Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

World Academy of Science, Engineering and Technology 52 2009

Frame and Burst Acquisition in TDMA Satellite


Communication Networks with Transponder
Hopping
Vitalice K. Oduol and Cemal Ardil

Abstract—The paper presents frame and burst acquisition in a of the transmissions as well as the position and duration of
satellite communication network based on time division multiple each burst in the frame; additionally the name or identification
access (TDMA) in which the transmissions may be carried on of the originating station is indicated. For some networks,
different transponders. A unique word pattern is used for the such as the INTELSAT system, the BTP also shows the
acquisition process. The search for the frame is aided by destination station as well as whether as order wires [7]. In
soft-decision of QPSK modulated signals in an additive white the example satellite communication network of Fig.1 there
Gaussian channel. Results show that when the false alarm rate is low are four traffic terminals that share the satellite resources via
the probability of detection is also low, and the acquisition time is TDMA. The terminals transmit their bursts in sequence as
long. Conversely when the false alarm rate is high, the probability of
shown, with the master reference station maintaining the
detection is also high and the acquisition time is short. Thus the
timing sequence.
system operators can trade high false alarm rates for high detection
probabilities and shorter acquisition times. For its proper operation TDMA requires synchronization so
that the bursts arrive at the satellite in the allotted time slots.
Keywords—burst acquisition, burst time plan, frame acquisition, The success of synchronization depends on the co-operating
satellite access, satellite TDMA, unique word detection stations, reference station, motion of the satellite and
estimation methods. In some systems a secondary reference
I. INTRODUCTION station is used to send timing corrections to communicating
station pairs whose mutual bursts are visible from the
T HE paper presents the frame and burst acquisition in a
satellite communication network consisting of a set of
traffic stations (also referred to as terminals) and a master
reference.
Fig.2 shows the frame and burst structure for the TDMA
reference station as shown in Fig.1 The access to the satellite satellite network. Each traffic terminal receives a reference
resources can be achieved in many ways. Satellite burst from the master station.
communications multiple access is discussed extensively in
Frame Frame
several texts [1-6]. In the method of time division multiple
access (TDMA) a frame is divided into time slots, which are
shared among the terminals. A master station with visibility of From From From From
R R
A B A B
the whole network maintains access discipline and scheduling
Satellite Terminal A
Burst
Reference
Preamble Data
Burst
A B C D
To To To
TDMA Frame at the Satellite G CBR UW SIC G CBTR UW SIC OW Q
B C Z
G - guard time
A CBTR - carrier and bit timing recovery
Tr

UW - unique word
a ff
ic

SIC - station identification code


Te

Q - postamble
rm

B
ina
ls

C Master Reference Fig.2 Frame and burst structure for a TDMA satellite network
D Terminal
The reference burst consists of bit patterns for carrier and
Fig.1 Example TDMA satellite network consisting of traffic
terminals and a master reference terminal bit timing recovery (CBTR), the unique word, used to resolve
phase ambiguity associated with coherent demodulation, and
during the frame each terminal is allowed to transmit a burst finally the station identification code (SIC). Timing phase
according to a burst transmission plan (BTP). For every ambiguity may arise due to the carrier and clock recovery
transponder the BTP specifies the frequency and polarization method used [2].
The analysis presented in this paper concentrates on the
V. K. Oduol is with the Department of Electrical and Information
Engineering, University of Nairobi, Nairobi, Kenya (+254-02-318262 unique word detection at a traffic terminal; it is assumed that
ext.28327, vkoduol@uonbi.ac.ke, http://www.uonbi.ac.ke ) carrier recovery and bit timing have been partially
Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan .

1212
World Academy of Science, Engineering and Technology 52 2009

accomplished using the CBTR pattern. Fundamental to the polarizations may be used to account for the transponders
synchronization of any TDMA satellite communication used. The search can begin in any one of the circles, and it is
system is the acquisition of the frame. assumed that the unique word is present at location k (i.e.
transponder k).
Transponder Hopping
When the search parameters are for any transponder other
A single TDMA terminal can extend its capacity by having than the one in use (k in this case) there can be one of two
access to several down link beams by transponder hopping. In subsequent events. Either a false detection occurs or the
one frame the bursts can be sent on different frequencies or systems proceeds to adjust the search parameters for the next
different polarizations. That is a terminal is able in one frame transponder. Any detection (false or otherwise) is followed
to send a burst on one transponder and another burst on by a verification during the next frame, and therefore
another transponder. In such a network each terminal trying consumes two frame times, as is indicated in Fig.2 by the
to gain acquisition must use the received signals and employ a factor z2.
search strategy that accommodates the may transponders that
may be in use. When there is no detection the system proceeds to the next
A typical earth station attempts to gain synchronization frame in one step. This is signified by the factor z. When there
from one transponder, and if that fails it tries another one until is a false detection it is assumed that the verification stage will
it succeeds. One advantage of this multi-frequency system is indicate that there no unique word, and the system will
that the transmissions can be achieved at lower peak proceed to look over next transponder. Thus in both cases, the
power [1]. Of course in the frequency domain the TDMA receiver proceeds to the next transponder, one case occurring
carriers are separated by guard bands. in two frames, while the other takes only one frame.
When the receiver searches over transponder k, it is possible
The rest of the paper is organized as follows. Section II to have detection of the unique word. It is also possible to
presents the system model in which the acquisition procedure miss the unique word altogether; in which case the receiver
is outlined. It is in this section that the frame acquisition time proceeds to the next transponder after one frame. This requires
is derived in terms of the parameters to be obtained later from two frames.
the modulation and demodulation. Section III presents the
QPSK modulation and demodulation and prepares the for the Unique Word Acquisition Time
derivation of the detection variable of Section IV. Section V
Fig.3 shows the signal flow diagram for the generating
discusses the probability of false alarm. Section VI presents
function TD(z) of the time to the acquisition of the unique
the probability of detection and finally Section VII presents
word pattern. The function H0(z) in the figure is given by
the results and conclusion.
H 0 ( z) z 2 PF  z 1  PF (1)
II. SYSTEM MODEL
and represents the fact that there are two event paths for
The unique word search procedure is depicted in Fig.2, proceeding to the next transponder when there is unique
which illustrates the case where the traffic terminal expects word. The first block in the figure signifies the fact the system
one of N transponders. For purposes of definiteness the figure may start the search q steps from the transponder containing
is illustrated with N = 8. The labels, k, k+1, …, k+7, in the the unique word. Once the transponder with the unique word
circles are given modulo-8. Search procedures are commonly is reached, the system proceeds in a sequence with a positive
employed in the acquisition of spread spectrum signals are feedback.
discussed in [8] and more recently in [9] and [10].
q
H 0 ( z) z 2PD
z 1  P F
PF
z 1
 k+6

k+5 z(1  PD )H0N 1( z)

2
z 1

k+7 z PF
PF z 2 PF
z 1
Fig.3 Signal flow for the unique word acquisition time



z 2 PF
PF

z 1  P D z 2 PF False z 2 PF
k k+1 Detection k+4 If the unique word is missed then all the intervening N-1
2 2 transponders must be searched before returning to the right
z PD z PF
z 2 PF

one. This explains the role of the block in the feedback path.
z 1


F
P
PF

The block at the right of the figure represents detection ,




UW
1
z

k+2 k+3
Detected which requires two fames.
z 1  P F Depending on the starting transponder (q steps away), the
Fig.2 Search procedure for the unique word pattern conditional moment generating function TD(z | q) is

The search method used in this paper resembles the serial TD ( z | q )


z 2 PD H 0q ( z ) (2)
1  z 1  PD H 0N 1 ( z )
search method of [11] except that here several frequencies and

1213
World Academy of Science, Engineering and Technology 52 2009

When the transponder q is used with probability Sq, then the an( I )
moment generating function TD(z) for the acquisition time can h(t) X
be obtained by averaging (2) over q to give cos( 2Sf 0 t )

§ N 1 · z 2 PD (3) +
TD ( z ) ¨ ¦ S q H q ( z) ¸ 90 o
¨q 0 0 ¸ 1  z 1  P H N 1 ( z )
© ¹ D 0 sin( 2S f 0 t )
an(Q )
If the transponders are used with equal probability (Sq = 1/N) h(t) X
then the sum in (3) becomes
N 1 § 1  H N ( z) ·
>
2 Eb h(t ) an( I ) cos 2S f 0t  an(Q ) sin 2S f 0t @
1 ¨ ¸ (4)
¦
q
S q H 0 ( z) 0
N ¨ 1  H ( z) ¸
q 0 © 0 ¹ Fig. 4. QPSK Modulator

The probabilities PD and PF of detection and false alarm,


respectively, appearing explicitly or otherwise in (2) and (3) The figure incorporates an unknown phase I to account for
and also in Fig.2 and Fig.3, depend on the modulation and phase differences between the transmitting and receiving
channel type and conditions. The next section discusses how carriers. The received signal (excluding the noise term) is
these quantities are determined for a QPSK modulation given by
system that uses a soft-decision approach to the demodulation
in an additive Gaussian noise channel. Although the r (t ) >
2 E b h (t ) q n( I ) cos 2S f 0 t  q n( Q ) sin 2S f 0 t @ (7)
discussion covers expressions that would incorporate timing
error, the results given assume perfect timing. Including the
The variables qn(I ) and qn(Q ) are used in place of a n(I ) and an(Q ) to
effects of timing errors would make the paper too long. The
mean acquisition time is then obtained from TD(z) and taking signify the fact that the latter pair could have been altered in
the derivative of TD(z) at z = 1. transit. In both the I and the Q channels, the received signal is
first multiplied by the corresponding carrier signal (cos2Sfot
dTD ( z )
dz
1
P
1 § 1

¨P
·
¸ F

 1¸ 1  P ( N  1) (5)
or sin2Sfot) and then filtered by a matched filter with impulse
z 1 D © D ¹ response hM(t) and transfer function is HM(f) = H*(f).

¦ qS q
N 1
 1 P >
2 Eb h(t ) a n( I ) cos 2S f 0 t  an( Q ) sin 2S f 0 t @
F
q 0
(I )
If the transponders are deployed with equal probability the a n

sum in (5) equals (N-1)/2. In that case the mean acquisition N Y (I )


X hM (t ) X + ¦ 2
time (5) becomes n 1

2 cos 2S f t  I
0
a (Q )
n

TAcq 1
P
1 § 1

¨P

2¸ F

 ¸ 1  P ( N  1) (6)
90O
X
+
Z
D © D ¹
2 sin 2S f t  I
0
X
Since the probability PD of detection depends on the an(Q )
N Y (Q )
probability PF of false alarm and the signal to noise ratio, the X hM (t ) X + ¦
n 1
2
dependence of the acquisition time on the system parameters
will be given after the contribution of the modulation and Fig.5 QPSK Demodulator
demodulation. These are addressed in the next section.
The resulting signals have double frequency terms, which are
III. QPSK MODULATION AND DEMODULATION removed by the filter, leaving
The QPSK modulator and demodulator used in the TDMA
satellite system are shown Fig.4 and Fig.5, respectively. The r (t ) 2 cos 2S f t 0 >
E b h ( t ) q n( I ) cos I  q n( Q ) sin I @ (8)
in-phase and quadrature data streams a n(I ) and an(Q ) are used as r (t ) 2 sin 2Sf t 0 E b h (t )  q > (I )
n sin I  q (Q )
n cos I @ (9)
impulse inputs to pulse shaping linear systems of impulse
response h(t) and transfer function H(f). The matched filter outputs are sampled at t = nT + W. This
These are then carried on two carriers of the same frequency assumes a clock timing offset of W seconds from the desired
but in phase quadrature, and summed to produce the instant. Letting R(W) be the relative matched filter output, it is
transmitted signal, as shown at the bottom of the diagram of assumed in what follows that the sampling is done at t = W.
Fig.4. On passing through the channel the signal incurs That is,
f
R (W ) 2 ³ H ( f ) cos 2S fW df
2
additive white Gaussian noise. (10)
0
At the receiver the demodulator uses the structure shown in The two options of band-limited and time-limited forms are
Fig.5. As in Fig.4, two carriers in phase quadrature are used. given in [1] for the pulse-shaping function H(f), resulting in

1214
World Academy of Science, Engineering and Technology 52 2009

­°1  W / T W T time-limited (11) In absence of the unique word, these four sums are random
R (W ) ®
°̄0 W tT variables that are identically distributed, since they are
obtained by correlating a random sequence by a known
sin SW / T band-limited (12)
R (W ) sequence (the unique word). The result is obtained by
SW / T
considering that to get k agreements and N - k disagreements
In addition to (11) and (12), one pulse shape that has gained between the known unique word sequence and the random
popularity is the root raised cosine (RRC) pulse which in the sequence, producing an output of 2k–N, is equivalent to
frequency domain has the following squared magnitude having k successes in N trials of a Bernoulli process with
representation probability of success p = ½. Finally the resulting sum is
­ 1D
°1 f d divided by N. Therefore
2T (13)
°
°1 1 § ST ª 1D º · 1D 1D ­ N §N ·
H f
2
®  cos ¨¨ « f  2T » ¸¸  f d
­ 2k ½ °2 ¨¨ ¸¸ k 0 , 1, 2 , " , N (19)
°2 2 ©D ¬ ¼¹ 2T 2T Pr ® R aq  1¾ ® ©k ¹
° 1D ¯ N ¿ °0
°0 f ! ¯ otherwise
¯ 2T
The parameter D is the excess bandwidth, and is restricted to This can be written in the equivalent form as
the values 0 d D d 1. The relative matched filter response for
­ N § N · N
this pulse shape is the inverse Fourier transform of (13), and is ­ 2m ½ °2 ¨¨ ¸¸ m 0, r 1, r 2, " , r (20)
seen to be Pr ® R aq ¾ ® © m  N / 2¹ 2
¯ N ¿ °0
sin S D W / T cos S D W / T ¯ otherwise
R (W ) (14)
S D W / T 1  4D 2W 2 / T 2 Exploiting the obvious symmetry in (20a) and (20b), it is
If there is no timing error then the matched filter response is clear that the mean is zero and the mean square is unity. That
at its peak, i.e R(W ) 1 . is, when the unique word is absent, E ^R aq ` 0 and

Returning to the sampled filter outputs, it is observed that the


^ `
E R aq2 1. We can therefore write

>
I-channels value is 1 E b R (W ) q n( I ) cos I  q n( Q ) sin I , while @ Px ^ `
E Y (I ) N Eb R(W ) cos I ½° UW present (21)
2 ¾
Py E^Y ` (Q )
N Eb R(W ) sin I °¿
the Q-channel one is 1 E b R (W ) >q n( Q ) cos I  q n( I ) sin I @ .
Px Py E^Y(I )` E^Y(Q)` 0
2
These quantities are multiplied by local copies of the unique UW absent (22)
word pattern and summed, resulting in a correlation values
for the I-and Q- channels. From Fig.5, prior to the squaring In the absence of the unique word, the random sequences can
elements, the I-channel and Q-channel variables are be considered as noise, and the analysis can proceed by
assuming that the introduced noise is also Gaussian (certainly

N
1
Y (I ) E b R (W ) cos I ¦ a n( I ) q n( I )  a n( I ) q n( I ) (15)
true if N is large enough). This assumption is necessary for
2 n 1 mathematical tractability of the analysis.

N
1
 E b R (W ) sin I ¦ a n( I ) q n( Q )  a n( Q ) q n( I )  V ( I )
2 n 1 Random Sequences as Noise
If the sequences are considered as noise, then total noise in the

N
1
Y (Q )
E b R (W ) cos I ¦ a n( Q ) q n( I )  a n( I ) q n( Q ) channel is still Gaussian, with zero mean and variances given
2 n 1
(16)
by

N
1
 E b R (W ) sin I ¦ a n( I ) q n( I )  a n( Q ) q n( Q )  V
^ ` ^ `
(Q )

2 n 1 Var Y (I )
Var Y (Q )
V 02
(23)
^ `
where the noise terms V and V are independent and
(I ) (Q )
NN
normally distributed, each with zero mean and variance
0
 NE b R 2 (W ) E R aq2
2
NN0/2. At this point it convenient to define the correlations
via the matrix Substituting for E ^R aq2 ` gives

§ 1 N
1 N
· ­ NN 0 / 2
§ R aq
(I ) ( IQ )
R aq · ¨
¨ N
¦a (I )
n q n( I )
N
¦a q n( Q ) ¸
(I )
n
¸ (17) V 02 ®
UW present (24)
¨ ( QI ) ¸ n 1 n 1
¯ NN 0 / 2  NEb R (W )
2
UW absent
¨R (Q ) ¸
¨ 1 N
1 N
(Q ) (Q ) ¸
¦a ¦
© aq R aq ¹ (Q )
¨ n q n( I ) a n q n ¸
© N n 1 N n 1 ¹
and note that in the presence of the unique word, these IV. THE DETECTION VARIABLE
correlations are found to be When the unique word is present the detection variable
Z >Y ( I ) @  >Y ( Q ) @ incorporate the fact that the in-phase and
2 2
(I ) (Q )
R aq = R aq =1 (18a)
quadrature means are now E^Y ( I ) ` N Eb R(W ) cosI , and
R aq( IQ ) = R aq(QI ) = - 1. (18b)

1215
World Academy of Science, Engineering and Technology 52 2009

^ `
E Y (Q) N Eb R(W ) sin I . The joint probability density function
The result PF
T / 2V 02
can re-written as T  2V 02 ln PF ,
e
for the two variables
with V taking the appropriate value in (24). It is possible to
2
0

f XY ( x , y )
§ 1 ·
¨
­§ ·
½
¸ exp °®¨  1 ¸ >x  P @2  y  P 2 °¾
¨ 2SV 2 ¸ ¨ 2¸ x y > @
(25) determine the probability of detection as a function of the
© 0 ¹ °̄© 2V 0 ¹ °¿ false alarm probability. In preparation for that the following is
pertinent.
contains a quadratic term in the exponent which can be
T ª J º (32)
expressed in polar form as  «1  R 2 (W )  » ln PF
2 NN0 / 2 ¬ N ¼
>x  P x @2  >y  P y @2 r 2  N 2 Eb R 2 (W ) (26)
where J NE b /( N 0 / 2) is the signal to noise ratio.
 2 N r R (W ) Eb cos T  I

In polar form, the joint density function becomes VI. THE PROBABILITY OF DETECTION
§§ 1 · ·
f R4 (r,T )
r
V 02

exp¨¨ ¨¨ 2 ¸¸ r 2  N 2 Eb R2 (W ) ¸¸
V
In the presence of the unique word the detection variable
has probability density function given (29). The unique word
©© 0 ¹
2 ¹ (27)
is missed if the detection variable falls below the threshold T,
§ 1 ­°§ 1 · ½°·
V
°̄© 0 ¹
2

u ¨ exp®¨¨ 2 ¸¸ 2N r R(W ) Eb cos T  I ¾¸
¨ 2S °¿¸¹
otherwise detection occurs. The probability of detection PD is
given by
©
1 f §¨ §  1 · · § N R(W ) zEb ·
The random phase T is uniformly distributed in 0 d T d 2S. PD
2V 02 ³T ¨ 2V

exp ¨¨ 2 ¸¸ z  N 2 Eb R2 (W ) ¸I0¨
¸ ¨

V 02
¸dz
¸
(33)
Therefore, we can obtain marginal density function by ©© 0 ¹ ¹ © ¹
averaging over T Using the series expression for the modified Bessel function
§§  1 · · § NrR(W ) E ·
(28) I0(x), we can express the expression for PD as
exp¨ ¨ 2 ¸ r 2  N 2E R2 (W ) ¸I0¨ b¸
r
f R (r)
V0 ¨ ¨ 2V ¸ b ¸ ¨ V ¸ 1 J / N R 2 (W ) º»
exp§¨  2J R 2 (W ) ·¸ PF «¬
2 2 ª
©© 0 ¹ ¹ © 0 ¹ PD ¼
(34)
© ¹
where 1 S is the modified Bessel f J R (W ) m m
> ln PF @>1  J / N R (W )@ q

2S ³S
2
exp(x cosT )dT
2
I0 ( x)
u ¦ m!
¦ q!
m 0 q 0
function of order zero. The detection variable has probability
density function fZ(z) given by
VII. RESULTS AND CONCLUSION
§§  1 · · § N R(W ) zEb ·
f Z ( z)
1
2V 0 ¨

exp¨ ¨¨ 2 ¸¸ z  4N 2 Eb R2 (W ) ¸I0¨
¸ ¨
¸
¸
(29)
One set of results for the probability of detection assumes
© © 2V 0 ¹ V 02
2
¹ © ¹
that there are no timing errors, i.e. that R(W) = R(0) = 1. Fig.6
The variance V 02 is given by (24). The next section addresses shows the variations of the probability of detection for N = 64
the case for the absence of the unique word. and different values of the channel signal to noise ratio.

V. THE PROBABILITY OF FA LSE ALARM 1.0E+00


SNR= 15 dB
In the absence of the unique word the probability density
function for the detection variable Z Y ( I )  Y ( Q ) > @ > 2
@2 1.0E-02
Probability of Detection

is 10 dB
obtained from (29) by setting to zero the terms containing Eb
1.0E-04
since these are the terms that arise from the means of the
in-phase and quadrature components as given in (22). 5 dB

Accordingly the probability density function is given by 1.0E-06


0 dB
1 -5 dB
fZ (z) exp(z / 2V02 ) (30) -10dB
2V02
1.0E-08

where from (24) V 02 NE b R 2 (W )  NN 0 / 2 . The probability of 1.0E-10


false alarm is then the probability that the detection variable 1.0E-16 1.0E-12 1.0E-08 1.0E-04 1.0E+00

exceeds a set threshold.


Probability of False Alarm
1 f

2V 02 ³T
PF exp( z / 2V 02 )dz
(31) Fig. 6 Variation of the Probability of detection with the signal to
noise ratio and false probability
T / 2V 02
e

1216
World Academy of Science, Engineering and Technology 52 2009

From Fig.6 it is clear that probability of detection increases Referring to Fig.8, it is seen that when the false alarm
with the signal to noise ratio, and also with false alarm probability is low (e.g. PF = 10-8 ), the acquisition time is long
probability. but decreases with the signal to noise ratio, and when the false
alarm probability is high (e.g. PF = 0.316), the acquisition
Effect of Timing Errors time is long shorter and decreases with the signal to noise
The presentation given so far allows for a non-zero timing ratio.
error, i.e. for R(W) < 1. When timing occur, their effect in the What has emerged here is that high false alarm rate can be
probability of detection as is evident in (34) is to reduce the tolerated in order to have greater probability of detection and
effective signal to noise ratio. Every occurrence of the signal shorter acquisition times. The effect of timing errorson these
to noise ratio is multiplied by R2(W). That is the curves in Fig.6 results is to shift down the curves of Fig.7 (lowering detection
will shift down by an amount equivalent to R2(W) expressed probabilities) and shift the curves of Fig.8 (increasing the
in dB. For example if R2(W) =0.64 the reduction is by about acquisition time). What was also observed was that as the
2 dB. In order to have a clearer interpretation of this it is length N of the unique word was increased, the performance
better to present the detection times and probabilities against get better.
the signal to noise ratio with the false alarm probability held
temporarily constant.
REFERENCES
When the false alarm probability is low (e.g. PF = 10-8 in [1] E. Lutz, M. Werner, A. Jahn, Satellite Systems for Personal and
Fig.7), the probability of detection is low but increases with Broadband Communications, Springer, 2000D.
the signal to noise ratio. When the false alarm probability is [2] Roddy, Satellite Communications, 2nd Ed., McGraw-Hill 1996
[3] G. Maral, M.Bousquet, Satellite Communications Systems: Systems,
high (e.g. PF = 0.316 in Fig.7), the probability of detection is
Techniques And Technology, John Wiley & Sons 1999
higher and increases with the signal to noise ratio. [4] J. N. Pelton, The Basics of Satellite Communications, 2nd
EditionInternational Engineering Consortium 2006.
1.00 [5] S. Tirró, Satellite Communication System Design, Springer 1993
[6] M. Richharia, Satellites Communications Systems, McGraw-Hill 1999
0.90 [7] D. I. Dalgleish, An Introduction to Satellite Communications, Institution
P FA = 0.316
0.80 of Engineers, IET 1989
[8] A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication,
Probability of Detection

PFA = 0.1
0.70 Prentice-Hall, 1995
0.60 [9] S.H.Won, and L.Hanzo, “Analysis of Serial Search Based Code
PFA = 10-2 Acquisition in Multiple Transmit Antenna Aided DS-CDMA Downlink”
0.50 In: IEEE VTC'05 (Fall), 25-28 September 2005, Intercontinental Hotel,
0.40 Dallas, Texas, USA.
PFA=10-4
[10] H.Puska, H.Saarnisaari, J.Iinatti, P.Lilja, “Serial search code acquisition
0.30 using smart antennas with single correlator or matched filter”, IEEE
PFA = 10-8 Transactions on Communications, Vol.:56, No.2 pp. 299-308, Feb.2008
0.20
[11] S.Glisic, B. Vucetic, Spread Spectrum CDMA Systems For Wireless
0.10 Communications, Artech House 1997
0.00
-12 -8 -4 0 4 8 12 16 20 Vitalice K. Oduol received his pre-university education at Alliance High
School in Kenya. In 1981 he was awarded a CIDA scholarship to study
Signal to Noise Ratio [dB]
electrical engineering at McGill University, Canada, where he received the
B.Eng. (Hons.) and M.Eng. degrees in 1985 and 1987, respectively, both in
Fig.7 Variation of the probability of detection with signal to noise electrical engineering. In June 1992, he received the Ph.D. degree in electrical
engineering at McGill University.
ratio along curves of constant false alarm rate He was a research associate and teaching assistant while a graduate student
at McGill University. He joined MPB Technologies, Inc. in 1989, where he
1.0E+07
participated in a variety of projects, including meteor burst communication
PFA = 10-8 systems, satellite on-board processing, low probability of intercept radio,
Acquisition Time [seconds]

1.0E+06
among others. In 1994 he joined INTELSAT where he initiated research and
PFA = 10-4 development work on the integration of terrestrial wireless and satellite
1.0E+05
PFA = 10-2 systems. After working at COMSAT Labs. (1996-1997) on VSAT networks,
1.0E+04 and TranSwitch Corp.(1998-2002) on product definition and architecture, he
PFA = 0.1 returned to Kenya, where since 2003 he has been with Department of
1.0E+03 Electrical and Information Engineering, University of Nairobi.
PFA = 0.316 Dr. Oduol was a two-time recipient of the Douglas tutorial scholarship at
1.0E+02 McGill University. He is currently chairman, Department of Electrical and
Information Engineering, University of Nairobi. His research interests include
1.0E+01 performance analysis, modeling and simulation of telecommunication
systems, adaptive error control, feedback communication.
1.0E+00
-10 -5 0 5 10 15 20 25
Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan
Signal to Noise Ratio [dB]

Fig.8 Variation of the acquisition time with signal to noise ratio


along curves of constant false alarm rate

1217

You might also like