1

f

2T

2T

If there is no timing error then the matched filter response is
at its peak, i.e R( ) 1 .

Y

(Q )

N

1
2
1
2

1
2
1
2

(
(
anI ) qnI )

(
(
anI ) qnI )

(
(
a n I ) q nQ )

E b R ( ) cos

(
(
a nQ ) q n I )

(15)

n 1

0 , 1, 2 ,

(19)

,N

otherwise

2

N

N

m

m

N /2

0

0, 1, 2,

,

N
2

(20)

otherwise

Exploiting the obvious symmetry in (20a) and (20b), it is
clear that the mean is zero and the mean square is unity. That
is, when the unique word is absent, E R aq
0 and
1.

2
E R aq

We can therefore write

E Y (I )

x

EY

y

x

y

N Eb R( ) cos

(Q )

UW present

(21)

UW absent

(22)

N Eb R( ) sin

E Y(I )

E Y(Q)

0

In the absence of the unique word, the random sequences can
be considered as noise, and the analysis can proceed by
assuming that the introduced noise is also Gaussian (certainly
true if N is large enough). This assumption is necessary for
mathematical tractability of the analysis.

N

E b R ( ) sin

V (I )

n 1

N
(
(
a nQ ) q n I )

E b R ( ) cos

(
(
a n I ) q nQ )

(16)

n 1
N
(
(
a nI ) q nI )

E b R ( ) sin

(
(
a nQ ) q nQ )

V

Random Sequences as Noise
If the sequences are considered as noise, then total noise in the
channel is still Gaussian, with zero mean and variances given
by

(Q )

Var Y

n 1

where the noise terms V ( I ) and V (Q ) are independent and
normally distributed, each with zero mean and variance
NN0/2. At this point it convenient to define the correlations
via the matrix
(I )
aq
( QI )
aq

0

2m
N

Pr R aq

2

Y (I )

k

This can be written in the equivalent form as

Returning to the sampled filter outputs, it is observed that the
(
(
I-channels value is 1 E b R ( ) q n I ) cos
q nQ ) sin , while
2
(
(
the Q-channel one is 1 E b R ( ) q nQ ) cos
q n I ) sin .
These quantities are multiplied by local copies of the unique
word pattern and summed, resulting in a correlation values
for the I-and Q- channels. From Fig.5, prior to the squaring
elements, the I-channel and Q-channel variables are

N
k

N

2

1

2T

The parameter is the excess bandwidth, and is restricted to
the values 0
1. The relative matched filter response for
this pulse shape is the inverse Fourier transform of (13), and is
seen to be
sin
/ T cos
/T
(14)
R( )
/T 1 4 2 2 /T 2
International Science Index 28, 2009 waset.org/publications/6074

2k
N

Pr R aq

1

f

0

(13)

2T

1

In absence of the unique word, these four sums are random
variables that are identically distributed, since they are
obtained by correlating a random sequence by a known
sequence (the unique word). The result is obtained by
considering that to get k agreements and N - k disagreements
between the known unique word sequence and the random
sequence, producing an output of 2k–N, is equivalent to
having k successes in N trials of a Bernoulli process with
probability of success p = ½. Finally the resulting sum is
divided by N. Therefore

1
N
1
N

( IQ )
aq
(Q )
aq

R

R

R

R

N
(
(
a nI ) q nI )
n 1
N
(
(
a nQ ) q n I )
n 1

1
N
1
N

n 1
N

R

=R

(Q )
aq

=1

( IQ
(QI
R aq ) = R aq ) = - 1.

(Q )

2
0

(23)

NE b R ( ) E R

2
aq

gives

NN 0 / 2
NN 0 / 2

2
0
2

0

2
Substituting for E R aq

(17)

UW present
2

NEb R ( )

(24)

UW absent

(
(
a nQ ) q nQ )
n 1

and note that in the presence of the unique word, these
correlations are found to be
(I )
aq

Var Y
NN
2

N
(
(
a n I ) q nQ )

(I )

(18a)
(18b)

IV.

THE

DETECTION

VARIABLE

When the unique word is present the detection variable
2
2
Z
Y (I )
Y ( Q ) incorporate the fact that the in-phase and
quadrature means are now E Y ( I ) N Eb R( ) cos , and

57
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

N Eb R( ) sin . The joint probability density function

E Y (Q)

for the two variables
1

exp

2
0

2

2
2 0

2

x

2

y

x

(25)

y

contains a quadratic term in the exponent which can be
expressed in polar form as
2

x

r2

y

N 2 Eb R 2 ( )

(26)

2
0

exp

1
2

2
0

(27)

The random phase is uniformly distributed in 0
2 .
Therefore, we can obtain marginal density function by
averaging over
r

where

2
0

I0 ( x)

1 2
r
2
2 0

exp

1
2

NrR( ) Eb

N 2 E R2 ( ) I 0
b

(28)

PD

1
2

2
0

1
2

exp
2
0

The variance

2
0

1
2

2
0

z 4N 2 Eb R2 ( ) I0

2
0

N R( ) zEb

PD

(29)

2
0

is given by (24). The next section addresses

the case for the absence of the unique word.
V. THE PROBABILITY

OF

N

R2 ( )

(32)

ln PF

OF

DETECTION

exp

1
2

2
0

z N 2 Eb R2 ( ) I0

N R( ) zEb
2
0

dz

(33)

Using the series expression for the modified Bessel function
I0(x), we can express the expression for PD as
exp

2 R 2 ( ) PF
2

m 0

function of order zero. The detection variable has probability
density function fZ(z) given by
f Z ( z)

ln PF ,

In the presence of the unique word the detection variable
has probability density function given (29). The unique word
is missed if the detection variable falls below the threshold ,
otherwise detection occurs. The probability of detection PD is
given by

is the modified Bessel

exp(x cos )d

2
0

NE b /( N 0 / 2) is the signal to noise ratio.

where

R ( )
m!

m m

/ N R2 ( )

1

(34)
2

ln PF 1

/N R ( )

q

q!

q 0

VII. RESULTS AND CONCLUSION
One set of results for the probability of detection assumes
that there are no timing errors, i.e. that R( ) = R(0) = 1. Fig.6
shows the variations of the probability of detection for N = 64
and different values of the channel signal to noise ratio.

1.0E+00

FA LSE ALARM

SNR= 15 dB

In the absence of the unique word the probability density
2

2

1.0E-02

(Q )
is
function for the detection variable Z Y ( I )
Y
obtained from (29) by setting to zero the terms containing Eb
since these are the terms that arise from the means of the
in-phase and quadrature components as given in (22).
Accordingly the probability density function is given by

fZ (z)

where from (24)

1
2
exp( z / 2 0 )
2
2 0
2
0

Probability of Detection

International Science Index 28, 2009 waset.org/publications/6074

1
1
exp
2N r R( ) Eb cos
2
2
2 0

f R (r)

1

VI. THE PROBABILITY

r 2 N 2 Eb R2 ( )

2

taking the appropriate value in (24). It is possible to

In polar form, the joint density function becomes
r

can re-written as

determine the probability of detection as a function of the
false alarm probability. In preparation for that the following is
pertinent.

2 N r R ( ) Eb cos

f R (r, )

2
/2 0

e

2 NN0 / 2

2

y

x

2
0

with

1

f XY ( x , y )

The result PF

1.0E-04

(30)

-10dB

1.0E-10
1.0E-16

1.0E-12

1.0E-08

1.0E-04

1.0E+00

Probability of False Alarm

1

e

0 dB
-5 dB

1.0E-08

NE b R 2 ( ) NN 0 / 2 . The probability of

2

5 dB

1.0E-06

false alarm is then the probability that the detection variable
exceeds a set threshold.

PF

10 dB

2
0

exp( z / 2

2
0

)dz

(31)

Fig. 6 Variation of the Probability of detection with the signal to
noise ratio and false probability

2
/2 0

58
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009

From Fig.6 it is clear that probability of detection increases
with the signal to noise ratio, and also with false alarm
probability.

When the false alarm probability is low (e.g. PF = 10-8 in
Fig.7), the probability of detection is low but increases with
the signal to noise ratio. When the false alarm probability is
high (e.g. PF = 0.316 in Fig.7), the probability of detection is
higher and increases with the signal to noise ratio.
1.00
0.90

PFA = 0.316

Probability of Detection

0.80

PFA = 0.1

0.70
0.60

PFA = 10-2

0.50
0.40

PFA=10-4

0.30
0.20

PFA = 10-8

0.10
0.00
-12

-8

-4

0

4

8

12

16

20

Signal to Noise Ratio [dB]

Fig.7 Variation of the probability of detection with signal to noise
ratio along curves of constant false alarm rate
1.0E+07
Acquisition Time [seconds]

International Science Index 28, 2009 waset.org/publications/6074

Effect of Timing Errors
The presentation given so far allows for a non-zero timing
error, i.e. for R( ) < 1. When timing occur, their effect in the
probability of detection as is evident in (34) is to reduce the
effective signal to noise ratio. Every occurrence of the signal
to noise ratio is multiplied by R2( ). That is the curves in Fig.6
will shift down by an amount equivalent to R2( ) expressed
in dB. For example if R2( ) =0.64 the reduction is by about
2 dB. In order to have a clearer interpretation of this it is
better to present the detection times and probabilities against
the signal to noise ratio with the false alarm probability held
temporarily constant.

PFA = 10-8

1.0E+06

PFA = 10-4

1.0E+05

PFA = 10-2

1.0E+04
PFA = 0.1

1.0E+03

PFA = 0.316

1.0E+02
1.0E+01
1.0E+00
-10

-5

0

5

10

15

20

Signal to Noise Ratio [dB]

Referring to Fig.8, it is seen that when the false alarm
probability is low (e.g. PF = 10-8 ), the acquisition time is long
but decreases with the signal to noise ratio, and when the false
alarm probability is high (e.g. PF = 0.316), the acquisition
time is long shorter and decreases with the signal to noise
ratio.
What has emerged here is that high false alarm rate can be
tolerated in order to have greater probability of detection and
shorter acquisition times. The effect of timing errorson these
results is to shift down the curves of Fig.7 (lowering detection
probabilities) and shift the curves of Fig.8 (increasing the
acquisition time). What was also observed was that as the
length N of the unique word was increased, the performance
get better.
REFERENCES
[1] E. Lutz, M. Werner, A. Jahn, Satellite Systems for Personal and
Broadband Communications, Springer, 2000D.
[2] Roddy, Satellite Communications, 2nd Ed., McGraw-Hill 1996
[3] G. Maral, M.Bousquet, Satellite Communications Systems: Systems,
Techniques And Technology, John Wiley & Sons 1999
[4] J. N. Pelton, The Basics of Satellite Communications, 2nd
EditionInternational Engineering Consortium 2006.
[5] S. Tirró, Satellite Communication System Design, Springer 1993
[6] M. Richharia, Satellites Communications Systems, McGraw-Hill 1999
[7] D. I. Dalgleish, An Introduction to Satellite Communications, Institution
of Engineers, IET 1989
[8] A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication,
Prentice-Hall, 1995
[9] S.H.Won, and L.Hanzo, “Analysis of Serial Search Based Code
Acquisition in Multiple Transmit Antenna Aided DS-CDMA Downlink”
In: IEEE VTC'05 (Fall), 25-28 September 2005, Intercontinental Hotel,
Dallas, Texas, USA.
[10] H.Puska, H.Saarnisaari, J.Iinatti, P.Lilja, “Serial search code acquisition
using smart antennas with single correlator or matched filter”, IEEE
Transactions on Communications, Vol.:56, No.2 pp. 299-308, Feb.2008
[11] S.Glisic, B. Vucetic, Spread Spectrum CDMA Systems For Wireless
Communications, Artech House 1997
Vitalice K. Oduol received his pre-university education at Alliance High
School in Kenya. In 1981 he was awarded a CIDA scholarship to study
electrical engineering at McGill University, Canada, where he received the
B.Eng. (Hons.) and M.Eng. degrees in 1985 and 1987, respectively, both in
electrical engineering. In June 1992, he received the Ph.D. degree in electrical
engineering at McGill University.
He was a research associate and teaching assistant while a graduate student
at McGill University. He joined MPB Technologies, Inc. in 1989, where he
participated in a variety of projects, including meteor burst communication
systems, satellite on-board processing, low probability of intercept radio,
among others. In 1994 he joined INTELSAT where he initiated research and
development work on the integration of terrestrial wireless and satellite
systems. After working at COMSAT Labs. (1996-1997) on VSAT networks,
and TranSwitch Corp.(1998-2002) on product definition and architecture, he
returned to Kenya, where since 2003 he has been with Department of
Electrical and Information Engineering, University of Nairobi.
Dr. Oduol was a two-time recipient of the Douglas tutorial scholarship at
McGill University. He is currently chairman, Department of Electrical and
Information Engineering, University of Nairobi. His research interests include
performance analysis, modeling and simulation of telecommunication
systems, adaptive error control, feedback communication.

25

Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan

Fig.8 Variation of the acquisition time with signal to noise ratio
along curves of constant false alarm rate

59

More Related Content

What's hot

Chap2 ofdm basics
Chap2 ofdm basicsChap2 ofdm basics
Chap2 ofdm basics
Karuthapandi A
 
Blind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systemsBlind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systems
trungquang0207
 
ofdma doppler
ofdma dopplerofdma doppler
ofdma doppler
Julia Urbina-Pineda
 
H44093641
H44093641H44093641
H44093641
IJERA Editor
 
Paper id 22201419
Paper id 22201419Paper id 22201419
Paper id 22201419
IJRAT
 
Performance and Analysis of OFDM Signal Using Matlab Simulink
Performance and Analysis of OFDM Signal Using Matlab  SimulinkPerformance and Analysis of OFDM Signal Using Matlab  Simulink
Performance and Analysis of OFDM Signal Using Matlab Simulink
IJMER
 
A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...
TELKOMNIKA JOURNAL
 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal technique
ijwmn
 
Ncc2004 ofdm tutorial part i-rvr
Ncc2004 ofdm tutorial   part i-rvrNcc2004 ofdm tutorial   part i-rvr
Ncc2004 ofdm tutorial part i-rvr
Arpan Pal
 
Frame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANFrame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMAN
Pushpa Kotipalli
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
ijwmn
 
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert PairsReview on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
ijtsrd
 
Mobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentationMobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentation
Pierre LARREGLE
 
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
IJCNCJournal
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd Iaetsd
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
IOSR Journals
 
Dq31784792
Dq31784792Dq31784792
Dq31784792
IJERA Editor
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Communication Systems & Networks
 
Lte phy fundamentals
Lte phy fundamentalsLte phy fundamentals
Lte phy fundamentals
derejew
 
Signal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systemsSignal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systems
Neil Christian Bonilla
 

What's hot (20)

Chap2 ofdm basics
Chap2 ofdm basicsChap2 ofdm basics
Chap2 ofdm basics
 
Blind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systemsBlind channel estimation for mimo ofdm systems
Blind channel estimation for mimo ofdm systems
 
ofdma doppler
ofdma dopplerofdma doppler
ofdma doppler
 
H44093641
H44093641H44093641
H44093641
 
Paper id 22201419
Paper id 22201419Paper id 22201419
Paper id 22201419
 
Performance and Analysis of OFDM Signal Using Matlab Simulink
Performance and Analysis of OFDM Signal Using Matlab  SimulinkPerformance and Analysis of OFDM Signal Using Matlab  Simulink
Performance and Analysis of OFDM Signal Using Matlab Simulink
 
A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...
 
Spatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal techniqueSpatial multiplexing ofdmoqam systems with time reversal technique
Spatial multiplexing ofdmoqam systems with time reversal technique
 
Ncc2004 ofdm tutorial part i-rvr
Ncc2004 ofdm tutorial   part i-rvrNcc2004 ofdm tutorial   part i-rvr
Ncc2004 ofdm tutorial part i-rvr
 
Frame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANFrame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMAN
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
 
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert PairsReview on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
 
Mobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentationMobile antennae general Beamforming principles presentation
Mobile antennae general Beamforming principles presentation
 
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiver
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 
Dq31784792
Dq31784792Dq31784792
Dq31784792
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
 
Lte phy fundamentals
Lte phy fundamentalsLte phy fundamentals
Lte phy fundamentals
 
Signal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systemsSignal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systems
 

Viewers also liked

UHP_JUN16E
UHP_JUN16EUHP_JUN16E
UHP_JUN16E
UHP Networks
 
Smart antenna made_by_nitmas_2008-12_batch
Smart antenna made_by_nitmas_2008-12_batchSmart antenna made_by_nitmas_2008-12_batch
Smart antenna made_by_nitmas_2008-12_batch
Souptik123
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
Jim Jenkins
 
Satellite ppt
Satellite pptSatellite ppt
Satellite ppt
Divya Shukla
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
Dileep Kadavarath
 
TDMA
TDMATDMA
Satelite communication
Satelite communicationSatelite communication
Satelite communication
Syam Kumar
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 

Viewers also liked (8)

UHP_JUN16E
UHP_JUN16EUHP_JUN16E
UHP_JUN16E
 
Smart antenna made_by_nitmas_2008-12_batch
Smart antenna made_by_nitmas_2008-12_batchSmart antenna made_by_nitmas_2008-12_batch
Smart antenna made_by_nitmas_2008-12_batch
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
 
Satellite ppt
Satellite pptSatellite ppt
Satellite ppt
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
TDMA
TDMATDMA
TDMA
 
Satelite communication
Satelite communicationSatelite communication
Satelite communication
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 

Similar to Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-transponder-hopping

Point Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTEPoint Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTE
AM Publications
 
Topology estimation of a digital subscriber line
Topology estimation of a digital subscriber lineTopology estimation of a digital subscriber line
Topology estimation of a digital subscriber line
IAEME Publication
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
Alexander Decker
 
G010323739
G010323739G010323739
G010323739
IOSR Journals
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
ijwmn
 
Double sliding window variance detection-based time-of-arrival estimation in...
Double sliding window variance detection-based time-of-arrival  estimation in...Double sliding window variance detection-based time-of-arrival  estimation in...
Double sliding window variance detection-based time-of-arrival estimation in...
IJECEIAES
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
IOSR Journals
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
IJNSA Journal
 
A simplified spatial modulation MISO-OFDM scheme
A simplified spatial modulation MISO-OFDM schemeA simplified spatial modulation MISO-OFDM scheme
A simplified spatial modulation MISO-OFDM scheme
TELKOMNIKA JOURNAL
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMJoint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
idescitation
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd Iaetsd
 
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
IOSR Journals
 
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
IOSR Journals
 
Channel estimation
Channel estimationChannel estimation
Channel estimation
Prashant Sengar
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
ijwmn
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
IJEEE
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
IJRTEMJOURNAL
 
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdfOn_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
MohammadRAssaf
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
IRJET Journal
 

Similar to Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-transponder-hopping (20)

Point Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTEPoint Sum Average Peak Algorithm Detection of LTE
Point Sum Average Peak Algorithm Detection of LTE
 
Topology estimation of a digital subscriber line
Topology estimation of a digital subscriber lineTopology estimation of a digital subscriber line
Topology estimation of a digital subscriber line
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 
G010323739
G010323739G010323739
G010323739
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
 
Double sliding window variance detection-based time-of-arrival estimation in...
Double sliding window variance detection-based time-of-arrival  estimation in...Double sliding window variance detection-based time-of-arrival  estimation in...
Double sliding window variance detection-based time-of-arrival estimation in...
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
 
A simplified spatial modulation MISO-OFDM scheme
A simplified spatial modulation MISO-OFDM schemeA simplified spatial modulation MISO-OFDM scheme
A simplified spatial modulation MISO-OFDM scheme
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMJoint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
 
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
 
Channel estimation
Channel estimationChannel estimation
Channel estimation
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdfOn_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
On_DMRS_Tracking_Mode_Synchronization_in_Fifth_Generation_New_Radio.pdf
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 

More from Cemal Ardil

Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Cemal Ardil
 
The main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-systemThe main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-system
Cemal Ardil
 
The feedback-control-for-distributed-systems
The feedback-control-for-distributed-systemsThe feedback-control-for-distributed-systems
The feedback-control-for-distributed-systems
Cemal Ardil
 
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
Cemal Ardil
 
Sonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposalSonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposal
Cemal Ardil
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systems
Cemal Ardil
 
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Cemal Ardil
 
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-psoReduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Cemal Ardil
 
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-designReal coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Cemal Ardil
 
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
Cemal Ardil
 
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcgaOptimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Cemal Ardil
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Cemal Ardil
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particles
Cemal Ardil
 
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centersOn the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
Cemal Ardil
 
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equationOn the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
Cemal Ardil
 
On problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-objectOn problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-object
Cemal Ardil
 
Numerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-enginesNumerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-engines
Cemal Ardil
 
New technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-bladesNew technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-blades
Cemal Ardil
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Cemal Ardil
 
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidentsMultivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Cemal Ardil
 

More from Cemal Ardil (20)

Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
 
The main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-systemThe main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-system
 
The feedback-control-for-distributed-systems
The feedback-control-for-distributed-systemsThe feedback-control-for-distributed-systems
The feedback-control-for-distributed-systems
 
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
 
Sonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposalSonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposal
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systems
 
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
 
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-psoReduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
 
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-designReal coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
 
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-m...
 
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcgaOptimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particles
 
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centersOn the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
 
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equationOn the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
 
On problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-objectOn problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-object
 
Numerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-enginesNumerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-engines
 
New technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-bladesNew technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-blades
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
 
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidentsMultivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-transponder-hopping

  • 1. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 Frame and Burst Acquisition in TDMA Satellite Communication Networks with Transponder Hopping Vitalice K. Oduol and Cemal Ardil International Science Index 28, 2009 waset.org/publications/6074 Abstract—The paper presents frame and burst acquisition in a satellite communication network based on time division multiple access (TDMA) in which the transmissions may be carried on different transponders. A unique word pattern is used for the acquisition process. The search for the frame is aided by soft-decision of QPSK modulated signals in an additive white Gaussian channel. Results show that when the false alarm rate is low the probability of detection is also low, and the acquisition time is long. Conversely when the false alarm rate is high, the probability of detection is also high and the acquisition time is short. Thus the system operators can trade high false alarm rates for high detection probabilities and shorter acquisition times. Keywords—burst acquisition, burst time plan, frame acquisition, satellite access, satellite TDMA, unique word detection I. INTRODUCTION T HE paper presents the frame and burst acquisition in a satellite communication network consisting of a set of traffic stations (also referred to as terminals) and a master reference station as shown in Fig.1 The access to the satellite resources can be achieved in many ways. Satellite communications multiple access is discussed extensively in several texts [1-6]. In the method of time division multiple access (TDMA) a frame is divided into time slots, which are shared among the terminals. A master station with visibility of the whole network maintains access discipline and scheduling of the transmissions as well as the position and duration of each burst in the frame; additionally the name or identification of the originating station is indicated. For some networks, such as the INTELSAT system, the BTP also shows the destination station as well as whether as order wires [7]. In the example satellite communication network of Fig.1 there are four traffic terminals that share the satellite resources via TDMA. The terminals transmit their bursts in sequence as shown, with the master reference station maintaining the timing sequence. For its proper operation TDMA requires synchronization so that the bursts arrive at the satellite in the allotted time slots. The success of synchronization depends on the co-operating stations, reference station, motion of the satellite and estimation methods. In some systems a secondary reference station is used to send timing corrections to communicating station pairs whose mutual bursts are visible from the reference. Fig.2 shows the frame and burst structure for the TDMA satellite network. Each traffic terminal receives a reference burst from the master station. Frame R From A Satellite Frame From B R From A From B Terminal A Burst A B C Reference Burst D TDMA Frame at the Satellite G CBR G CBTR UW SIC Q - Tr A a ff ic Te rm UW SIC G CBTR UW SIC OW Data To B To C To Z Q guard time carrier and bit timing recovery unique word station identification code postamble ina B Preamble ls C D Fig.2 Frame and burst structure for a TDMA satellite network Master Reference Terminal Fig.1 Example TDMA satellite network consisting of traffic terminals and a master reference terminal during the frame each terminal is allowed to transmit a burst according to a burst transmission plan (BTP). For every transponder the BTP specifies the frequency and polarization V. K. Oduol is with the Department of Electrical and Information Engineering, University of Nairobi, Nairobi, Kenya (+254-02-318262 ext.28327, vkoduol@uonbi.ac.ke, http://www.uonbi.ac.ke ) Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan . The reference burst consists of bit patterns for carrier and bit timing recovery (CBTR), the unique word, used to resolve phase ambiguity associated with coherent demodulation, and finally the station identification code (SIC). Timing phase ambiguity may arise due to the carrier and clock recovery method used [2]. The analysis presented in this paper concentrates on the unique word detection at a traffic terminal; it is assumed that carrier recovery and bit timing have been partially 54
  • 2. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 accomplished using the CBTR pattern. Fundamental to the synchronization of any TDMA satellite communication system is the acquisition of the frame. Transponder Hopping A single TDMA terminal can extend its capacity by having access to several down link beams by transponder hopping. In one frame the bursts can be sent on different frequencies or different polarizations. That is a terminal is able in one frame to send a burst on one transponder and another burst on another transponder. In such a network each terminal trying to gain acquisition must use the received signals and employ a search strategy that accommodates the may transponders that may be in use. The rest of the paper is organized as follows. Section II presents the system model in which the acquisition procedure is outlined. It is in this section that the frame acquisition time is derived in terms of the parameters to be obtained later from the modulation and demodulation. Section III presents the QPSK modulation and demodulation and prepares the for the derivation of the detection variable of Section IV. Section V discusses the probability of false alarm. Section VI presents the probability of detection and finally Section VII presents the results and conclusion. When the search parameters are for any transponder other than the one in use (k in this case) there can be one of two subsequent events. Either a false detection occurs or the systems proceeds to adjust the search parameters for the next transponder. Any detection (false or otherwise) is followed by a verification during the next frame, and therefore consumes two frame times, as is indicated in Fig.2 by the factor z2. When there is no detection the system proceeds to the next frame in one step. This is signified by the factor z. When there is a false detection it is assumed that the verification stage will indicate that there no unique word, and the system will proceed to look over next transponder. Thus in both cases, the receiver proceeds to the next transponder, one case occurring in two frames, while the other takes only one frame. When the receiver searches over transponder k, it is possible to have detection of the unique word. It is also possible to miss the unique word altogether; in which case the receiver proceeds to the next transponder after one frame. This requires two frames. Unique Word Acquisition Time Fig.3 shows the signal flow diagram for the generating function TD(z) of the time to the acquisition of the unique word pattern. The function H0(z) in the figure is given by H 0 ( z) II. SYSTEM MODEL The unique word search procedure is depicted in Fig.2, which illustrates the case where the traffic terminal expects one of N transponders. For purposes of definiteness the figure is illustrated with N = 8. The labels, k, k+1, …, k+7, in the circles are given modulo-8. Search procedures are commonly employed in the acquisition of spread spectrum signals are discussed in [8] and more recently in [9] and [10]. z 2 PF PF and represents the fact that there are two event paths for proceeding to the next transponder when there is unique word. The first block in the figure signifies the fact the system may start the search q steps from the transponder containing the unique word. Once the transponder with the unique word is reached, the system proceeds in a sequence with a positive feedback. PD PF UW Detected z 2 PF False Detection k+4 z 2 PF z 2 PF z1 z 2 PD z 2 PF k+1 F z1 P k z 2 PF 1 z z PF k+2 k+3 z 1 Fig.3 Signal flow for the unique word acquisition time PF z 2 PF z 1 k+7 N z(1 PD )H0 1( z) k+5 2 PF z 2PD H 0 ( z) PF k+6 z 1 1 (1) z 1 PF q z 1 z International Science Index 28, 2009 waset.org/publications/6074 A typical earth station attempts to gain synchronization from one transponder, and if that fails it tries another one until it succeeds. One advantage of this multi-frequency system is that the transmissions can be achieved at lower peak power [1]. Of course in the frequency domain the TDMA carriers are separated by guard bands. polarizations may be used to account for the transponders used. The search can begin in any one of the circles, and it is assumed that the unique word is present at location k (i.e. transponder k). PF Fig.2 Search procedure for the unique word pattern If the unique word is missed then all the intervening N-1 transponders must be searched before returning to the right one. This explains the role of the block in the feedback path. The block at the right of the figure represents detection , which requires two fames. Depending on the starting transponder (q steps away), the conditional moment generating function TD(z | q) is The search method used in this paper resembles the serial search method of [11] except that here several frequencies and TD ( z | q ) 55 q z 2 PD H 0 ( z ) N 1 z 1 PD H 0 1 ( z ) (2)
  • 3. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 ( anI ) When the transponder q is used with probability q, then the moment generating function TD(z) for the acquisition time can be obtained by averaging (2) over q to give N 1 TD ( z ) q 0 q q H 0 ( z) 2 International Science Index 28, 2009 waset.org/publications/6074 q 0 dz 1 z 1 1 P D 1 P D P F 1) (5) ( 2 E b h (t ) q n I ) cos 2 r (t ) TAcq 1 1 1 2 ( 2 Eb h(t ) a nI ) cos 2 q q ( anQ ) sin 2 f 0t q 0 P (N F 1) X At the receiver the demodulator uses the structure shown in Fig.5. As in Fig.4, two carriers in phase quadrature are used. Y (I ) 2 n 1 X + 90O X Z X f 0t (Q an ) X hM (t ) N + Y (Q ) 2 n 1 Fig.5 QPSK Demodulator The resulting signals have double frequency terms, which are removed by the filter, leaving The QPSK modulator and demodulator used in the TDMA satellite system are shown Fig.4 and Fig.5, respectively. The (I (Q in-phase and quadrature data streams a n ) and an ) are used as These are then carried on two carriers of the same frequency but in phase quadrature, and summed to produce the transmitted signal, as shown at the bottom of the diagram of Fig.4. On passing through the channel the signal incurs additive white Gaussian noise. N + (Q an ) f 0t 2 sin 2 impulse inputs to pulse shaping linear systems of impulse response h(t) and transfer function H(f). (7) f 0t f 0t X hM (t ) (6) QPSK MODULATION AND DEMODULATION ( q nQ ) sin 2 f 0t ( an I ) Since the probability PD of detection depends on the probability PF of false alarm and the signal to noise ratio, the dependence of the acquisition time on the system parameters will be given after the contribution of the modulation and demodulation. These are addressed in the next section. III. ( anQ ) sin 2 f 0t (I (I (Q (Q The variables qn ) and qn ) are used in place of a n ) and an ) to signify the fact that the latter pair could have been altered in transit. In both the I and the Q channels, the received signal is first multiplied by the corresponding carrier signal (cos2 fot or sin2 fot) and then filtered by a matched filter with impulse response hM(t) and transfer function is HM(f) = H*(f). 2 cos 2 1 P D X The figure incorporates an unknown phase to account for phase differences between the transmitting and receiving carriers. The received signal (excluding the noise term) is given by If the transponders are deployed with equal probability the sum in (5) equals (N-1)/2. In that case the mean acquisition time (5) becomes 1 P D h(t) ( 2 Eb h(t ) anI ) cos 2 f 0t N 1 1 sin( 2 f 0 t ) (Q an ) Fig. 4. QPSK Modulator P (N F 1 1 + 90 o (4) The probabilities PD and PF of detection and false alarm, respectively, appearing explicitly or otherwise in (2) and (3) and also in Fig.2 and Fig.3, depend on the modulation and channel type and conditions. The next section discusses how these quantities are determined for a QPSK modulation system that uses a soft-decision approach to the demodulation in an additive Gaussian noise channel. Although the discussion covers expressions that would incorporate timing error, the results given assume perfect timing. Including the effects of timing errors would make the paper too long. The mean acquisition time is then obtained from TD(z) and taking the derivative of TD(z) at z = 1. dTD ( z ) cos( 2 f 0 t ) q = 1/N) N 1 1 H 0 ( z) N 1 H 0 ( z) q q H 0 ( z) X (3) z PD N 1 z 1 PD H 0 1 ( z ) If the transponders are used with equal probability ( then the sum in (3) becomes N 1 h(t) r (t ) r (t ) 2 cos 2 f 0 t 2 sin 2 f 0 t ( E b h ( t ) q n I ) cos E b h (t ) q (I ) n sin ( q n Q ) sin q (Q ) n cos (8) (9) The matched filter outputs are sampled at t = nT + . This assumes a clock timing offset of seconds from the desired instant. Letting R( ) be the relative matched filter output, it is assumed in what follows that the sampling is done at t = . That is, 2 (10) R( ) 2 H ( f ) cos 2 f df 0 The two options of band-limited and time-limited forms are given in [1] for the pulse-shaping function H(f), resulting in 56
  • 4. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 R( ) R( ) /T 1 T time-limited (11) T 0 band-limited /T /T sin (12) In addition to (11) and (12), one pulse shape that has gained popularity is the root raised cosine (RRC) pulse which in the frequency domain has the following squared magnitude representation 1 2 2 H f 1 f 1 1 cos 2 T 1 f 2T 1 f 2T 2T If there is no timing error then the matched filter response is at its peak, i.e R( ) 1 . Y (Q ) N 1 2 1 2 1 2 1 2 ( ( anI ) qnI ) ( ( anI ) qnI ) ( ( a n I ) q nQ ) E b R ( ) cos ( ( a nQ ) q n I ) (15) n 1 0 , 1, 2 , (19) ,N otherwise 2 N N m m N /2 0 0, 1, 2, , N 2 (20) otherwise Exploiting the obvious symmetry in (20a) and (20b), it is clear that the mean is zero and the mean square is unity. That is, when the unique word is absent, E R aq 0 and 1. 2 E R aq We can therefore write E Y (I ) x EY y x y N Eb R( ) cos (Q ) UW present (21) UW absent (22) N Eb R( ) sin E Y(I ) E Y(Q) 0 In the absence of the unique word, the random sequences can be considered as noise, and the analysis can proceed by assuming that the introduced noise is also Gaussian (certainly true if N is large enough). This assumption is necessary for mathematical tractability of the analysis. N E b R ( ) sin V (I ) n 1 N ( ( a nQ ) q n I ) E b R ( ) cos ( ( a n I ) q nQ ) (16) n 1 N ( ( a nI ) q nI ) E b R ( ) sin ( ( a nQ ) q nQ ) V Random Sequences as Noise If the sequences are considered as noise, then total noise in the channel is still Gaussian, with zero mean and variances given by (Q ) Var Y n 1 where the noise terms V ( I ) and V (Q ) are independent and normally distributed, each with zero mean and variance NN0/2. At this point it convenient to define the correlations via the matrix (I ) aq ( QI ) aq 0 2m N Pr R aq 2 Y (I ) k This can be written in the equivalent form as Returning to the sampled filter outputs, it is observed that the ( ( I-channels value is 1 E b R ( ) q n I ) cos q nQ ) sin , while 2 ( ( the Q-channel one is 1 E b R ( ) q nQ ) cos q n I ) sin . These quantities are multiplied by local copies of the unique word pattern and summed, resulting in a correlation values for the I-and Q- channels. From Fig.5, prior to the squaring elements, the I-channel and Q-channel variables are N k N 2 1 2T The parameter is the excess bandwidth, and is restricted to the values 0 1. The relative matched filter response for this pulse shape is the inverse Fourier transform of (13), and is seen to be sin / T cos /T (14) R( ) /T 1 4 2 2 /T 2 International Science Index 28, 2009 waset.org/publications/6074 2k N Pr R aq 1 f 0 (13) 2T 1 In absence of the unique word, these four sums are random variables that are identically distributed, since they are obtained by correlating a random sequence by a known sequence (the unique word). The result is obtained by considering that to get k agreements and N - k disagreements between the known unique word sequence and the random sequence, producing an output of 2k–N, is equivalent to having k successes in N trials of a Bernoulli process with probability of success p = ½. Finally the resulting sum is divided by N. Therefore 1 N 1 N ( IQ ) aq (Q ) aq R R R R N ( ( a nI ) q nI ) n 1 N ( ( a nQ ) q n I ) n 1 1 N 1 N n 1 N R =R (Q ) aq =1 ( IQ (QI R aq ) = R aq ) = - 1. (Q ) 2 0 (23) NE b R ( ) E R 2 aq gives NN 0 / 2 NN 0 / 2 2 0 2 0 2 Substituting for E R aq (17) UW present 2 NEb R ( ) (24) UW absent ( ( a nQ ) q nQ ) n 1 and note that in the presence of the unique word, these correlations are found to be (I ) aq Var Y NN 2 N ( ( a n I ) q nQ ) (I ) (18a) (18b) IV. THE DETECTION VARIABLE When the unique word is present the detection variable 2 2 Z Y (I ) Y ( Q ) incorporate the fact that the in-phase and quadrature means are now E Y ( I ) N Eb R( ) cos , and 57
  • 5. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 N Eb R( ) sin . The joint probability density function E Y (Q) for the two variables 1 exp 2 0 2 2 2 0 2 x 2 y x (25) y contains a quadratic term in the exponent which can be expressed in polar form as 2 x r2 y N 2 Eb R 2 ( ) (26) 2 0 exp 1 2 2 0 (27) The random phase is uniformly distributed in 0 2 . Therefore, we can obtain marginal density function by averaging over r where 2 0 I0 ( x) 1 2 r 2 2 0 exp 1 2 NrR( ) Eb N 2 E R2 ( ) I 0 b (28) PD 1 2 2 0 1 2 exp 2 0 The variance 2 0 1 2 2 0 z 4N 2 Eb R2 ( ) I0 2 0 N R( ) zEb PD (29) 2 0 is given by (24). The next section addresses the case for the absence of the unique word. V. THE PROBABILITY OF N R2 ( ) (32) ln PF OF DETECTION exp 1 2 2 0 z N 2 Eb R2 ( ) I0 N R( ) zEb 2 0 dz (33) Using the series expression for the modified Bessel function I0(x), we can express the expression for PD as exp 2 R 2 ( ) PF 2 m 0 function of order zero. The detection variable has probability density function fZ(z) given by f Z ( z) ln PF , In the presence of the unique word the detection variable has probability density function given (29). The unique word is missed if the detection variable falls below the threshold , otherwise detection occurs. The probability of detection PD is given by is the modified Bessel exp(x cos )d 2 0 NE b /( N 0 / 2) is the signal to noise ratio. where R ( ) m! m m / N R2 ( ) 1 (34) 2 ln PF 1 /N R ( ) q q! q 0 VII. RESULTS AND CONCLUSION One set of results for the probability of detection assumes that there are no timing errors, i.e. that R( ) = R(0) = 1. Fig.6 shows the variations of the probability of detection for N = 64 and different values of the channel signal to noise ratio. 1.0E+00 FA LSE ALARM SNR= 15 dB In the absence of the unique word the probability density 2 2 1.0E-02 (Q ) is function for the detection variable Z Y ( I ) Y obtained from (29) by setting to zero the terms containing Eb since these are the terms that arise from the means of the in-phase and quadrature components as given in (22). Accordingly the probability density function is given by fZ (z) where from (24) 1 2 exp( z / 2 0 ) 2 2 0 2 0 Probability of Detection International Science Index 28, 2009 waset.org/publications/6074 1 1 exp 2N r R( ) Eb cos 2 2 2 0 f R (r) 1 VI. THE PROBABILITY r 2 N 2 Eb R2 ( ) 2 taking the appropriate value in (24). It is possible to In polar form, the joint density function becomes r can re-written as determine the probability of detection as a function of the false alarm probability. In preparation for that the following is pertinent. 2 N r R ( ) Eb cos f R (r, ) 2 /2 0 e 2 NN0 / 2 2 y x 2 0 with 1 f XY ( x , y ) The result PF 1.0E-04 (30) -10dB 1.0E-10 1.0E-16 1.0E-12 1.0E-08 1.0E-04 1.0E+00 Probability of False Alarm 1 e 0 dB -5 dB 1.0E-08 NE b R 2 ( ) NN 0 / 2 . The probability of 2 5 dB 1.0E-06 false alarm is then the probability that the detection variable exceeds a set threshold. PF 10 dB 2 0 exp( z / 2 2 0 )dz (31) Fig. 6 Variation of the Probability of detection with the signal to noise ratio and false probability 2 /2 0 58
  • 6. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:4, 2009 From Fig.6 it is clear that probability of detection increases with the signal to noise ratio, and also with false alarm probability. When the false alarm probability is low (e.g. PF = 10-8 in Fig.7), the probability of detection is low but increases with the signal to noise ratio. When the false alarm probability is high (e.g. PF = 0.316 in Fig.7), the probability of detection is higher and increases with the signal to noise ratio. 1.00 0.90 PFA = 0.316 Probability of Detection 0.80 PFA = 0.1 0.70 0.60 PFA = 10-2 0.50 0.40 PFA=10-4 0.30 0.20 PFA = 10-8 0.10 0.00 -12 -8 -4 0 4 8 12 16 20 Signal to Noise Ratio [dB] Fig.7 Variation of the probability of detection with signal to noise ratio along curves of constant false alarm rate 1.0E+07 Acquisition Time [seconds] International Science Index 28, 2009 waset.org/publications/6074 Effect of Timing Errors The presentation given so far allows for a non-zero timing error, i.e. for R( ) < 1. When timing occur, their effect in the probability of detection as is evident in (34) is to reduce the effective signal to noise ratio. Every occurrence of the signal to noise ratio is multiplied by R2( ). That is the curves in Fig.6 will shift down by an amount equivalent to R2( ) expressed in dB. For example if R2( ) =0.64 the reduction is by about 2 dB. In order to have a clearer interpretation of this it is better to present the detection times and probabilities against the signal to noise ratio with the false alarm probability held temporarily constant. PFA = 10-8 1.0E+06 PFA = 10-4 1.0E+05 PFA = 10-2 1.0E+04 PFA = 0.1 1.0E+03 PFA = 0.316 1.0E+02 1.0E+01 1.0E+00 -10 -5 0 5 10 15 20 Signal to Noise Ratio [dB] Referring to Fig.8, it is seen that when the false alarm probability is low (e.g. PF = 10-8 ), the acquisition time is long but decreases with the signal to noise ratio, and when the false alarm probability is high (e.g. PF = 0.316), the acquisition time is long shorter and decreases with the signal to noise ratio. What has emerged here is that high false alarm rate can be tolerated in order to have greater probability of detection and shorter acquisition times. The effect of timing errorson these results is to shift down the curves of Fig.7 (lowering detection probabilities) and shift the curves of Fig.8 (increasing the acquisition time). What was also observed was that as the length N of the unique word was increased, the performance get better. REFERENCES [1] E. Lutz, M. Werner, A. Jahn, Satellite Systems for Personal and Broadband Communications, Springer, 2000D. [2] Roddy, Satellite Communications, 2nd Ed., McGraw-Hill 1996 [3] G. Maral, M.Bousquet, Satellite Communications Systems: Systems, Techniques And Technology, John Wiley & Sons 1999 [4] J. N. Pelton, The Basics of Satellite Communications, 2nd EditionInternational Engineering Consortium 2006. [5] S. Tirró, Satellite Communication System Design, Springer 1993 [6] M. Richharia, Satellites Communications Systems, McGraw-Hill 1999 [7] D. I. Dalgleish, An Introduction to Satellite Communications, Institution of Engineers, IET 1989 [8] A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication, Prentice-Hall, 1995 [9] S.H.Won, and L.Hanzo, “Analysis of Serial Search Based Code Acquisition in Multiple Transmit Antenna Aided DS-CDMA Downlink” In: IEEE VTC'05 (Fall), 25-28 September 2005, Intercontinental Hotel, Dallas, Texas, USA. [10] H.Puska, H.Saarnisaari, J.Iinatti, P.Lilja, “Serial search code acquisition using smart antennas with single correlator or matched filter”, IEEE Transactions on Communications, Vol.:56, No.2 pp. 299-308, Feb.2008 [11] S.Glisic, B. Vucetic, Spread Spectrum CDMA Systems For Wireless Communications, Artech House 1997 Vitalice K. Oduol received his pre-university education at Alliance High School in Kenya. In 1981 he was awarded a CIDA scholarship to study electrical engineering at McGill University, Canada, where he received the B.Eng. (Hons.) and M.Eng. degrees in 1985 and 1987, respectively, both in electrical engineering. In June 1992, he received the Ph.D. degree in electrical engineering at McGill University. He was a research associate and teaching assistant while a graduate student at McGill University. He joined MPB Technologies, Inc. in 1989, where he participated in a variety of projects, including meteor burst communication systems, satellite on-board processing, low probability of intercept radio, among others. In 1994 he joined INTELSAT where he initiated research and development work on the integration of terrestrial wireless and satellite systems. After working at COMSAT Labs. (1996-1997) on VSAT networks, and TranSwitch Corp.(1998-2002) on product definition and architecture, he returned to Kenya, where since 2003 he has been with Department of Electrical and Information Engineering, University of Nairobi. Dr. Oduol was a two-time recipient of the Douglas tutorial scholarship at McGill University. He is currently chairman, Department of Electrical and Information Engineering, University of Nairobi. His research interests include performance analysis, modeling and simulation of telecommunication systems, adaptive error control, feedback communication. 25 Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan Fig.8 Variation of the acquisition time with signal to noise ratio along curves of constant false alarm rate 59