Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
RESILIENT MACHINE-TO-MACHINE NETWORKS
Document Type and Number:
WIPO Patent Application WO/2022/226084
Kind Code:
A1
Abstract:
A transmitter spreads a data signal with an inner spreading code to produce a first spread signal; modulates a link mask onto the first spread signal to produce a masked signal; spreads the masked signal with an outer spreading code to produce a second spread signal; and modulates the second spread signal onto a multitone transmission signal. The link mask can include at least one of a destination mask and a source mask. A network mask might be modulated onto the second spread signal to conceal cyclic features in a spreading format used to spread the data signal and/or the first masked signal. A receiver demodulates a received multitone transmission to produce at least one demodulated signal; demasks the at least one demodulated signal to produce at least one demasked signal; and despreads the at least one demasked signal using an adaptation algorithm to remove the outer spreading code.

Inventors:
AGEE BRIAN (US)
Application Number:
PCT/US2022/025574
Publication Date:
October 27, 2022
Filing Date:
April 20, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AGEE BRIAN (US)
International Classes:
H04L27/26; H04B1/69; H04B1/707; H04W4/70
Foreign References:
US20190320303A12019-10-17
US20020150109A12002-10-17
US20170250772A12017-08-31
US20160254889A12016-09-01
US20150271004A12015-09-24
US20190036746A12019-01-31
Other References:
CRUSSIERE ET AL., ADAPTIVE SPREAD-SPECTRUM MULTICARRIER MULTIPLE-ACCESS OVER WIRELINES, July 2006 (2006-07-01), XP011142174, Retrieved from the Internet [retrieved on 20220808]
Attorney, Agent or Firm:
SHATTIL, Steven (US)
Download PDF:
Claims:
Claims

1. A method, comprising: spreading (201) a data signal with a length-N spreading code to produce a first spread data signal, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters; modulating (202) a link mask onto the spread data signal to produce a first masked signal; spreading (203) the first masked signal with a length-L spreading code to produce a second spread data signal; modulating (205) the second spread data signal onto a plurality' of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals N*L

2. The method of claim 1, wherein modulating (205) the second spread data signal onto a plurality of subcarriers comprises adding (221) time jitter to the multitone transmission signal.

3. The method of claim 2, wherein the time jitter is configured (221) to conceal cyclic features of multitone modulation.

4. The method of claim 1, wherein the length-N spreading code comprises an orthogonal code.

5. The method of Claim 4, wherein the orthogonal code is a Hadamard code.

6. The method of claim 1, wherein the length-L spreading code comprises a stacked carrier spread spectrum code.

7. The method of claim 1, wherein the link mask comprises at least one of a destination mask configured to enable a receiver to detect and separate signals intended for the receiver, and excise signals intended for other receivers; and a source mask configured to enable the receiver to separate transmissions received from multiple transmitters.

8. The method of claim 1, further comprising modulating (204) a network mask onto the second spread data signal; and wherein the network mask is configured to conceal cyclic features in a spreading format used to spread the data signal and/or the first masked signal.

9. The method of claim 1, wherein at least one of the length-L spreading code, a network mask, and time jitter added to the multitone transmission signal are unpredictably selected in each transmission time slot.

10. The method of claim 1, wherein modulating (205) comprises modulating the second spread data signal onto a plurality of antenna feeds.

11. The method of claim 1, wherein modulating (205) is configured to generate a fifth generation new radio (5GNR) signal.

12. An apparatus, comprising: one or more processors; memory in electronic communication with the one or more processors; and instructions stored in the memory and executable by the one or more processors to cause the apparatus to: spread (201) a data signal with a length-N spreading code to produce a first spread data signal, wherein A is a plurality of subcarrier frequencies in each of a plurality L of clusters; modulate (202) a link mask onto the spread data signal to produce a first masked signal; spread (203) the first masked signal with a length-L spreading code to produce a second spread data signal; and modulate (205) the second spread data signal onto a plurality of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals N·L.

13. The apparatus of claim 12, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to add (221) time jitter to the multitone transmission signal.

14. The apparatus of claim 13, wherein the time jitter is configured (221) to conceal cyclic features of multitone modulation.

15. The apparatus of claim 12, wherein the length-N spreading code comprises an orthogonal code.

16. The apparatus of Claim 15, wherein the orthogonal code is aHadamard code.

17. The apparatus of claim 12, wherein the length-L spreading code comprises a stacked carrier spread spectrum code.

18. The apparatus of claim 12, wherein the link mask comprises at least one of a destination mask configured to enable a receiver to detect and separate signals intended for the receiver, and excise signals intended for other receivers; and a source mask configured to enable the receiver to separate transmissions received from multiple transmitters.

19. The apparatus of claim 12, further comprising instructions stored in the memory and executable by the one or more processors to modulate (204) a network mask onto the second spread data signal; wherein the network mask is configured to conceal cyclic features in a spreading format used to spread the data signal and/or the first masked signal.

20. The apparatus of claim 12, wherein at least one of the length-L spreading code, a network mask, and time jitter added to the multitone transmission signal are unpredictably selected in each transmission time slot.

21. The apparatus of claim 12, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to modulate (205) the second masked signal onto a plurality of antenna feeds.

22. A method, comprising: demodulating (301) a received multitone transmission to produce at least one demodulated signal; demasking (302) the at least one demodulated signal, by removing at least one link mask, to produce at least one demasked signal; and despreading (303) the at least one demasked signal, wherein the at least one demasked signal comprises an inner spreading code and an outer spreading code, and despreading configures an adaptation algorithm to remove the outer spreading code.

23. The method of claim 22, wherein the inner code comprises a length-N spreading code, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters; the outer code comprises a length-L spreading code; and the received multitone transmission comprises N·L subcarriers.

24. The method of claim 22, wherein the at least one link mask comprises at least one of a source mask and a destination mask.

25. The method of claim 22, wherein the demasking (302) further comprises removing a network mask.

26. The method of claim 22, wherein the adaptation algorithm computes linear combining weights to provide for linear-algebraic code nulling.

27. The method of claim 22, wherein the received multitone transmission is a fifth generation new radio (5GNR) signal, and the demodulating (301) is configured to demodulate the 5GNR signal.

28. The method of claim 22, further comprising demodulating (304) at least one despread signal produced by the despreading (303) to produce demodulated symbols.

29. The method of claim 28, further comprising extracting (305) jitter from the demodulated symbols.

30. The method of claim 22, wherein the demasking (302) is configured to separate multiple signals in the at least one demodulated signal, each one of the multiple signals having a different source mask.

31. The method of claim 22, wherein the demasking (302) is configured to perform algebraic code nulling to excise at least one of signals intended for at least one other receiver, interferencejamming signals, or spoofers.

32. The method of claim 22, wherein the at least one link mask comprises at least one source mask, and the demasking (302) is configured to deduce at least one transmitter’s identity from the at least one source mask.

33. The method of claim 22, further compnsing estimating (306) a time-of-arrival (TOA) of the received multitone transmission from demodulated symbols produced by demodulating (304) at least one despread signal or from corrected demodulated symbols produced by extracting (305) jitter from the demodulated symbols.

34. The method of claim 22, further compnsing computing (307) at least one of positioning and timing synchronization from a time-of-arrival (TOA) of the received multitone transmission.

35. The method of claim 22, wherein the demodulating (301) is performed using a multifeed dimensional multitone modem communicatively coupled to at least one of a spatial- diverse antenna array or a polarization-diverse antenna array.

36. The method of claim 22, wherein the demasking (302) whitens (1704) the at least one demodulated signal to produce a whitened signal, followed by removing the at least one link mask from the whitened signal.

37. An apparatus, comprising: one or more processors; memory in electronic communication with the one or more processors; and instructions stored in the memory and executable by the one or more processors to cause the apparatus to: demodulate (301) a received multitone transmission to produce at least one demodulated signal; demask (302) the at least one demodulated signal, by removing at least one link mask, to produce at least one demasked signal; and despread (303) the at least one demasked signal, wherein the at least one demasked signal comprises an inner spreading code and an outer spreading code, and the at least one demasked signal is despread by an adaptation algorithm configured to remove the outer spreading code.

38. An apparatus, comprising: one or more processors; memory in electronic communication with the one or more processors; and instructions stored in the memory and executable by the one or more processors to cause the apparatus to: demodulate (301) a received multitone transmission to produce at least one demodulated signal; demask (302) the at least one demodulated signal, by removing at least one link mask, to produce at least one demasked signal; and despread (303) the at least one demasked signal by employing an adaptation algorithm configured to remove an outer spreading code, wherein the at least one demasked signal comprises an inner spreading code and the outer spreading code.

39. The apparatus of claim 37, wherein the inner code comprises a length-N spreading code, wherein A is a plurality of subcarrier frequencies in each of a plurality L of clusters; the outer code comprises a length-L spreading code; and the received multitone transmission comprises N·L subcarriers.

40. The apparatus of claim 37, wherein the at least one link mask comprises at least one of a source mask and a destination mask.

41. The apparatus of claim 37, wherein a network mask is removed from the at least one demodulated signal to demask (302) the at least one demodulated signal.

42. The apparatus of claim 37, wherein the adaptation algorithm computes linear combining weights to provide for linear-algebraic code nulling.

43. The apparatus of claim 37, wherein the received multitone transmission is a fifth generation new radio (5GNR) signal, and the instructions stored in the memory and executable by the one or more processors to cause the apparatus to demodulate (301) the received multitone transmission is configured to demodulate the 5GNR signal.

44. The apparatus of claim 37, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to demodulate (304) at least one despread signal after the at least one demasked signal is despread (303), to produce demodulated symbols.

45. The apparatus of claim 44, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to extract (305) jitter from the demodulated symbols.

46. The apparatus of claim 37, wherein the instructions stored in the memory and executable by the one or more processors to demask (302) the at least one demodulated signal are configured to separate multiple signals in the at least one demodulated signal, each one of the multiple signals having a different source mask.

47. The apparatus of claim 37, wherein the instructions stored in the memory and executable by the one or more processors to demask (302) the at least one demodulated signal are configured to perform algebraic code nulling to excise at least one of signals intended for at least one other receiver, interferencejamming signals, or spoofers.

48. The apparatus of claim 37, wherein the at least one link mask comprises at least one source mask, and the instructions stored in the memory and executable by the one or more processors to demask (302) the at least one demodulated signal are configured to deduce at least one transmitter’s identity from the at least one source mask.

49. The apparatus of claim 37, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to estimate (306) a time- of-arrival (TOA) of the received multitone transmission from demodulated symbols produced by demodulating (304) at least one despread signal or from corrected demodulated symbols produced by extracting (305) jitter from the demodulated symbols.

50. The apparatus of claim 37, further comprising instructions stored in the memory and executable by the one or more processors to cause the apparatus to compute (307) at least one of positioning and timing synchronization from a time-of-arrival (TOA) of the received multitone transmission.

51. The apparatus of claim 37, wherein the instructions stored in the memory and executable by the one or more processors to demodulate (301) the received multitone transmission is configured to use a multifeed dimensional multitone modem communicatively coupled to at least one of a spatial-diverse antenna array or a polarization-diverse antenna array.

52. The apparatus of claim 37, wherein the instructions stored in the memory and executable by the one or more processors to demask (302) are configured to whiten (1704) the at least one demodulated signal to produce a whitened signal, followed by removing the at least one link mask from the whitened signal.

Description:
Resilient Machine-to-Machine Networks CROSS REFERENCE TO PRIOR APPLICATIONS [0001] This application claims the priority benefit of U.S. Provisional Pat. Appl. No. 63/177,379, filed on April 20, 2021; which is hereby incorporated by reference herein in its entirety. BACKGROUND [0002] Aspects of this disclosure relate generally to communication systems, and more particularly, to transmission and reception in fifth generation (5G) cellular networks, wireless local area networks (WLAN’s), wireless personal area networks (WPAN’s) and other wireless networks. [0003] The background description includes information that may be useful in understanding the present inventive subject matter. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed inventive subject matter, or that any publication, specifically or implicitly referenced, is prior art. [0004] Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. Typical wireless communication systems may employ multiple-access technologies capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power). Examples of such multiple-access technologies include Long Term Evolution (LTE) systems, code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, single-carrier frequency division multiple access (SC-FDMA) systems, time division synchronous code division multiple access (TD-SCDMA) systems, and stacked-carrier multiple access (SCMA) systems employing stacked-carrier spread spectrum (SCSS) modulation formats. [0005] These multiple access technologies have been adopted in various wireless networking and telecommunication standards to provide a common protocol that enables different wireless devices to communicate on a close-proximity, local, municipal, national, regional, and/or even global level. For example, 5G (also called New Radio (NR)) wireless access is being developed with three broad use case families in mind: enhanced mobile broadband (eMBB), massive or enhanced machine-type communications (MTC), and ultra-reliable low- latency communications (URLLC). Beyond 5G (NR) refers to visions for future generations of wireless communications (e.g., 5G-Advanced, 5G-Extended, 6G) that enable groundbreaking high-bandwidth, low-latency, massive capacity, and massive connectivity networks, e.g., using unique network slices in Open Radio Access Network (O-RAN) systems. [0006] However, as the demand for mobile broadband access continues to increase, there exists a need for further improvements in wireless networking and telecommunications technology. Preferably, these improvements should be applicable to other multi-access technologies and the wireless networking and telecommunication standards that employ these technologies. SUMMARY [0007] The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that follows. Any of the functions, techniques, aspects, operations, or concepts described in this Summary may be employed in any of the disclosure herein, including the Drawings and Detailed Description. [0008] The components and links of the wireless communication system may take different forms in different implementations. For example, and without limitation, UEs may be cellular devices, Internet of Things (IoT) devices, cellular IoT (CIoT) devices, machine-type communication (MTC) devices, unmanned aerial systems (UASs), navigation systems, vehicles, robotic devices, smart alarms, remote sensors, smart phones, mobile phones, smart meters, personal digital assistants (PDAs), personal computers, wearables, mesh nodes, and tablet computers. [0009] Disclosed aspects can be configured for various services and emerging applications in NR and Beyond-NR, including massive Machine Type Communication (MTC), which supports massive connectivity with packet transmission at low energy expenditure, and Ultra Reliable Low latency Communication. Disclosed aspects utilize multitone modulation, which can be configured for any of NR’s candidate waveforms, including orthogonal frequency division multiplexing (OFDM), SC-FDM, SC-FDMA, filter bank multi-carrier (FBMC), generalized frequency division multiplexing (GFDM), and others. Disclosed aspects employ multitone (e.g., multicarrier) spread spectrum transmission, which can employ any of various linear transforms to spread energy of transmitted symbols over the subcarriers. [0010] Disclosed aspects can be configured for non-orthogonal multiple access (NOMA) techniques, including power-domain techniques, such as super-position coding NOMA (SPC- NOMA), code-domain techniques, such as sparse code multiple access (SpCMA) or pattern domain multiple access (PDMA), inter-leaver techniques, such as interleave division multiple access (IDMA), resource spread multiple access (RSMA), or multi-user shared access (MUSA). NOMA is provisioned when multiple users are multiplexed onto the same resource in a manner that allows them to be separated at the receiver using linear-algebraic signal processing methods. NOMA can comprise spreading over multiple resources. In one example, NOMA techniques disclosed herein might configure non-orthogonal spreading over frequency, as well as space and/or polarization. [0011] In some implementations, UEs may communicate with each other directly via a device-to-device (D2D) link 110 or some other similar type of direct link. D2D can be implemented in mesh networks; peer-to-peer or point-to-point (P2P) networks; point-to- multipoint (P2MP) networks; multipoint-to-point (MP2P) networks; or multipoint-to- multipoint (MP2MP) networks, and/or might be referred to using some other terminology; and can be instantiated within cellular networks, wireless local-area networks (WLAN’s), and wireless personal area networks (WPAN’s). D2D communication can enable direct communication between devices without going through the core of a cellular network. The devices in D2D mode retrieving from local source devices are typically fewer than those communicating with a TRP, can access the channel faster, and consume less power, e.g., without energy-consumptive link setup and tear-down requirements, among other benefits. [0012] Various types of network-to-device links and D2D links may be supported in the wireless communication system. For example, D2D links may include, without limitation, machine-to-machine (M2M) links, MTC links, vehicle-to-vehicle (V2V) links, and vehicle- to-anything (V2X) links. Network-to-device links may include, without limitation, uplinks (or reverse links), downlinks (or forward links), vehicle-to-network (V2N) links, and V2X links. Broadcast links may include, without limitation, V2V links, V2X links, M2M links, and MTC links. In some aspects, V2V and V2N communication may be considered as examples of V2X communication. [0013] In some implementations, UEs may employ at least some TRP functionality. In some aspects, the TRP may include 5GNR functionality with an air interface based on OFDM. The functionality of a TRP may be similar in one or more aspects to (or incorporated into) the functionality of a CIoT base station (C-BS), a NodeB, an evolved NodeB (eNodeB), radio access network (RAN) access node, a radio network controller (RNC), a base station (BS), a radio base station (RBS), a base station controller (BSC), a base transceiver station (BTS), a transceiver function (TF), a radio transceiver, a radio router, a basic service set (BSS), an extended service set (ESS), a macro cell, a macro node, a Home eNB (HeNB), a femto cell, a femto node, a pico node, or some other suitable entity. In different scenarios, a TRP may be referred to as a gNodeB (gNB), an eNB, a base station, an access point (AP), a data aggregation point (DAP), or some other terminology. [0014] In one example, a resilient mesh network is configured to enable low-cost, low probability of detection (LPD) communication of low-rate control and traffic data in contested environments. One aspect uses a combination of spread spectrum multitone modulation with unpredictable (e.g., randomly selected) spreading codes and time jitter configured to conceal cyclic features of the multitone modulation and prevent spoofing by sophisticated adversaries. In one example, SCSS can be employed. In some LPD aspects, a network mask conceals cyclic features of the spreading format; and a destination mask enables receivers to detect and separate network signals intended for that receiver, and excise network signals intended for other receivers (e.g., by using low-complexity linear-algebraic code nulling algorithms that are inherently resilient to near-far interference between network nodes). [0015] Disclosed aspects can be seamlessly integrated with spatial/polarization diverse antenna arrays and multifeed dimensional multitone modems, to further reduce vulnerability of the signal transmitters to radiometric and interferometric (cross-correlation) methods used by adversaries to intercept those signals, provide further protection against wideband and narrowband interference (e.g., jamming), and allow transceiver implementations using low size-weight-and-power (SWaP) and low cost (SWaP-C) single-chip transceiver architectures. Disclosed aspects can be additionally configured to provide low latency and/or energy- efficient packet transmission for at least some modes of operation. [0016] In some aspects, transmission apparatus and methods provide for spreading a data signal with a length-N spreading code (e.g., an inner code) to produce a first spread data signal, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters; modulating a link mask onto the spread data signal to produce a first masked signal; spreading the first masked signal with a length-L spreading code (e.g., an outer code) to produce a second spread data signal; and modulating the second spread data signal onto a plurality of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals the product of N and L, N•L. Some instances might be configured to modulate a network mask onto the second spread data signal before the second spread data signal is modulated onto the plurality of subcarriers. [0017] The link mask might include a destination mask configured to enable a receiver to detect and separate signals intended for the receiver, and excise signals intended for other receivers. The link mask might include a source mask configured to enable the receiver to separate multiple transmission signals (from different sources) intended for the receiver. The network mask can be configured to conceal cyclic features in a spreading format used to spread the data signal and/or the first masked signal. In some aspects, modulating the second masked signal onto the plurality of subcarriers can comprise modulating the second masked signal onto a plurality of antenna feeds. [0018] In some aspects, a source mask is also added to the first spread data signal in order to improve separation of multiple transmitted signals at a target receiver. Exemplary source masks include, but are not limited to, a mask unique to the transmitter, e.g., provisioned at network entry; a member of a finite alphabet of masks known to the receivers and unpredictably chosen by the transmitter over each slot; or a mask that can be estimated by the receiver as part of the despreading process, e.g., a cyclic phase ramp that induces a cyclic delay on the first spread signal, where the separation between allowable delay values is much greater than delay induced by the network. A receiver may employ blind methods that do not require the pilot signal, or partially blind methods for separating signals and/or excising interference. Examples of blind, partially blind, and non-blind despreading methods that can be employed as despreading disclosed herein, and other method and apparatus aspects disclosed herein, can be found in U.S. Pat. Nos.9,648,444, 10,812,955, 10,971,768, 8,363,744, 9,928,212, and 7,079,480; U.S. Pat. Appl. No.63/138,300; and PCT Appl. No. PCT/US21/16334; all of which are incorporated by reference in their entireties. [0019] In some aspects, the data signal is multiplexed (MUX’d) with a jitter symbol that encodes the value of time jitter applied to the multitone output signal, e.g., by jittering the output clock, or by modulating the multitone subcarriers by a frequency ramp proportional to the jitter value. The time jitter can be unpredictably varied between transmit slots, thereby further reducing vulnerability of signal transmitters to cyclic feature methods used by adversaries to intercept those signals, e.g., by detecting the cyclic prefix of the signal. [0020] In some aspects, the data signal is multiplexed with a pilot symbol that simplifies the ability for the receiver to detect the transmitted signal and extract it from interfering signals also impinging on the receiver, even if those interfering signals are not orthogonal to the transmitted signal, e.g., in non-orthogonal multiple access (NOMA) systems. [0021] The aforementioned instances of spreading and modulating can comprise means for spreading and means for modulating, such “means for” comprising circuits, computer processors, devices, systems, and/or combinations thereof configured to perform the disclosed aspects. [0022] The aforementioned instances of spreading and modulating can comprise configuring circuits, computer processors, devices, systems, and/or combinations thereof to perform the disclosed spreading and modulating. Such configuring can comprise designing, assembling, manufacturing, programming, and/or otherwise configuring circuits, computer processors, devices, systems, and/or combinations thereof. [0023] In some instances, computer program code is provisioned to comprise instructions that configure at least one computer processor or other programmable circuit(s) to perform the disclosed aspects. In some instances, a computer program product stored on at least one non-transitory computer-readable memory comprises instructions that configure at least one computer processor or other programmable circuit(s) to perform the disclosed aspects. [0024] In one aspect, modulating the second masked signal onto a plurality of subcarriers comprises adding time jitter to the multi-tone transmission signal. The time jitter can be configured to conceal cyclic features of multi-tone modulation. In some aspects, the length-N spreading code comprises an orthogonal code, such as a Hadamard code. In one aspect, the length-L spreading code comprises a stacked carrier spread spectrum code. At least one of the length-L spreading code, the network mask, and time jitter added to the multitone transmission signal can be unpredictably selected in each transmission time slot. [0025] In some aspects, receiver apparatus and methods provide for demodulating a received multitone transmission signal into a plurality of subcarriers to produce a demodulated signal; demasking the demodulated signal by removing a link mask from the demodulated signal to produce a demasked signal; despreading the demasked signal to produce a despread signal; demodulating symbols in the despread signal to produce demodulated symbols; and extracting jitter from the demodulated symbols to produce corrected demodulated symbols. In some instances, demasking can comprise removing a network mask from the demodulated signal. [0026] Some aspects further comprise estimating a time-of-arrival (TOA) of the received multitone transmission signal from the corrected demodulated symbols. In aspects in which the transmitted signal is modulated by timing jitter, the transmitted jitter value can be used to recover the true observed TOA from the estimated jittered TOA. Some aspects further comprise computing at least one of positioning and timing synchronization from the TOA. [0027] Demasking might comprise performing QR Decomposition (QRD), e.g., using a Modified Gram-Schmidt Orthogonalization (MGSO) procedure, after removing the network mask from the demodulated signal. Demasking might comprise performing algebraic code nulling to excise at least one of a set of signals intended for at least one other receiver, interference, jamming signals, and spoofers. [0028] Despreading can employ linear combining weights. In some aspects, despreading is configured to remove Hadamard spreading within each cluster of subcarriers. [0029] In some instances, demodulation is performed using a multifeed dimensional multitone modem communicatively coupled to at least one of a spatial-diverse antenna array or a polarization-diverse antenna array. Demodulating might comprise computing despreading weights that enable data and time jitter to be extracted from the received multitone transmission signal. [0030] The aforementioned instances of demasking, despreading, and demodulating can comprise means for demasking, means for despreading, and means for demodulating, such “means for” comprising circuits, computer processors, devices, systems, and/or combinations thereof configured to perform the disclosed aspects. [0031] The aforementioned instances of demasking, despreading, and demodulating can comprise configuring circuits, computer processors, devices, systems, and/or combinations thereof to perform the disclosed demasking, despreading, and demodulating. Such configuring can comprise designing, assembling, manufacturing, programming, and/or otherwise configuring circuits, computer processors, devices, systems, and/or combinations thereof. [0032] This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used in isolation to determine the scope of the claimed subject matter. The subject matter should be understood by reference to appropriate portions of the entire specification, any or all drawings, and each claim. [0033] To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed, and this description is intended to include all such aspects and their equivalents. BRIEF DESCRIPTION OF THE DRAWINGS [0034] So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects. [0035] FIG.1 is a block diagram conceptually illustrating an example communication network comprising a variety of possible network topologies, in accordance with certain aspects of the present disclosure. [0036] FIGs.2-5 illustrate exemplary method and apparatus implementations for generating multitone transmission signals according to some of the disclosed aspects. [0037] FIG.6 illustrates a multifeed transceiver that can be implemented with aspects of the disclosure. [0038] FIG.7 illustrates a multifeed front end that can be implemented with aspects of the disclosure. [0039] FIGs.8A and 8B illustrate an exemplary time-slot and symbol configuration that can be implemented in some aspects, such as in transmitted signals when a random or pseudorandom jitter is used to jitter the clock timing offset or to add a phase-ramp to a multitone modulator. [0040] FIG.9A illustrates a baseband cluster represented by data symbols modulated onto subcarrier frequencies. [0041] FIG.9B depicts a spreading code configured to spread each baseband cluster. [0042] FIG.9C depicts an exemplary SCSS signal. [0043] FIGs.10-13 illustrate method and apparatus implementations of some of the disclosed aspects that can be implemented for receiving a multitone transmission signal. [0044] FIG.14 is a block diagram of an exemplary four-feed demodulator, in accordance with some aspects of the disclosure. [0045] FIG.15 is a block diagram of an exemplary channelization operation. [0046] FIG.16 is a block diagram of an exemplary code-nulling algorithm. [0047] FIG.17 illustrates an exemplary process that can be implemented according to some disclosed aspects. [0048] FIG.18A illustrates an exemplary 5GNR transmitter configured according to some disclosed aspects, and FIG.18B illustrates an exemplary corresponding 5GNR receiver. [0049] To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures. It is contemplated that elements disclosed in one aspect may be beneficially utilized on other aspects without specific recitation. DETAILED DESCRIPTION [0050] The following description provides examples, and is not limiting of the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For instance, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Also, features described with respect to some examples may be combined in some other examples. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method which is practiced using other structure, functionality, or structure and functionality in addition to or other than the various aspects of the disclosure set forth herein. It should be understood that any aspect of the disclosure disclosed herein may be embodied by one or more elements of a claim. The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any aspect described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other aspects. [0051] The techniques described herein may be used for various wireless communication networks such as LTE, CDMA, TDMA, FDMA, OFDMA, SC-FDMA and other networks. The terms "network" and "system" are often used interchangeably. An OFDMA network may implement a radio technology such as NR (e.g.5GNR), Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, etc. UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). NR is an emerging wireless communications technology under development in conjunction with the 5G Technology Forum (5GTF). The techniques described herein may be used for the wireless networks and radio technologies mentioned above as well as other wireless networks and radio technologies. [0052] Disclosed aspects can be configured to employ any of the network topologies illustrated in FIG.1. Transmitting nodes 701-706 and receiving nodes 711-714 are depicted in this example. Point-to-point (P2P) communication occurs between nodes 701 and 711. Node 712 is depicted in a multipoint-to-point communication (MP2P) link with nodes 702, 705, and 706. MP2P configurations might employ simultaneous or serial multi-user reception. Node 702 is depicted in a point-to-multipoint (P2MP) link with nodes 712 and 713. P2MP configurations might employ simultaneous or serial multi-user transmission. Node 704 is shown in a broadcast mode, such as a “hearbeat” or node advertisement mode. Node 714 is shown in a monitor (e.g., network discovery) mode. In some aspects, such as when transmitters and receivers are in close proximity (710 and 720), disclosed aspects can improve resilience to near-far interference. [0053] The nodes 701-706 and/or 711-714 might each comprise a spatial and/or polarization diverse multifeed transceiver, in which an array of spatial/polarization diverse antennas are coupled to a transmit/receive switch and optional beamforming network. The transmit/receive switch and/or beamforming network can be configured to feed multiple receivers during signal reception and/or environment monitoring (e.g., node/network discovery, RFSA) operations, and can be fed by multiple transmitters during signal transmission operations. In one example, a received multifeed, multitone signal is demodulated from the feeds during reception intervals, and modulated onto the feeds during transmit intervals. For example, the transceiver might have a dimensional tuner in which a harmonic mixer transforms the individual transceiver feeds to/from a single wideband signal, and a dimensional multitone modem that transforms the single wideband signal to/from multiple subcarriers using combinations of fast Fourier transform (FFT) and inverse FFT (IFFT) operations and polyphase filtering modules. [0054] Disclosed aspects can be configured for decentralized network topology types. By way of example, but without limitation, a network topology might employ little or no “network infrastructure,” i.e., base stations, also known as Node B’s (NB’s) and (in 5GNR networks) gNode B’s (gNB’s), access points (AP’s), data aggregation points (DAP’s) and/or network operations centers (NOC’s). In some aspects, physical-layer configuration provides for simultaneous (same-slot) or serial (different-slot) P2P, M2MP, and/or MP2P connectivity between any network users. In some aspects, physical-layer configuration provides for LPD broadcast, resilient monitoring modes for network discover/synchronization, and/or RF situation awareness (RFSA). [0055] Aspects disclosed herein can configure the nodes to employ network protocols that provide for node discovery, network handshaking, and waveform control messages. For example, the network can provision LPD broadcast modes, or “heartbeats,” and network monitoring modes that can both detect those heartbeats and provide RF situational awareness (RFSA) for network users. The network can transmit control messages that adjust or provision aspects of PHY or medium-access-control (MAC) aspects of the network (e.g., to change network and link masks if they are compromised by an adversary, adapt transmission frequencies to avoid and/or exploit ambient interference (snuggling), develop directional transmit solutions using explicit beamsteering methods based on trading of channel state information (CSI), and/or develop implicit methods based on exploitation of reciprocity of the transmission channels. [0056] FIG.2 illustrates method and apparatus implementations of some of the disclosed aspects. A data signal is spread (e.g., via first spreading) 201 with a length-N spreading code to produce a first spread data signal, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters. This can be referred to as an inner code. At least one link mask (e.g., destination mask and/or source mask) is modulated (e.g., via first modulation) 202 onto the spread data signal to produce a first masked signal. The first masked signal is spread (e.g., via second spreading) 203 with a length-L spreading code to produce a second spread data signal. This can be referred to as an outer code. At least one network mask might be (optionally) modulated (e.g., via second modulation) 204 onto the second spread data signal to produce a second masked signal. The network mask can be omitted in applications in which it is not necessary to hide cyclic features caused by spreading. The second masked signal or the second spread data signal is modulated (e.g., via third modulation) 205 onto a plurality of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals the product of N and L, i.e., N•L. [0057] The multitone transmission signal generated in FIG.2 is then transmitted to a receiver. The destination mask can be configured to enable the receiver to detect and separate signals intended for the receiver, and excise signals intended for other receivers. The source masks can improve separation of multiple transmitted signals intended for the receiver. For example, the source masks can enable the receiver to separate transmissions arriving with nearly-identical TOA's. The network mask can be configured to conceal cyclic features in a spreading format used to spread 201 the data signal and/or spread 203 the first masked signal. In one aspect, modulating 205 the second masked signal onto the subcarriers comprises providing time jitter to the multitone transmission signal. The time jitter can be configured to conceal cyclic features of multitone modulation. [0058] In one example, the length-N spreading code comprises a Hadamard code and the length-L spreading code comprises a stacked carrier spread spectrum code. Multitone signal transmission might employ multiple time slots. In some aspects, at least one of the length-L spreading code, the network mask, and time jitter added to the multitone transmission signal are randomly selected in each transmission time slot. [0059] One or more additional source masks might be also added to the first spread data signal. This can help a receiver separate multiple received transmissions. Exemplary source masks include, but are not limited to, a mask unique to the transmitter (e.g., provisioned at network entry); a member of a finite alphabet of masks known to the receiver(s) and unpredictably selected by the transmitter over each slot; or a mask that can be estimated by the receiver(s) as part of the despreading process, e.g., a cyclic phase ramp that induces a cyclic delay on the first spread signal, where the separation between allowable delay values is much greater than delay induced by the network. [0060] FIG.3 illustrates method and apparatus implementations of some of the disclosed aspects. A data signal is spread (e.g., via a first spreader) 201 with a length-N spreading code (e.g., produced by a first spreading code generator 211) to produce a first spread data signal, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters. A link mask (e.g., produced by a link mask generator 212) is modulated (e.g., via first modulation) 202 onto the spread data signal to produce a first masked signal. The first masked signal is spread (e.g., via second spreading) 203 with a length-L spreading code (e.g., produced by a second spreading code generator 213) to produce a second spread data signal. A network mask (e.g., produced by a network mask generator 214) might be modulated (e.g., via second modulation) 204 onto the second spread data signal to produce a second masked signal. The second masked signal or the second spread data signal is modulated, e.g., via a third modulator, such as an inverse fast Fourier transform (IFFT) or other multicarrier modulator 205, onto a plurality of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals N•L. The subcarriers may be selected by a subcarrier mapper 215, such as based on a scheduled uplink or downlink channel. The modulator 205 might be configured to provide time jitter to the multitone transmission signal. Jitter might be computed (or otherwise provided for) and added (e.g., via a jitter controller 221) to a clock signal produced by a clock 220 and used by the modulator 205 for timing. For example, a random or pseudorandom jitter can be generated (or selected) in jitter controller 221 and used to jitter the clock timing offset (e.g., in clock 220) and/or add a phase-ramp to the multitone modulator 205. [0061] The link mask (produced by mask generator 212) can comprise at least one destination mask and/or source mask. For example, a source mask and destination mask might be element-wise multiplied together to produce the link mask. The destination mask can enable a receiver to separate (and excise) signals intended for different receivers. The source mask is added to the first spread data signal in order to improve separation of multiple transmitted signals intended for the receiver. In one example, source masks can enable the receiver to separate transmissions arriving with nearly-identical TOA's. [0062] In one aspect, a source mask comprises a "pseudo-delay", or cyclic phase shift — e.g., a phase ramp across the subcarriers, which induces a cyclic delay in the discrete-time signal. If pseudo-delays have delay differences that are larger than the delay caused by TOA, pseudo-delays can be used to by the receiver to separate received transmissions. In such aspects, the receiver might know or learn the pseudo-delay for each detected transmitter. [0063] In one aspect, the pseudo-delay is unique to each node. The receiver might be configured to deduce a transmitter’s identity based on a measurement of the pseudo-delay + TOA. The receiver can remove the transmitter’s pseudo-delay to determine the TOA. The pseudo-delay might be encoded within the baseband signal, so the receiver can remove it after despreading. This can aid in signal authentication, especially when combined with copy- aided direction-finding algorithms (e.g., in multifeed receivers). [0064] In another aspect, the pseudo-delay might be changed from slot to slot. This can enable the receiver to both identify the transmitter and authenticate the transmitter. The pseudo-delay might be configured to provide a virtual signaling channel that can be used to convey additional information about the transmitter. [0065] FIG.4 illustrates method implementations according to some of the disclosed aspects. The term “configure” conveys one or more steps or processes that cause one or more configurable elements to perform a designated feature. By way of example, hardware, firmware, and/or software can be configured to perform the designated feature. In one instance, an electronic circuit is configured to perform the designated feature by designing the circuit, manufacturing the circuit, and/or connecting circuit components. Such an electronic circuit might be an application-specific integrated circuit (ASIC), for example. In one instance, one or more computer processors are configured to perform the designated feature, which might include one or more steps or processes, such as writing instructions in computer program code, assembling pre-written code modules, linking to a library of software functions and/or objects, storing the code in memory, reproducing computer program code, distributing the code over a network, compiling the code into an executable program, storing the executable program in memory, linking to another executable program, loading the executable program into a processing system, causing the executable program to run, and/or provisioning hardware, network, and/or software resources to run the executable program. The one or more computer processors might include a computer processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), a baseband unit (BBU), a modem, a microprocessor, a microcontroller, a general purpose processor (GPP), and/or a field-programmable gate array (FPGA). [0066] A first step configures 201 a data signal to be spread with a length-N spreading code to produce a first spread data signal, wherein N is a plurality of subcarrier frequencies in each of a plurality L of clusters. A second step configures 202 modulation of the link mask onto the spread data signal to produce a first masked signal. A third step configures 203 spreading of the first masked signal with a length-L spreading code to produce a second spread data signal. A fourth step configures 204 modulation of a network mask onto the second spread data signal to produce a second masked signal. A fifth step configures 205 multitone modulation of the second masked signal onto a plurality of subcarriers to produce a multitone transmission signal, wherein the plurality of subcarriers equals the product of N and L, i.e., N•L. [0067] The destination mask can be configured to enable the receiver to detect and separate signals intended for the receiver, and excise signals intended for other receivers. The source masks can be configured to improve separation of multiple transmitted signals intended for the receiver. The network mask can be configured to conceal cyclic features in a spreading format used to spread the data signal and/or spread the first masked signal. In one aspect, modulating the second masked signal onto the subcarriers comprises providing time jitter to the multitone transmission signal. The time jitter can be configured to conceal cyclic features of multitone modulation. [0068] In one example, the length-N spreading code comprises a Hadamard code and the length-L spreading code comprises a stacked carrier spread spectrum code. Multitone signal transmission might employ multiple time slots. In some aspects, at least one of the length-L spreading code, the network mask, and time jitter added to the multitone transmission signal are randomly selected in each transmission time slot. [0069] With reference to the network topologies depicted in FIG.1, and the apparatus and method aspects disclosed in other figures herein (e.g., at least FIGs.2-4), in a given slot, a node might communicate with any number of other nodes in the network using a unique, pseudorandomly determined destination mask for the intended receiver node(s). This can enable instantiation of both P2P links in which a single transmitter transmits data to a single receiver, and MP2P links in which multiple transmitters transmit data to a single receiver. Due to code-nulling or Type C linear-mean-square-error (LMMSE) methods employed at the receiver(s), which maximize the signal-to-interference-and-noise ratio (max-SINR) of the received transmitted signals without knowledge of the end-to-end channel response, i.e., “blind despreading methods,” the links are extremely resilient to near-far interference between closely spaced transmitters and receivers. The network can support broadcast modes, in which a transmitting node transmits signals, e.g., “heartbeats” on a regular basis, in order to enable receiving nodes to detect and geolocate the transmitting node. In this mode of operation, the transmitting node might not employ a destination mask, in order to allow the receiving nodes to acquire the transmitting node, or may employ a pseudorandom network access or node discovery mask known to some or all of the receivers. The network can also support monitoring modes, in which a receiving node is configured to receive data, e.g., in order to develop RF situational awareness (RFSA) about the transmission channel, or acquire transmitting nodes in the network, e.g., by monitoring the channel for heartbeats. [0070] Furthermore, the network can support P2MP links in which a transmitter transmits data to multiple receivers, such as by partitioning spreading codes onto a different orthogonal frequency set for each intended receiver. Each receiver can deemphasize the frequencies assigned to other receivers, and adaptively remove that link(s) from its solution. In addition, if each link is transmitted at the same power, an adversary cannot learn anything about intended receive links, providing an additional operational security advantage to the network. [0071] Disclosed aspects can provision network slices to provide logical (virtual) networks customized to serve different business purposes, service level requirements, and/or applications. Typically, each network slice comprises an end-to-end composition of network resources required to satisfy a specific performance (and economic need) for a particular service class or customer application. Network slicing can offer a conceptual way of viewing and realizing service provider networks by building logical networks on top of a common and shared infrastructure layer. Network slices can be created, changed, and removed by management and orchestration functions, which includes provisioning radio access network resources. [0072] In an exemplary application, a network service provider might employ network slicing to differentiate characteristics and resources for different classes of services. In one instance, destination masks, source masks, and/or network masks can be allocated to different network slices. This can configure a network to provision shared spectrum to support different service level requirements, such as enabling receivers to employ code-nulling methods to distinguish communications in their assigned slice from communications in other slices. By way of example, a network mask, source mask, and/or destination mask might be used to provision a network slice characterized by performance criteria, such as latency, bandwidth, grant-free access, and/or transmit power. [0073] To configure network slicing in 3GPP networks (such as 5GNR), disclosed aspects can be adapted to fit the required radio signaling format of the 3GPP network(s). In one example, radio access network resources (e.g., time, frequency, and/or space) might be partitioned into separate network slices, wherein a first mask (e.g., a link mask and/or a network mask) establishes a first network slice, and a second mask (e.g., a link mask and/or a network mask) establishes a second network slice. The masks can be configured to enable receivers to employ code-nulling methods to distinguish communications in their assigned slice from communications in other slices. [0074] In some aspects, serial access of each link can be provided to further reduce the power delivered to each intended receiver, reducing the intercept footprint of the transmitter, and enabling energy-efficient data transmission. Both intercept vulnerability and energy efficiency are further improved in some aspects, by allowing the transmission of data signals without prior call setup or “request-to-send” and “clear-to-send” handshakes with the receiver. In 5GNR, such operations are referred to as “grantless” or “grant-free” access. In some aspects, the data signals are sent using connectionless User Datagram Protocols (UDP) that does not require an acknowledgement (ACK) from the receiver, further improving energy efficiency of the data transmission, and improving operational security of the network. [0075] In some aspects, spreading over frequency and space/polarization dimensions allows the number of data bits being transmitted to be much less than the time-bandwidth product of the transmission packet. This and transmission of low-rate UDP packets from an IIoT device to a data aggregation point on an ad-hoc (grantless) basis makes these aspects especially well suited for energy-constrained applications, e.g., transmission to, from, and between industrial Internet of Thing (IIoT) devices with low power availability. [0076] FIG.5 illustrates method and apparatus aspects for an exemplary implementation of baseband processing. Methods described herein include methods for configuring or provisioning (e.g., in software, firmware, and/or hardware) disclosed functional elements, such as those depicted as blocks in the figures. [0077] In one aspect, first spreading 201 is implemented via Hadamard spreading 501, with inputs comprising data symbol vector b T(l) (n slot ), time jitter τ T(l) (n slot ) (optional), and pilot(s) multiplexed 510 together. T(l) denotes an l th transmitter, n slot is a slot index, and data symbol vector b T(l) (n slot ). The time jitter τ T(l) (n slot ) might be produced by jitter generator 515. In- cluster spreading 501 of N symbols (e.g., comprising the data symbols, time jitter, and at least one pilot) onto 160 baseband subcarriers uses a 160 ×N orthogonal Hadamard matrix provides an additional factor-of-160/N spreading gain at the receiver. The pilot symbols enable low- complexity inverse fast Fourier transform (IFFT) least-squares (IFFT-LS) methods that blindly detect each link intended for the receiver, estimate the pseudo-TOA’s (link TOA, plus time jitter) of those links, and develop despreading weights that allow the payload data and time jitter to be extracted from the received data. Reception of the time jitter allows the true link TOA to be estimated and used in subsequent positioning and network timing synchronization algorithms. The spread output signal of the Hadamard spreading 501 can be expressed by: where C base is the Hadamard matrix, and “1” maps the first column of C base to a pilot signal. [0078] Link mask generation 512 (which can comprise destination mask generation and/or source mask generation) produces at least one 160 ×1 link mask vector, c R(l) (n slot ) = exp{jθ R(l) (n slot )}, where R(l) denotes an l th receiver. Modulator 502 modulates the 160 ×1 link mask onto the 160 ×1 spread output signal. The destination mask is configured to enable receivers to detect and separate network signals intended for that receiver, and excise network signals intended for other receivers. The source mask is configured to enable a receiver to separate multiple transmitted signals (from different transmitter sources) intended for the receiver. [0079] In one instance, second spreading 203 can be implemented via SCSS spreading 503. The stacked-carrier spreading is accomplished by modulating payload data onto 160- subcarrier baseband clusters, which are then spread over 20 frequency clusters and M transceiver feeds to produce an SCSS-spread signal. [0080] The SCSS modulation format allows received subcarriers to be blindly despread , i.e., without knowledge of the spreading codes incorporated at the transmitter, using low- complexity least-squares code nulling methods that are inherently resilient to near-far interference between network nodes, and provide automatic excision of narrowband and wideband non-network interference, e.g., jamming. Additionally, because the signal is spread across transmit feeds as well as frequency, the PHY provides a factor-of-M reduction in interferometric detection strength for an M-feed transceiver. Moreover, this spreading format allows blind 19ispreading of the received signal on a slot-by-slot basis. [0081] In one example, the lower-PHY multitone modulation format transports data over 3,200 subcarriers in ½ ms time intervals, or slots, synchronized to a common time standard using cross-network calibration methods, with 6 kHz separation between subcarriers (19.2 MHz transmit bandwidth, e.g., occupying a single 20 MHz ISM or U-NII band channel). The multitone modulation format can enable communication over 20 kilometer ranges, and is resilient to Doppler shift commensurate with ±100 mph speed differences between users (50 mph closing or separating speeds). [0082] A specific instance 514 of network mask generation (e.g., 214) produces a 3200 ×1 network mask vector, c net (n slot ) = exp{jθ net (n slot )}, which is configured to conceal cyclic features of the spreading format. Modulator 504 modulates the network mask c net (n slot ) onto the SCSS-spread signal (i.e., the outer code), producing network-masked signal: where d T(l) (n slot ) is the Lx1 node l first spread signal (Hadamard matrix output), c T(l) (n slot ) is the Lx1 node l source mask, and c R(l') (n slot ) is the Lx1 node l’ (l’ is the receive node index) destination mask, GT(l)(n slot ) is the MxK second spreading code, and c net (n slot ) is the KLx1 network mask, and where " and diag{ are the element-wise multiply (Hadamard or Shur product), Kronecker product, and vector-to-diagonal operation, respectively. [0083] Spreading over the inner code dimension can be expressed by: [0084] A dimensional multitone modulator 505, part of a dimensional multitone modem, transforms the SCSS-spread signal to subcarriers, such as via an IFFT, to produce a discrete- time output signal s T(l) (t) for each antenna feed. A clock 506 and network timing synchronization circuitry 507 are also provisioned, as depicted in the figure. In both cases the product comprises the link mask between transmit node l and receive node l’. [0085] Spreading over the outer or inner code dimensions can provide different benefits. For example, spreading over the outer code dimension better exploits frequency-selective multipath, as it more strongly effects the channel variation between spread signal clusters, than the channel variation within each spread cluster. The max-SINR receiver despreader can exploit that diversity to better separate and extract intended network signals from in-network and (for multifeed receivers) jamming and out-of-network interference. Conversely, inner code spreading allows TOA to be estimate to higher precision at the receiver. [0086] In an exemplary aspect, code generation 513 and jitter generation 515 are provisioned with randomized inputs from a random seed generator 520, which might be communicatively coupled to a sourcing sensor 500 and configured to generate random seeds from sensor data produced by the sourcing sensor 500, such as in response to measurements of random environment phenomena. The code generator 513 provides randomized or unpredictable codes G T(l) (n slot ) for SCSS spreading 503, and the jitter generation 515 provides time jitter τT(l)(n slot ) to the modulator 505. [0087] Incorporation of unpredictable (e.g., randomly selected) spreading codes and time jitter conceals cyclic features of the multitone modulation and prevents spoofing by sophisticated adversaries. The spreading code, time jitter, and (in multihop-capable instantiations) intended receiver(s) for each transmitter can be randomly selected for each slot, thereby preventing an adversary from learning or spoofing those transmission characteristics. Furthermore, disclosed systems and methods can be implemented using UDP formats that require no feedback from the receiver, thereby preventing links from being disrupted using cognitive jamming methods. [0088] FIG.6 illustrates a multifeed transceiver that can be implemented with aspects of the disclosure. Multiple antennas 601-607 are coupled to a beamforming network 610, which might include an array of transmit/receive switches for duplex operations. A feed network 620 provides communicative coupling between the beamforming network 610 and a dimensional multitone modem comprising a dimensional multitone demodulator 631 and a dimensional multitone modulator 632. [0089] Some disclosed aspects configure a waveform that is highly resilient to second-order and higher-order cyclic detection methods. In addition to employing spreading formats (masked to prevent cyclic feature detection), an exemplary system might use multifeed receive arrays additional signal-to-noise ratio gain at the receiver, providing a reduction in interceptor-to-communicator pathloss ratio and circular equivalent vulnerability radius (CEVR) for an interceptor operating within the first Fresnel zone of the transmitter relative to the intercept footprint for a narrowband non-spread transmit signal. Multifeed transmit arrays can provide an additional reduction in transmit power via adaptive beamsteering algorithms implemented over multiple signal slots, i.e., with feedback from the receiver, providing for further reduction in CEVR. Over single slots, i.e., without feedback from the receiver, the system also provides a reduction in feature strength provided by interferometric detectors, e.g., linked detectors employing cross-correlation or cross-ambiguity function (CAF) methods to detect users on basis of time-difference-of-arrival (TDOA) or frequency- difference-of-arrival, using random spreading across transmit feeds. [0090] FIG.7 illustrates a multifeed front end that can be implemented with aspects of the disclosure. In one example, received signals collected from an antenna system are amplified with low-noise amplifiers 701-703, downconverted 721-723, combined 725, and coupled into a dimensional multitone modem 740. In one instance, a beamforming network comprises a local oscillator 710 and phase shifters (Δ). Baseband signals output from the dimensional multitone modem 740 are upconverted 731-733 and amplified (by power amplifiers) 711-713 to produce transmission signals [0091] FIG.8A illustrates an exemplary time-slot configuration that can be implemented in some aspects. Three slots with transmitted symbols 801-803 are depicted. Each slot has a duration (T slot ) of 0.5 ms. Within each slot is a duration T jitter during which time jitter is applied, and a guard interval T guard . FIG.8B illustrates a symbol 801 portion (2T sym ) with duration 1/3 ms, T jitter = 1/12 ms, and Tguard = 1/12 ms. [0092] FIGs.9A-9B illustrate an exemplary SCSS technique that can be employed in some aspects of the disclosure. FIG.9A illustrates a baseband cluster represented by data symbols d T(l) (0) to d T(l) (K 0 -1) modulated onto subcarrier frequencies wherein the subcarrier spacing is = 1/T sym . FIG.9B depicts a spreading code c T(l) (0) to c T(l) (K 1 -1) with sampling frequency and spanning frequencies The spreading code is configured to spread each baseband cluster. FIG.9C depicts the resulting SCSS signal, comprising clusters 0 to K 1 -1 and a total number K sub = K 0 •K 1 of subcarriers. [0093] FIG.10 illustrates method and apparatus implementations of some of the disclosed aspects. At least some elements in the receiver implementations disclosed herein can be regarded as performing the reverse or complementary functions associated with transmitter method and apparatus implementations. A received multitone transmission signal is demodulated 301 into a plurality of subcarriers to produce a demodulated signal. Demodulation 301 might include equalization. Demodulation 301 might provide for channelizing the received signal(s). The demodulated signal is de-masked 302 by removing a network mask and a link mask (e.g., destination mask and/or source mask) from the demodulated signal to produce a demasked signal. The demasked signal is despread 303 to produce a despread signal. Despreading 303 can be configured to despread a signal comprising an inner spreading code and an outer spreading code. [0094] In some aspects, symbols in the despread signal may be (optionally) demodulated 304 to produce demodulated symbols. Jitter in the demodulated symbols might be (optionally) extracted 305 to produce corrected demodulated symbols. If jitter was not added to the multitone transmission signal before transmission, jitter extraction 305 may not be necessary. [0095] As shown in FIG.11, method and apparatus implementations may further comprise estimating 306 a time-of-arrival (TOA) of the received multitone transmission signal from the corrected demodulated symbols. Method and apparatus implementations may further comprise computing 307 at least one of positioning and timing synchronization from the TOA. [0096] At a receiver, a code nulling or Type C linear minimum-mean-square-error (LMMSE) algorithm that is not affected by the jitter might be used to detect and despread each baseband signal slot. Such algorithms might be used to compute the jittered TOA of each slot, i.e., the observed TOA of the signal, modulated by the jitter added to each slot. The jitter value can then be extracted from the baseband signal (such as shown in element 305 in FIGs.10 and 11). In some aspects, such as when the TOA is used to compute a positioning/timing solution for the transmitter or receive (e.g., element 307 in FIG.13), the jitter value might be used to remove jitter from the TOA estimate (e.g., in elements 305-306 in FIG.13). [0097] In some aspects, the disclosed system employs network synchronization strategies that both allow the network to be synchronized to a common time standard and allows relative positioning of network nodes to be determined by any other node in the network though sharing of TOA measurements between network users. If the spreading codes are shared between user nodes, the approach can also allow the development of both direction-of- arrival (DOA) and direction-of-transmission (DOT) between the user nodes, which can further determine orientation of the user-node antennas, and the line-of-bearing (LOB) between user nodes. [0098] In one aspect, demodulating 301 is performed using a multifeed dimensional multitone modem communicatively coupled to at least one of a spatial-diverse antenna array or a polarization-diverse antenna array. In some aspects, demodulating 301 comprises computing despreading weights that enable data and time jitter to be extracted from the received multitone transmission signal. Demasking 302 can comprise performing QR Decomposition (QRD), e.g., using a Modified Gram-Schmidt Orthogonalization (MGSO) procedure, after removing a network mask from the demodulated signal. In some aspects, demasking 302 comprises performing algebraic code nulling to excise at least one of signals intended for at least one other receiver, interference, jamming signals, and spoofers. Despreading 303 can employ linear combining weights. In some aspects, despreading 303 removes Hadamard spreading within each cluster of subcarriers. [0099] FIG.12 illustrates method and apparatus implementations of some of the disclosed aspects. In addition to blocks (e.g., steps, components, functional elements) 301-305, a subcarrier mapper 311 (or configuring subcarrier mapping for multitone demodulation 301) can provide uplink and/or downlink signal parameters to the multitone demodulator 301. For example, such signal parameters might include physical resource blocks, bandwidth part, subcarriers, numerology, and/or other signal features scheduled for use by the receiver. The communication of such signal parameters to the demodulator 301 configures the demodulator 301 to demodulate the received baseband signal. [0100] A mask generator and/or selector 312 (or configuring the mask demodulator 302) inputs masks or mask parameters to the mask demodulator 302, thereby configuring the mask demodulator 302 to demodulate frequency-domain symbols output from the multitone demodulation 301. The masks or mask parameters can correspond to network masks and/or link masks. [0101] A code generator and/or selector 313 (or configuring the despreader 303) communicates spreading (e.g., despreading) codes or code parameters to the despreader 303, thereby configuring the despreader 303 to despread the demasked signals output from the mask demodulator 302. In some aspects, the code generator/selector 313 employs an adaptation algorithm (e.g., adaptive code nulling) to despread the outer spreading code(s) (e.g., SCSS or some other outer spreading code). The code generator/selector 313 can develop (e.g., compute) linear combining weights (or configure the despreader 303 to develop the weights) to remove the outer spreading code. The code generator/selector 313 can also configure the despreader 303 to remove the inner spreading code(s) (e.g., Hadamard spreading). The code generator/selector 313 might employ known (e.g., predetermined) Hadamard spreading codes. [0102] FIG.13 illustrates method implementations of some of the disclosed aspects. At least some elements in the receiver implementations disclosed herein can be regarded as performing the reverse or complementary functions associated with transmitter method and apparatus implementations. Multitone demodulation is configured 301 to demodulate a received multitone transmission signal into a plurality of subcarriers to produce a demodulated signal. De-masking (e.g., mask demodulation) is configured 302 to de-mask the demodulated signal. De-spreading is configured 303 to despread the demasked signal to produce a despread signal. Symbol demodulation can be configured 304 to demodulate the despread signal to produce demodulated symbols. Jitter extraction can be configured 305 to extract jitter from the demodulated symbols to produce corrected demodulated symbols. [0103] Disclosed aspects may optionally comprise configuring 306 an estimated TOA of the received multitone transmission signal from the corrected demodulated symbols. Disclosed aspects may optionally comprise configuring 307 at least one of positioning and timing synchronization from the TOA. [0104] FIG.14 is a block diagram of an exemplary four-feed demodulator, in accordance with some aspects of the disclosure. A 4x1 received baseband signal corresponding to four receiver feeds is demodulated in a dimensional multitone demodulator 301 to produce a 3200x4 matrix x R(l) (n slot ) corresponding to 3200 subcarriers and indexed by each time slot n slot . The subcarrier values are reshaped and demasked 302 using transceiver and network masks produced by mask generator 312, to produce a 160x80 demasked signal matrix x R(l) (n slot ). The demasked signal is despread 303 using an adaptation algorithm 313, which can be configured to blindly excise interference (including jamming and/or network signals intended for other users). Various techniques, including linear-algebraic code nulling, can be employed to compute linear-combining weights W R(l) (n slot ). The despreader 303 output comprises a frame of symbols, where symbols for each slot in the frame can be expressed by [0105] Symbol despin and demodulation 304 is performed to produce data symbols and jitter estimates: Jitter extraction 305 produces which is processed in TOA estimation 306 along with to produce A position/timing (P/T) computation operates to enable network time synchronization 321 and clocking 322 of the demodulator 301. [0106] FIG.15 is a block diagram of a channelization operation. Samples of a received signal are downconverted 721 with respect to a sampling frequency Tsmp, the downconverted signal is synced to the slot start time, an FFT 301 is performed. The number of symbols N sym is the product of the symbol duration T sym multiplied by the sampling frequency f smp . The FFT size (e.g., N smp ) is the number of symbols N sym multiplied by a sparsity factor Q sym . The resulting subcarrier values are equalized 1503 (e.g., via equalizer weights produced in 1502) to produce equalized subcarrier values x sub (k sub , n sym ) for each symbol. The value α R is a frequency shift that is configured to remove a bulk frequency shift due to receiver LO offset. The receiver LO offset estimation is performed in block 1702 (in FIG.17), and the frequency-shift and slot channelization operation is performed in block 1703 (FIG.17). [0107] FIG.16 is a block diagram of an exemplary code-nulling algorithm. Subcarrier vector x sub (k sub , n slot ) is demasked 1602 using at least one generated 1612 network mask which reveals network-wide spectral redundancy. The demasked signal is serial-to-parallel converted 1604 into MK 0 -length vectors, which are whitened 1606 (e.g., single QRD performed once per slot and amortized over all users). An inverse discrete Fourier transform (IDFT) window 1603 can provide inputs to the whitening 1604. At least one windowed destination mask is generated 1607, which reveals transmitters communicating in the network. IFFT 1608, detection 1610, and demodulation 1612 operate to detect, separate, and extract link(s) corresponding to the destination mask, and excise links that do not have the destination mask(s). The demodulated link(s) can be expressed by [0108] FIG.17 illustrates a process that can be implemented according to disclosed aspects. A frame of a transmission is received 1701, and a coarse estimate of the receiver local oscillator can be performed 1702. A network mask is generated 1713 in a process 1703 that frequency-shifts, channelizes slots, and removes the network mask in the received signal. Subcarriers of the demasked signal are stacked over the signal’s degrees-of-freedom dimension and whitened 1704. A generated 1715 link mask can be used to remove the link mask from the whitened signal and detect users via adaptive code-nulling 1705. An estimation step 1706 provides for estimating the jittered TOA, FOA, and SINR. Estimates in step 1705 can be used to improve the estimate of the receiver local oscillator. [0109] As depicted in FIG.18A, in a scrambler 1801, each (q) th codeword of bits b (q) is scrambled to produce scrambled bits In modulation mapping 1802, input scrambled bits are modulated to produce complex-valued modulation symbol (q) s d () as outputs. A layer mapper 1803 maps input complex-valued modulation symbols d (q) (0),…, onto layers x(i) = [x (0) (i) … x (L-1) (i)] T , where i = 0,1,…, L is the number of layers, and is the number of modulation symbols per layer. Let be the total number of data symbols x (λ) in a block corresponding to layer λ (where layer λ = 0, 1,…, L-1) before transform precoding 1804. In some instances, jitter τ T(l) and/or one or more pilot symbols are multiplexed with the modulation symbols, such as before or after layer mapping, to produce the data symbols [0110] If phase-tracking reference symbols are employed, the complex-valued symbols are mapped to complex-valued symbols where Otherwise, [0111] Transform precoding 1804 converts a block of data symbols into a block f complex-valued symbols ( y o ) (∙)), where is the number of scheduled uplink subcarriers for a UE. Thus, is the total number of data symbols in each OFDM symbol. In some instances, transform precoding might be performed in the downlink. [0112] A block of complex-valued symbols can be divided into sets, each set corresponding to one OFDM symbol. The complex-valued symbols include OFDM symbol values, and might include other symbols, such as control and/or reference symbols, including phase-tracking reference symbols. [0113] Transform precoding 1804 can be represented by the following matrix product: where is a transform-precoded symbol vector, P T is a transform-precoding matrix, and vector of the complex-valued symbols. Transform precoding 1804 can be implemented via any of various mathematical and/or computer algorithms. [0114] In one example, the transform precoding 1804 operator P T can be configured to provision a combination of spreading and masking, such as expressed by: where cnet and cR(l) are the network mask and link mask, respectively; cbase is a base spreading code (e.g., one of a set of orthogonal codes); and G T(l) represents spreading by a code that possibly belongs to a set of non-orthogonal codes. [0115] In one example, transform precoding 1804 can be applied according to resulting in a block of complex-valued symbols [0116] The variable where represents the bandwidth of the PUSCH in terms of resource blocks, and where α 2 , α 3 , α 5 is a set of non-negative integers. [0117] In some aspects, the block of vectors [y (0) (i),…, y (L- 1) (i)] T might be precoded 1805 with a spatial precoding matrix W to produce a block of complex-valued symbols mapped onto resource elements at antenna ports p {p 0 ,…,p ρ-1 }. For transmission on a single antenna port, the precoding 1805 can be defined by z (0) (i) = y (0) (i), where i = 0,1,…, Precoding 1805 for spatial multiplexing is defined by: where the precoding matrix W is and For non- codebook-based transmission, the precoding matrix W might equal the identity matrix. [0118] The block of complex-valued symbols is multiplied with an amplitude-scaling factor and mapped 1806 in sequence to resource elements (k’,l)p,q in the virtual resource blocks assigned for transmission (e.g., allocated for PUSCH or another channel(s)). Virtual resource blocks can be mapped 1806 to physical resource blocks according to non-interleaved mapping, for example. [0119] In one instance, a time-continuous signal generated 1807 on antenna port p and subcarrier spacing (SCS) configuration μ for an l th OFDM symbol is expressed by: where is the time within the subframe, μ = 0,1,2,3,4 (μ denotes SCS, i.e., numerology), and comprises values of the complex-valued symbols, [0120] FIG.18B illustrates functional aspects of a receiver which can comprise reversing at least some of the functional aspects of the transmitter shown in FIG.18A. A multitone demodulator 1817 operates on received multitone signals from one or more antenna ports to channelize the signals. Channelization can comprise functions of the resource demapper 1816, which outputs data symbols corresponding to one or more data streams (e.g., channels). The data can be equalized 1815 and/or spatial demultiplexed. [0121] A transform decoder 1814 can provide for at least demasking (e.g., 302) and despreading (e.g., 303). In one example, the transform decoder 1814 can employ an adapt algorithm to separate and despread NOMA signals, and excise interference. Demodulator 1813 can provide for symbol despin and demodulation (e.g., 304), possibly jitter extraction (e.g., 305), and may be configured to perform descrambling and/or error detection/correction. TOA estimation 1812 (e.g., 306) may be provided. In some aspects, a P/T solution may be computed (e.g., 307). [0122] In accordance with some disclosed P2P aspects, a transmitter desiring to send a data packet to a target receiver can spread the data packet over a set of subcarriers known to the receiver, using a receive symbol mask that is known to the receiver, and using an unpredictable transmit spreading code. The receiver can use a max-SINR code-nulling method to detect the transmitter, and to extract the data packet from the background noise and interference. In some aspects, unpredictable transmit codes can be applied over space/polarization only. This can allow the approach to be employed without SCSS. [0123] In accordance with some disclosed MP2P aspects, each transmitter desiring to send a data packet to a receiver can spread its data packet over a common set of subcarriers known to the receiver, using a receive symbol mask that is known to the receiver, and using an unpredictable transmit spreading code. The receiver can use a max-SINR code-nulling method to detect all of the transmitters, and to extract the data packets (sent by the transmitters) from the background noise and interference. In some aspects, unpredictable transmit codes can be applied over space/polarization only. This can allow the approach to be employed without SCSS. [0124] In accordance with some disclosed P2MP aspects, a transmitter desiring to send distinct data packets to multiple target receivers can spread each data packet over non- overlapping subcarrier sets known to the target receivers, using separate receive symbol masks that are known to each of the target receivers, and using an unpredictable transmit spreading code on each subset of nonoverlapping subcarrier sets. Thus, the signals intended for each of the target receivers are orthogonal to each other at each target receiver. Each target receiver can use a max-SINR code-nulling method to detect the transmitter, and to extract the data packet meant for that receiver from background noise and interference. Because the signal(s) intended for the other receivers are orthogonal to each receiver, they are nulled during the despreading process. [0125] In one aspect, a transmitter desiring to send a common data packet to multiple receivers can spread that data packet over all of the subcarriers, and using a common symbol mask that is also known to all of the receivers. This can be used, for example, to advertise a new transmitter's presence in the network, such as for network entry purposes. It is possible that unpredictable transmit codes might be applied over space/polarization only. [0126] In one aspect of a P2MP approach, the power level on each subcarrier is kept constant, regardless of range to the receivers. This can prevent an adversary from identifying P2MP operation, identifying frequency subsets used for P2MP operation, or identifying transmitters based on disparate power levels over subsets of subcarriers. [0127] In some aspects, the subcarrier subsets might be unpredictably chosen. The receive code-nulling algorithm is nevertheless able to detect the signal(s) intended for the receiver. Disclosed aspects herein can adapt P2MP to multi-point-to-multi-point network topologies. [0128] FIG.19A-19D show functional aspects of the disclosure configured to be employed in a 5GNR system. In one example, no jitter is employed, and the SC-FDMA waveform is used, as described in Section 5.6, SC-FDMA Baseband Signal Generation, 3GPP TS 136.211 V9.1.0 (2010-04, Release 9), the entire reference of which is incorporated by reference. In one instance, an uplink grant might comprise 4 Physical Resource Blocks (PRB's) scheduled over 6 consecutive SC-FDMA symbols (for a total of 24 PRBs), which provides for 48 subcarrier symbols in each of the 6 SC-FDMA symbols for a total of 288 symbols. [0129] A first spreader 1901 is configured to perform a first spreading function with a spreading code length equal to the total of 288 symbols. This can be referred to as an inner code. In this example, the first spreader 1902 employs a 288x1 spreading code vector that spreads a baseband data signal comprising 288 symbols or any integer subset of 288 symbols. The number of symbols spread by the first spreading function 1901 can be selected to provide for a predetermined latency performance. For example, in a low-latency application, 288 data symbols are input to the first spreader 1901 for spreading by the 288x1 vector. In an IoT application, a small number (<<288) of symbols might be spread 1901 by the 288x1 vector. The output of the first spreader 1901 is a 288x1 spread data vector. [0130] A mask function 1902 is configured to perform element-wise multiplication of the spread data vector with a link mask and a transmit mask. In this example, the mask function 1902 employs a 288x1 link mask and a 288x1 network mask, generating a 288x1 masked data signal. [0131] A second spreader 1903 is configured to spread the masked data signal over scheduled uplink PRBs using a second spreading code, which is unpredictably and uniquely determined by the transmitter(s). This can be referred to as an outer code. For P2P and MP2P network connections, where a transmitter is sending a signal to a single receiver in each subslot, the masked signal (e.g., the 288x1 masked data signal) can be spread 1903 (using a length-24 spreading code) over the total number of PRBs (e.g., 24 PRBs), resulting in a 24∙288x1 second spread data vector. [0132] For P2MP network connections, as shown in FIG.19B, in which a transmitter sends a signal to N different receivers, the first spreader 1901 can generate N 288x1 spread data vectors, i.e., one data vector for each desired receiver. The mask 1902 can multiply each of the N spread data vectors by a different 288x1 link mask and by the 288x1 common network mask, and map the masked data to a unique, nonoverlapping subset of PRB's for each signal, e.g., 24/N PRB's. The second spreader 1903 can spread each masked data signal by a second length-24/N code, unpredictably and uniquely determined at the transmitter. [0133] The second spread data is mapped to PRBs and modulated by SC-FDMA modulator 1904 to produce at least one discrete-time signal. A transmitter 1905 can comprise one or more transmitter feeds. As shown in FIG.19C, for MP2P and P2P network connections having M transmitter feeds 1905, the second spreading 1903 is performed over 24 PRB's using a length-24M spreading code that is unpredictably and uniquely determined at each transmitter. As shown in FIG.19D, for P2MP network connections having M transmitter feeds 1905, the second spreading 1903 is performed over 24/N PRB's using a length- 24M/N spreading code, unpredictably and uniquely determined at each transmitter. [0134] In one example, a scheduled uplink channel might be 966x12 SC-FDMA PRB's (i.e., there are 96 groups of 12 PRBs scheduled in each of six SC-FDMA symbols, so the SC- FDMA signal spans 6 time symbols and comprises 1,152 subcarriers. A K 0 x1 inner code (first spreading 1901) and a K 1 x1 outer code (second spreading) are provided wherein K 0 •K 1 = 1,152. In one instance, K 0 = 24 and K 1 = 48. Spreading 1901 and 1903 can comprise provisioning each transceiver with a library comprising a number N 0 of K 0 x1 codes and a number N1 of K 1 x1 codes, wherein each code is configured to provide a signal with low output PAPR and low maximum cross-correlation. In some aspects, each transmitter can be provisioned with a unique cyclic phase shift. [0135] In one aspect, each receiver might be assigned a specific outer code, or specific subset of outer codes. Over each ½-ms slot, the transmitter transmits a 6-symbol baseband signal (e.g., 8 information bits, with QPSK modulation and rate 2/3 coding) using an unpredictably- selected inner code, and an outer code that is in the subset of codes assigned to a target receiver, multiplied by a cyclic phase shift that is assigned to the transmitter, or is unpredictably determined by the transmitter. In other aspects, different techniques can be used to uniquely identify a particular transmitter. [0136] In yet another aspect, each receiver might be assigned a specific inner code, or a specific subset of inner codes, and each transmitter uses an unpredictably-selected outer code. In instances in which the transmitter employs a multifeed transceiver, transmitters may employ an unpredictably-determined transmit code multiplied by an unpredictably- determined constant-modulus gain on each antenna. [0137] Disclosed aspects can be configured for any of the various 5GNR numerologies. One example might employ 60 kHz subcarrier spacing, providing a 50/3 µs base SC-FDMA symbol s(t). If this base symbol s(t) is repeated 5 times (with an alternating sign for each symbol), this produces an extended symbol with a 250/3 µs duration, expressed as: [+s(t) -s(t) +s(t) -s(t) +s(t)], This can be regarded as a 50 µs base symbol (center three iterations) with a ±50/3 µs cyclic buffer. This structure can provide flexibility for cyclic jitter within the extended symbol, and for loose synchronization with UTC. [0138] If the signal is transmitted over 288 subcarriers and a 1/2 ms (6 extended symbol) slot, e.g., 246x12 "extended PRB's," where a PRB now covers 720 kHz, spreading 1901 generates a 72-symbol first spread data signal, which will map to a 6x12 extended PRB, and a receive and network mask are added 1902 to the first spread data signal. Second spreading 1903 provides spreading over the 24 extended PRB's using a length-24M transmit code, unpredictably determined at the transmitter, or (for MP2P transmission) N 24M/N codes over N subsets of PRB's. Alternatively, the number (288) of subcarriers is used to provide a set of K 0 x1 inner codes and a set of K 1 x1 outer codes (e.g., K 0 = 16 and K 1 = 18). These spreading codes may then be applied using a 6-symbol baseband signal, as previously described. [0139] The methods disclosed herein comprise one or more steps or actions for achieving the described method. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is specified, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims. [0140] As used herein, a phrase referring to "at least one of" a list of items refers to any combination of those items, including single members. As an example, "at least one of: a, b, or c" is intended to cover a, b, c, a-b, a-c, b-c, and a-b-c, as well as any combination with multiples of the same element (e.g., a-a, a-a-a, a-a-b, a-a-c, a-b-b, a-c-c, b-b, b-b-b, b-b-c, c-c, and c-c-c or any other ordering of a, b, and c). [0141] The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language of the claims, wherein reference to an element in the singular is not intended to mean "one and only one" unless specifically so stated, but rather "one or more." Unless specifically stated otherwise, the term "some" refers to one or more. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. .§112, ¶6, unless the element is expressly recited using the phrase "means for" or, in the case of a method claim, the element is recited using the phrase "step for." [0142] The various operations of methods described above may be performed by any suitable means capable of performing the corresponding functions. The means may include various hardware and/or software component(s) and/or module(s), including, but not limited to a circuit, an application specific integrated circuit (ASIC), or processor. Generally, where there are operations illustrated in figures, those operations may have corresponding counterpart means-plus-function components with similar numbering. [0143] The various illustrative logical blocks, modules and circuits described in connection with the present disclosure may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. [0144] If implemented in hardware, an example hardware configuration may comprise a processing system in a wireless node. The processing system may be implemented with a bus architecture. The bus may include any number of interconnecting buses and bridges depending on the specific application of the processing system and the overall design constraints. The bus may link together various circuits including a processor, machine- readable media, and a bus interface. The bus interface may be used to connect a network adapter, among other things, to the processing system via the bus. The network adapter may be used to implement the signal processing functions of the PHY layer. The bus may also link various other circuits such as timing sources, peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further. The processor may be implemented with one or more general-purpose and/or special-purpose processors. Examples include microprocessors, microcontrollers, DSP processors, and other circuitry that can execute software. Those skilled in the art will recognize how best to implement the described functionality for the processing system depending on the particular application and the overall design constraints imposed on the overall system. [0145] If implemented in software, the functions may be stored or transmitted over as one or more instructions or code on a computer readable medium. Software shall be construed broadly to mean instructions, data, or any combination thereof, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Computer-readable media include both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. The processor may be responsible for managing the bus and general processing, including the execution of software modules stored on the machine-readable storage media. A computer-readable storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. By way of example, the machine- readable media may include a transmission line, a carrier wave modulated by data, and/or a computer readable storage medium with instructions stored thereon separate from the wireless node, all of which may be accessed by the processor through the bus interface. Alternatively, or in addition, the machine-readable media, or any portion thereof, may be integrated into the processor, such as the case may be with cache and/or general register files. Examples of machine-readable storage media may include, by way of example, RAM (Random Access Memory), flash memory, ROM (Read Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), registers, magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof. The machine-readable media may be embodied in a computer-program product. [0146] A software module may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs, and across multiple storage media. The computer-readable media may comprise a number of software modules. The software modules include instructions that, when executed by an apparatus such as a processor, cause the processing system to perform various functions. The software modules may include a transmission module and a receiving module. Each software module may reside in a single storage device or be distributed across multiple storage devices. By way of example, a software module may be loaded into RAM from a hard drive when a triggering event occurs. During execution of the software module, the processor may load some of the instructions into cache to increase access speed. One or more cache lines may then be loaded into a general register file for execution by the processor. When referring to the functionality of a software module below, it will be understood that such functionality is implemented by the processor when executing instructions from that software module. [0147] Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared (IR), radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, include compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk, and Blu-ray.RTM. disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Thus, in some aspects computer-readable media may comprise non-transitory computer-readable media (e.g., tangible media). In addition, for other aspects computer-readable media may comprise transitory computer-readable media (e.g., a signal). Combinations of the above should also be included within the scope of computer-readable media. [0148] Thus, certain aspects may comprise a computer program product for performing the operations presented herein. For example, such a computer program product may comprise a computer-readable medium having instructions stored (and/or encoded) thereon, the instructions being executable by one or more processors to perform the operations described herein. [0149] Further, it should be appreciated that modules and/or other appropriate means for performing the methods and techniques described herein can be downloaded and/or otherwise obtained by a user terminal and/or base station as applicable. For example, such a device can be coupled to a server to facilitate the transfer of means for performing the methods described herein. Alternatively, various methods described herein can be provided via storage means (e.g., RAM, ROM, a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a user terminal and/or base station can obtain the various methods upon coupling or providing the storage means to the device. Moreover, any other suitable technique for providing the methods and techniques described herein to a device can be utilized. [0150] It is to be understood that the claims are not limited to the precise configuration and components illustrated above. Various modifications, changes and variations may be made in the arrangement, operation and details of the methods and apparatus described above without departing from the scope of the claims.