• 沒有找到結果。

2016 WNFA LAB2

N/A
N/A
Protected

Academic year: 2022

Share "2016 WNFA LAB2"

Copied!
33
0
0

全文

(1)

Mobile and Vehicular Network Lab

2016 WNFA LAB2

Yu-Lin Wei 2016.3.25

USRP

(2)

Mobile and Vehicular Network Lab

Outline

• Intro

– USRP

– Environment

• TODO

– Transmitter – Receiver

– Decoding

• Grading Criteria

(3)

Mobile and Vehicular Network Lab

Intro

What is USRP

(4)

Mobile and Vehicular Network Lab

• Universal Software Defined Radio

– Expensive !

– Use C++/ python/ GUI to define the radio !!

• Official document

– https://www.ettus.com/content/files/07495_Ettus

_N200-210_DS_Flyer_HR.pdf

(5)

Mobile and Vehicular Network Lab

Ethernet to PC

(6)

Mobile and Vehicular Network Lab

• UHD

– USRP Hardware Driver – C++ API

– http://files.ettus.com/manual/

– https://github.com/EttusResearch/uhd

• UHD tool

– uhd_find_devices

• This program scans the network for supported devices

and prints out a list of discovered devices and their IP

addresses.

(7)

Mobile and Vehicular Network Lab

(8)

Mobile and Vehicular Network Lab

– uhd_usrp_probe

• This program constructs an instance of the device and prints out its properties, such as detected

daughterboards, frequency range, gain ranges,

(9)

Mobile and Vehicular Network Lab

• How to compile

– File Directory

• Use built in Make file

• uhd/host/examples

• Put your files here

• Add your files in the Cmakelist.txt

– Compile Directory

• uhd/host/build/examples

• make

(10)

Mobile and Vehicular Network Lab

Intro

Environment

(11)

Mobile and Vehicular Network Lab

• Last year…..

(12)

Mobile and Vehicular Network Lab

• System in LAB

• Access through ssh ( test your single_tx/

single_rx)

(13)

Mobile and Vehicular Network Lab

• ssh wnfa_16_[#]@10.5.6.202

– E.g. wnfa_16_01@10.5.6.202

• HW code put in ~/uhd/host/example

– single_tx.cpp – single_rx.cpp

• cd ~/uhd/host/build

• cmake .. (only the first time

• make

• cd example ( now in ~/uhd/host/build/example

(14)

Mobile and Vehicular Network Lab

• mkdir wn_trace

• put your src_data_1.bin here! ( transmitted by Tx

• Transimitter :

– ./single_tx --f=2.49 --i=128

• Receiver:

– ./single_rx --f=2.49 --i=128

• Received data in ./wn_trace/recv_signal.bin

(15)

Mobile and Vehicular Network Lab

Working Flow : (wn_lab2

• Run program/matlab/singal_generator.m

• Get src_data_1.bin / src_data_1.mat in program/trace

• Upload src_data_1.bin to wnfa_16_[#]account

• ~/uhd/host/build/example/wn_trace

• run ./single_tx ./single_rx under

~/uhd/host/build/example

• Download …example/wn_trace/recv_signal.bi

n

(16)

Mobile and Vehicular Network Lab

• Put recv_signal.bin in program/trace

• Run program/decode.m to get the plot

(17)

Mobile and Vehicular Network Lab

TODO

Tx / Rx

(18)

Mobile and Vehicular Network Lab

• Tx ( single_tx.cpp)

– Given data array, transmit it

• Rx ( single_rx.cpp)

– Implement receiving function

(19)

Mobile and Vehicular Network Lab

TODO

Decoding -

MATLAB

(20)

Mobile and Vehicular Network Lab

• Decode.m

– CFO correction – Packet detection – Phase Track

– Calculate SNR

(21)

Mobile and Vehicular Network Lab

• Figure 1 : Raw

(22)

Mobile and Vehicular Network Lab

• Figure 2: Preamble Channel

(23)

Mobile and Vehicular Network Lab

• Figure 3 : subcarrier estimation

(24)

Mobile and Vehicular Network Lab

• Figure 4 : phase shift animation

(25)

Mobile and Vehicular Network Lab

• Figure 5 : subcarrier SNR ( may be different )

(26)

Mobile and Vehicular Network Lab

• Figure 6 : symbol SNR ( may be different )

(27)

Mobile and Vehicular Network Lab

• Figure 7 : constellation

(28)

Mobile and Vehicular Network Lab

Grading Criteria

(29)

Mobile and Vehicular Network Lab

• Tx : 15%

• Rx : 15%

– If only either of them work, judge by if can work w/ TA version Tx/ Rx

• MATLAB

– Figure 2-3 : 5%

– Figure 4-7: 10%

• Report

– 10%

(30)

Mobile and Vehicular Network Lab

• Deadline:4/26(Tue.) 23:59 email to wn@csie.ntu.edu.tw – Email subject:[WN]lab2_teamXX

– [WN]lab2_teamXX.zip

• source code(single_tx.cpp/ single_rx.cpp/ decode.m phaseTrack.m pkt_detection.m)

• Report(.pdf)

• Demo-4/26(Tue.)

– Please register the demo slot. And come to CSIE R424 at that time. (TBA)

– All you should do are :

• Run the working flow in p15

Grading Criteria

(31)

Mobile and Vehicular Network Lab

特別評分機制

• 90% Lab 團體成績 (由各個作業負責的助教決定)

• 10% 小組互評成績

– 匿名

– 給分範圍為 -2.5 ~ 2.5

– 給分總和需等於 0 (ex 0.25/0.25/-0.25/-0.25)

• 目的

– Report 上的工作分配有時無法準確的表達各個組員 各自的想法,因此添加此機制作參考

(32)

Mobile and Vehicular Network Lab

• Contact to TAs :

– facebook

https://www.facebook.com/groups/wn15spring/

– Email : wn@csie.ntu.edu.tw

– Office hour : Tue. 13:20~14:10/TBA

@ CSIE R424

(33)

Mobile and Vehicular Network Lab

Q&A

參考文獻

相關文件

a smooth cost function, so that the cost of an instance should be similar with its neighbors’.On the basis of the extended idea, we propose the cost-sensitive tree sampling

Though located in the mandible, the tooth in the present case was considered to be unilateral gemination due to the presence of clinical and radiographical properties such as a

The literature points out that in the oral cavity it is observed with greater frequency in the mucosa that covers the bone tissue, such as that of the hard palate and gingiva..

Taking into account sensitivity, speci ficity, accuracy, and positive and negative likelihood ratios, the right part of the first cervical vertebrae CBCT-derived RD values were the

Objectives This study investigated the clinical effectiveness of intervention with an open-mouth exercise device designed to facilitate maximal interincisal opening (MIO) and

In the example of Fourier series, for instance, period 1-functions can be regarded as functions on the multiplicative group while the sequences of Fourier coecients of such

In fact, one way of getting from Fourier series to the Fourier transform is to consider nonperiodic phenomena (and thus just about any general function) as a limiting case of

1 As an aside, I don’t know if this is the best way of motivating the definition of the Fourier transform, but I don’t know a better way and most sources you’re likely to check

Recall that we defined the moment of a particle about an axis as the product of its mass and its directed distance from the axis.. We divide D into

– Zero flag – destination equals zero – Sign flag – destination is negative – Carry flag – unsigned value out of range – Overflow flag – signed value out of range. • The

In JSDZ, a model process in the modeling phase is treated as an active entity that requires an operation on its data store to add a new instance to the collection of

Then, we tested the influence of θ for the rate of convergence of Algorithm 4.1, by using this algorithm with α = 15 and four different θ to solve a test ex- ample generated as

Particularly, combining the numerical results of the two papers, we may obtain such a conclusion that the merit function method based on ϕ p has a better a global convergence and

We investigate some properties related to the generalized Newton method for the Fischer-Burmeister (FB) function over second-order cones, which allows us to reformulate the

 The IEC endeavours to ensure that the information contained in this presentation is accurate as of the date of its presentation, but the information is provided on an

/** Class invariant: A Person always has a date of birth, and if the Person has a date of death, then the date of death is equal to or later than the date of birth. To be

= special contextual bandit + verified instances as rewards.. Good Properties of Greedy. Case 1: positive

To convert a string containing floating-point digits to its floating-point value, use the static parseDouble method of the Double class..

The peak detector and loop filter form a feedback circuit that monitors the peak amplitude, A out, of the output signal V out and adjusts the VGA gain until the measured

It allows a much wider range of algorithms to be applied to the input data and can avoid problems such as the build-up of noise and signal distortion during processing.. Since

Through the research, we can also understand the impact of computer-aided scoring system on teaching and scoring , as well as find out how much influence of this software has on

This pattern is also supported by the significant coefficients of another national identification variable, ‘‘Taiwanese and Chinese belong to the same nation.’’ This implies

In order to grasp the development trend of information and communication security and to establish an application-orientated academic research model, this master program takes