Design of High-Speed Time-Interleaved Delta-Sigma D/A Converters


Book Description

Digital-to-analog (D/A) converters (or DACs) are one the fundamental building blocks of wireless transmitters. In order to support the increasing demand for highdata-ate communication, a large bandwidth is required from the DAC. With the advances in CMOS scaling, there is an increasing trend of moving a large part of the transceiver functionality to the digital domain in order to reduce the analog complexity and allow easy reconguration for multiple radio standards. ?? DACs can t very well into this trend of digital architectures as they contain a large digital signal processing component and oer two advantages over the traditionally used Nyquist DACs. Firstly, the number of DAC unit current cells is reduced which relaxes their matching and output impedance requirements and secondly, the reconstruction lter order is reduced. Achieving a large bandwidth from ?? DACs requires a very high operating frequency of many-GHz from the digital blocks due to the oversampling involved. This can be very challenging to achieve using conventional ?? DAC architectures, even in nanometer CMOS processes. Time-interleaved ?? (TIDSM) DACs have the potential of improving the bandwidth and sampling rate by relaxing the speed of the individual channels. However, they have received only some attention over the past decade and very few previous works been reported on this topic. Hence, the aim of this dissertation is to investigate architectural and circuit techniques that can further enhance the bandwidth and sampling rate of TIDSM DACs. The rst work is an 8-GS/s interleaved ?? DAC prototype IC with 200-MHz bandwidth implemented in 65-nm CMOS. The high sampling rate is achieved by a two-channel interleaved MASH 1-1 digital ?? modulator with 3-bit output, resulting in a highly digital DAC with only seven current cells. Two-channel interleaving allows the use of a single clock for both the logic and the nal multiplexing. This requires each channel to operate at half the sampling rate i.e. 4 GHz. This is enabled by a high-speed pipelined MASH structure with robust static logic. Measurement results from the prototype show that the DAC achieves 200-MHz bandwidth, –57-dBc IM3 and 26-dB SNDR, with a power consumption of 68-mW at 1-V digital and 1.2-V analog supplies. This architecture shows good potential for use in the transmitter baseband. While a good linearity is obtained from this DAC, the SNDR is found to be limited by the testing setup for sending high-speed digital data into the prototype. The performance of a two-channel interleaved ?? DAC is found to be very sensitive to the duty-cycle of the half-rate clock. The second work analyzes this eect mathematically and presents a new closed-form expression for the SNDR loss of two-channel DACs due to the duty cycle error (DCE) for a noise transfer function (NTF) of (1 — z—1)n. It is shown that a low-order FIR lter after the modulator helps to mitigate this problem. A closed-form expression for the SNDR loss in the presence of this lter is also developed. These expressions are useful for choosing a suitable modulator and lter order for an interleaved ?? DAC in the early stage of the design process. A comparison between the FIR lter and compensation techniques for DCE mitigation is also presented. The nal work is a 11 GS/s 1.1 GHz bandwidth time-interleaved DAC prototype IC in 65-nm CMOS for the 60-GHz radio baseband. The high sampling rate is again achieved by using a two-channel interleaved MASH 1-1 architecture with a 4-bit output i.e only fteen analog current cells. The single clock architecture for the logic and the multiplexing requires each channel to operate at 5.5 GHz. To enable this, a new look-ahead technique is proposed that decouples the two channels within the modulator feedback path thereby improving the speed as compared to conventional loop-unrolling. Full speed DAC testing is enabled by an on-chip 1 Kb memory whose read path also operates at 5.5 GHz. Measurement results from the prototype show that the ?? DAC achieves >53 dB SFDR, < —49 dBc IM3 and 39 dB SNDR within a 1.1 GHz bandwidth while consuming 117 mW from 1 V digital/1.2 V analog supplies. The proposed ?? DAC can satisfy the spectral mask of the 60-GHz radio IEEE 802.11ad WiGig standard with a second order reconstruction lter.




Security-Aware Design for Cyber-Physical Systems


Book Description

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.




IoT for Defense and National Security


Book Description

IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.




Moving Broadband Mobile Communications Forward


Book Description

The deployment of 4G/LTE (Long-Term Evolution) mobile networks has solved the major challenge of high capacities to build a real broadband mobile internet. This was possible mainly through a very strong physical layer and flexible network architecture. However, bandwidth-hungry services such as virtual reality (VR) and augmented reality (AR), have been developed in an unprecedented way. Furthermore, mobile networks are facing other new services with extreme demand for greater reliability and almost zero-latency performance, like vehicle communications and the Internet of Vehicles (IoV). Therefore, industries and researchers are investigating new physical layers and softwarization techniques and including more intelligence in 5G and beyond 5G (B5G/6G). This book discusses some of these softwarization techniques, such as fog computing, cloud computing, and artificial intelligence (AI) and machine learning (ML). It also presents use cases showing practical aspects from 5G deployment scenarios, where other communications technologies will co-habit to build the landscape of next-generation mobile networks (NGMNs).




Multi-agent Collaborative Perception for Autonomous Driving


Book Description

This report delves into the field of multi-agent collaborative perception (MCP) for autonomous driving: an area that remains unresolved. Current single-agent perception systems suffer from limitations, such as occlusion and sparse sensor observation at a far distance. Multi-agent Collaborative Perception for Autonomous Driving: Unsettled Aspects addresses three unsettled topics that demand immediate attention: Establishing normative communication protocols to facilitate seamless information sharing among vehicles Defining collaboration strategies, including identifying specific collaboration projects, partners, and content, as well as establishing the integration mechanism Collecting sufficient data for MCP model training, including capturing diverse modal data and labeling various downstream tasks as accurately as possible Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2023017




Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks


Book Description

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.




Principles of LED Light Communications


Book Description

Learn how to build efficient, simple, high performance indoor optical wireless communication systems based on visible and infrared light.




Next-Generation Wireless Technologies


Book Description

This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the ‘Internet of Things’ from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.




Vehicular Ad Hoc Networks


Book Description

This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who's who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and finally looking into the future of VANETs by investigating alternative, complementary communication technologies, innovative networking paradigms and visionary applications (Part V). The way the content is organized, with a differentiated level of technical details, makes the book a valuable reference for a large pool of target readers ranging from undergraduate, graduate and PhD students, to wireless scientists and engineers, to service providers and stakeholders in the automotive, ITS, ICT sectors.




Data Analytics and Applications of the Wearable Sensors in Healthcare


Book Description

This book provides a collection of comprehensive research articles on data analytics and applications of wearable devices in healthcare. This Special Issue presents 28 research studies from 137 authors representing 37 institutions from 19 countries. To facilitate the understanding of the research articles, we have organized the book to show various aspects covered in this field, such as eHealth, technology-integrated research, prediction models, rehabilitation studies, prototype systems, community health studies, ergonomics design systems, technology acceptance model evaluation studies, telemonitoring systems, warning systems, application of sensors in sports studies, clinical systems, feasibility studies, geographical location based systems, tracking systems, observational studies, risk assessment studies, human activity recognition systems, impact measurement systems, and a systematic review. We would like to take this opportunity to invite high quality research articles for our next Special Issue entitled “Digital Health and Smart Sensors for Better Management of Cancer and Chronic Diseases” as a part of Sensors journal.