RHealthCare SP100 Specifications

Browse online or download Specifications for Bar code readers RHealthCare SP100. RHealthCare SP100 Specifications User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 427
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 2

viii Contents7.2 Signal and channel models with channel estimation errors 1707.2.1 Signal and channel model 1707.2.2 Estimation errors of channel para

Page 3

84 Channel estimation for high-rate systems0 5 10 15 2044.555.56SNR (dB)Rmse (dB)CM1CM2−4 −2 0 2 4 6 844.555.56SNR (dB)Rmse (dB)CM3CM4Figure 3.6 Analy

Page 4

3.3 Impact of channel estimation error on performance 85Table 3.2 Required computational complexity for CFR estimation per subband in a frame (after [

Page 5 - Short-range Wireless Systems

86 Channel estimation for high-rate systemsmultistage estimators on the system performance by comparing their resulting averageSERs and FERs.The perfo

Page 6 - CAMBRIDGE UNIVERSITY PRESS

3.3 Impact of channel estimation error on performance 87−4 −2 0 2 4 6 8 10 12 14 1610−410−310−210−1SNR (dB)SERLSMLMultistageKnown channelFigure 3.7 An

Page 7 - Contents

88 Channel estimation for high-rate systems−5 0 5 10 151234(a) CM1SERMSE−5 0 5 10 151234(b) CM2SERMSE−5 0 511.522.533.5(c) CM3SNR (dB) Performance Ga

Page 8

3.3 Impact of channel estimation error on performance 89−4.5 −4 −3.5 −3 −2.5 −2 −1.5 −1 −0.510−210−1100SNR (dB)FER(a) CM1 and CM2LS (2 Symbols)Multist

Page 9 - Part II Low-rate systems 137

90 Channel estimation for high-rate systemscomplexity similar to that of the conventional LS CFR estimator in an OFDM-UWBsystem. Overall, compared wit

Page 10

References 91[15] J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. B¨orjesson, “On channelestimation in OFDM system,” in Proc. IEEE Veh.

Page 11 - Contents ix

92 Channel estimation for high-rate systems[33] O.Edfors,M.Sandell,J.vandeBeek,S.K.Wilson,andP.O.B¨orjesson, “OFDM channelestimation by singular value

Page 12 - Ulas C. Kozat

4 Adaptive modulation and coding forhigh-rate systemsRuonan Zhang and Lin CaiAs wireless channels are fading and error-prone in nature, the adaptive m

Page 13 - Contributors

Contents ix9.4 Improving WPAN’s reliability under interference:dynamic channel selection 2619.4.1 Algorithm description 2619.4.2 Simulation results 26

Page 14

94 Adaptive modulation and coding for high-rate systemsFigure 4.1 Wireless transmission system with joint AMC and ARQ.4.1 Adaptive modulation and codi

Page 15 - Ruonan Zhang

4.2 AMC in MB-OFDM systems 95First, the premier requirement for AMC is the feedback path, which can be usedby the receiver to inform the transmitter o

Page 16

96 Adaptive modulation and coding for high-rate systemsTable 4.1 Transmission mode implementation in MB-OFDM [10].Coded bits / Information bits /Data

Page 17 - 1 Short-range wireless

4.3 WPAN link architecture in ECMA-368 97Figure 4.3 MAS reservation in a superframe: (a) MAS reservation in a superframe; (b) the timingof burst trans

Page 18 - 1.1.1 Enabling factors

98 Adaptive modulation and coding for high-rate systemsslots (MASs). An MAS lasts for 256 μs and is the minimum time unit for reservation.Each superfr

Page 19 - (SC-FDMA) systems [8]

4.4 Packet-level model for UWB channels with shadowing 99TxRxDobstructingpositionxr1θ2θy3θ4θFigure 4.4 The modeling of the body shadowing effect (c 2

Page 20

100 Adaptive modulation and coding for high-rate systemsX coordinate of the personY coordinate of the person−4.5−4.5−4.5−4.5−3.5−3.5−3.5−3.5−3−3−3−3−3

Page 21

4.4 Packet-level model for UWB channels with shadowing 1012S1S1λ2μKS...Kμ1Kλ−2λ3μFigure 4.6 FSMC model for UWB channels with shadowing process.4.4.2

Page 22

102 Adaptive modulation and coding for high-rate systemsSecond, we approximate that the time the person stays inside a zone is exponentiallydistribute

Page 23 - 1.2 Definition of reliability

4.5 WPAN link performance analysis 103Figure 4.7 Embedded Markov chain model (c 2010 IEEE) [19, 20].model can capture the MAC protocol scheduling, ch

Page 24

x Contents12.5 Limited feedback centralized relay selection 33712.5.1 Outage probability and effective rate 33912.5.2 DMT analysis 34112.6 Summary 343

Page 25 - Ch. 5Ch. 8, Ch. 9 Ch. 14

104 Adaptive modulation and coding for high-rate systems2. Channel state transition Because the channel variation is caused by the mobilityof pedestri

Page 26 - 1.2.1.1 Attenuation

4.5 WPAN link performance analysis 105The PMF of the random variable bt− dtcan be obtained asfbt−dt(x|nt, kt, kt+1, qt) =F−qty=0fbt(y|nt, qt) fdt(y −

Page 27 - 1.2.1.3 Interference sources

106 Adaptive modulation and coding for high-rate systemsTable 4.2 Transmission modes and channel modelChannel TM SNR interval Transition rate Transiti

Page 28

4.6 Simulation results 1070 10 20 30 40 50 60 70 80 900.10.20.30.40.50.60.70.80.911.1Queue Length (KB)CDF of Queue Length Distribution Max FER = 0.02

Page 29

108 Adaptive modulation and coding for high-rate systems20 30 40 50 60 70 80 9044.555.5Buffer Size (KB)Throughput (Mbps) Max FER = 0.02 (Analytical)M

Page 30

4.7 AMC in 60 GHz millimeter-wave radio systems 109the AMC is important for 60 GHz systems to combat the channel fading and enhancetransmission reliab

Page 31

110 Adaptive modulation and coding for high-rate systemsCoordination of devices within the radio range is achieved by the transmission andreception of

Page 32 - 1.3.1 Bluetooth

References 111References[1] A. J. Goldsmith and S. Chua, “Variable-rate variable-power MQAM for fading channels,”IEEE Trans. Commun., vol. 45, no. 10,

Page 33

112 Adaptive modulation and coding for high-rate systems[18] R. Zhang and L. Cai, “A packet-level model for UWB Channel with people shadowingprocess b

Page 34 - 1.3.2.1 Low-rate WPAN mesh

5 MIMO techniques for high-ratecommunicationsWasim Q. Malik and Andr´e PollokThis chapter presents an analysis of the gain in system capacity and reli

Page 35 - 1.3.2.2 High-rate WPAN mesh

ContributorsHuseyin ArslanUniversity of South Florida, Florida, USALin CaiUniversity of Victoria, CanadaStark C. DraperUniversity of Wisconsin-Madison

Page 36

114 MIMO techniques for high-rate communicationsFor a conventional narrowband NT× NRMIMO system, the received signal is givenby⎡⎢⎣y1...yNR⎤⎥⎦=7ρNT⎡⎢⎣h

Page 37

5.2 MIMO for ultrawideband systems 115thus the integral can be replaced by a sum. Conceptually, this treatment can be easilyunderstood in the context

Page 38 - Broadcast

116 MIMO techniques for high-rate communications3.1 4.6 6.1 7.6 9.1 10.6−70−50−30−10Frequency, GHzMagnitude, dB0 50 100 150−80−60−40−200Time delay, ns

Page 39

5.2 MIMO for ultrawideband systems 117−50 −25 0 25 5000.250.50.751Cross-range offset, cmCorrelation coefficient 25 MHz100 MHz7.5 GHz−50 −25 0 25 5000

Page 40

118 MIMO techniques for high-rate communicationsmeasurements with W = 500 GHz and center frequency varying between the 3.1–10.6 GHz FCC-defined UWB ban

Page 41 - References 25

5.2 MIMO for ultrawideband systems 1190 3 6 9 12 15 18024681012Signal-to-noise ratio, dBCapacity, bps/Hz 1x11x21x32x23x30 3 6 900.250.50.751Capacity,

Page 42

120 MIMO techniques for high-rate communications7 8 9 10 1100.250.50.751√L / NCDF N = 1, 2, 30 5 10 15 20 25 30 350369√LCapacity, bps/Hz Measurement

Page 43 - References 27

5.2 MIMO for ultrawideband systems 121Theoretically, TR arises as a consequence of the wave equation that describes thepropagation of an electromagnet

Page 44

122 MIMO techniques for high-rate communications−100 −50 0 50 100−50−250Time, nsMagnitude, dB W = 25 MHzW = 7.5 GHz−50 −25 0 25 50−50−250Time, nsMagn

Page 45 - High-rate systems

5.3 MIMO for 60 GHz systems 1235.2.6 SummaryThe analysis of UWB MIMO systems in this section has highlighted some of its keypotential applications and

Page 46

xii List of contributorsAndreas F. MolischUniversity of Southern California, California, USAAria NosratiniaUniversity of Texas at Dallas, Texas, USA¨O

Page 47 - 2 High-rate UWB and 60 GHz

124 MIMO techniques for high-rate communicationsSmall form factors of 60 GHz RF components and antennas open up the possibility tointegrate multiple 6

Page 48 - 3.1 10.6

5.3 MIMO for 60 GHz systems 125Figure 5.6 Fading map and magnitude of the spatial complex correlation coefficient in 60 GHzLOS channel. The fading map

Page 49

126 MIMO techniques for high-rate communicationsRange offset [cm]Correlation coefficient0 2 4 6 8 10121416182000.20.40.60.81(a) Range direction, LOSRan

Page 50

5.3 MIMO for 60 GHz systems 127Figure 5.8 General structure of a MIMO-OFDM system with joint transmit and receive BF:(a) subcarrier-wise BF and (b) sy

Page 51

128 MIMO techniques for high-rate communications(e.g., see reference [54])yn=√ρ u†nHnvnxn+ u†nwn, (5.10)where Hnis a shorthand notation for H(f =n f)

Page 52 - 2.2.1 Transmitter structure

5.3 MIMO for 60 GHz systems 129freedom (compared to subcarrier-wise BF) [54]. However, our computer simulationsin Section 5.3.4 demonstrate that this

Page 53 - 2.2.2 Signal model

130 MIMO techniques for high-rate communicationsSpectral Efficiency [bps/Hz]Pr(I > Abscissa)MIMO WFmaxMIsc WFSISO EP0 0.5 1 1.5 2 2.5 3 3.5 44.5500.2

Page 54

5.3 MIMO for 60 GHz systems 131Spectral Efficiency [bps/Hz]Pr(I > Abscissa)20 λcspacing1 λcspacing00.511.522.533.544.5500.20.40.60.81Figure 5.11 Dist

Page 55 - 2.2.3 System parameters

132 MIMO techniques for high-rate communicationsreference [58]. For reference, the distribution of the MIMO WF capacity is also shown.As noted earlier

Page 56

References 133multiplexing gain and boost the achievable data-rates in UWB systems, but not in 60 GHzsystems. On the other hand, beamforming is more a

Page 57

List of contributors xiiiSerhan YarkanTexas A&M University, Texas, USARuonan ZhangUniversity of Victoria, Canada

Page 58

134 MIMO techniques for high-rate communications[16] J. Keignart, C. Abou-Rjeily, C. Delaveaud, and N. Daniele, “UWB SIMO channel measure-ments and si

Page 59 - 2.3.1.1 Type A devices

References 135[36] L. Borcea, G. Papanicolaou, C. Tsogka, and J. Berryman, “Imaging and time reversal inrandom media,” Inverse Problems, vol. 18, no.

Page 60

136 MIMO techniques for high-rate communications[53] D.-S. Shiu, G. Foschini, M. Gans, and J. Kahn, “Fading correlation and its effect on thecapacity

Page 61

Part IILow-rate systems

Page 63 - 2.3.2 Signal models

6 ZigBee networks and low-rate UWBcommunicationsZafer Sahinoglu and Ismail GuvencIn this chapter, technologies and standards for low data rate communi

Page 64

140 ZigBee networks and low-rate UWB communicationsrself configuration: detects addition of a new device into the network, and continuouslyupdates and

Page 65

6.1 Overview and application examples 141Table 6.1 Key real-time localization systems (RTLS) a pplications, ranges, and accuracy requirements [7].Core

Page 66 - 2.3.3 System parameters

142 ZigBee networks and low-rate UWB communicationsFigure 6.1 Illustration of the network topologies supported by the ZigBee: (a) star topology;(b) tr

Page 67

6.2 ZigBee 143Table 6.2 Available frequency bands for IEEE 802.15.4.Frequency band (MHz) Modulation Bit rate (Kbps) Number of channels Regions868–868.

Page 69

144 ZigBee networks and low-rate UWB communicationsFigure 6.3 Flowchart of the slotted CSMA-CA and unslotted CSMA-CA channel accessmechanisms in the I

Page 70

6.2 ZigBee 145of backoff periods that need to be clear of channel activity prior to transmission. TheBE is related to the number of backoff periods a

Page 71 - 2.4.1 Single-carrier PHY

146 ZigBee networks and low-rate UWB communications6.2.2.2 Slotted CSMA-CAThe backoff period boundaries of different devices are not related in time t

Page 72 - Frequency

6.2 ZigBee 147Figure 6.4 GTS packet drop rate versus Pefor an IEEE 802.15.4 beacon-enabled network atvarious GTS packet arrival rates λ (adapted from

Page 73 - 2.4.3 Audio/visual PHY

148 ZigBee networks and low-rate UWB communicationsFigure 6.5 Illustration of the interference avoidance mechanism in ZigBee (adapted fromreference [1

Page 74

6.3 Impulse-radio based UWB (IEEE 802.15.4a) 149energy is higher than the other channels, the channel with the minimum energy level,channel c∗i, is co

Page 75

150 ZigBee networks and low-rate UWB communicationsTable 6.3 UWB channels for the IEEE 802.15.4a standard [16].Channel no. Center freq. (MHz) Bandwidt

Page 76

6.3 Impulse-radio based UWB (IEEE 802.15.4a) 151Table 6.4 CSS channels for the IEEE 802.15.4a standard [18].Channel no. Center freq. (MHz) Channel no.

Page 77 - 3 Channel estimation for

152 ZigBee networks and low-rate UWB communicationsFigure 6.8 UWB symbol structure according to the IEEE 802.15.4a standard.of the burst can be determ

Page 78

6.3 Impulse-radio based UWB (IEEE 802.15.4a) 153Figure 6.9 Basic blocks of CSS PHY transmitter according to the IEEE 802.15.4a standard [18].defined as

Page 79

1 Short-range wirelesscommunications and reliabilityIsmail Guvenc, Sinan Gezici, Zafer Sahinoglu, and Ulas C. KozatEven though there is no universally

Page 80

154 ZigBee networks and low-rate UWB communicationsFigure 6.10 Illustration of the IEEE 802.15.4a packet structure. The data part is BPM-BPSKmodulated

Page 81 - Relative Power of MPCs

6.3 Impulse-radio based UWB (IEEE 802.15.4a) 155Figure 6.11 Structure of the PHR.{16, 64, 1024, 4096} symbols. The preamble length is specified by the

Page 82

156 ZigBee networks and low-rate UWB communicationsTable 6.5 System parameters for UWB PHY of the IEEE 802.15.4a standard for amean PRF of 62.4 MHz, w

Page 83

6.3 Impulse-radio based UWB (IEEE 802.15.4a) 157Table 6.6 The basis preamble symbol set [16].Index SymbolS1-0000+0-0+++0 +-000+- +++00-+0-00S20 +0 +-0

Page 84 - 3.1.3 Discrete-time model

158 ZigBee networks and low-rate UWB communicationsFigure 6.12 A received UWB PHY waveform, and representation of the confidence interval withrespect t

Page 85

6.4 Low latency MAC for WPANs (IEEE 802.15.4e) 159beaconsuperframeMulti superframeCAP CAPCAPCAPCAPCAP(a)(b)CAPCAPFigure 6.13 Illustration of the IEEE

Page 86 - Frequency

160 ZigBee networks and low-rate UWB communicationsTable 6.7 Logical channel numbering in IEEE 802.15.4e.PHY hopping sequence Logical channel index{1,

Page 87

6.4 Low latency MAC for WPANs (IEEE 802.15.4e) 161beaconSensor time slotstimeActuatortime slotsManagementtime slotsRetransmissiontime slotsGroupACKDLG

Page 88

162 ZigBee networks and low-rate UWB communicationsFigure 6.15 Illustration of the TSCH slotframe structure with five time slots. The Tiindicatestime s

Page 89 - . . .. . .. . .. .

6.5 IEEE 802.15.4f (active RFID) 163If a device wishing to join the network receives a valid advertisement command frame,the new device can attempt to

Page 90

2 Short-range wireless communications and reliabilitycharacteristics, and reliability requirements is provided, and globally available frequencybands

Page 91

164 ZigBee networks and low-rate UWB communicationsWAN (802.16)InternetHAN(802.15.4)802.15.4g802 15 4g802 15 4g802.15.4gLAN(802.11))Bluetooth(802.15.1

Page 92

References 165each other (see, e.g., Figure 6.16). Such devices include meters, display systems, con-trollers, and various other infrastructure compon

Page 93

166 ZigBee networks and low-rate UWB communicationsWireless medium access control (MAC) and physical layer (PHY) specifications forlow-rate wireless pe

Page 94

References 167[28] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal, “Locatingthe nodes: Cooperative localization in

Page 95

7 Impact of channel estimationon reliabilityHongsan ShengThis chapter discusses the impacts of channel estimation on the reliability of ultrawide-band

Page 96

7.1 Introduction 169The application of pilot-aided channel estimation to UWB systems is discussed in ref-erence [6]. In reference [13], the performanc

Page 97

170 Impact of channel estimation on reliability7.2 Signal and channel models with channel estimation errorsIn this section, the system model is presen

Page 98 - Figure 3.5 NMSE ratio, R

7.2 Signal and channel models with channel estimation errors 171different numbers of paths L, the constant δ0is determined by the procedure suggestedi

Page 99 - 3.2.5.3 MSE performance

172 Impact of channel estimation on reliabilitypilot symbols [1]. The ML estimate is used in the numerical simulations discussed inSection 7.4. The cl

Page 100 - 3.2.6 Complexity comparison

7.3 Reliability with channel estimation errors 173Substituting (7.5)into(7.10), the path amplitudes conditioned on the path delay estimatesbecomeˆα=

Page 101

1.1 Short-range wireless communications 3much simpler frequency-domain equalization techniques can be utilized efficiently,1(ii)it is robust in frequen

Page 102 - 3.3.1 Average uncoded SER

174 Impact of channel estimation on reliabilitywherew=1Ep∞−∞n(t)q(t − ˆτ)dt ,= 0,...,L − 1 (7.16)is the noise term in the corresponding branch of

Page 103 - Figure 3.8

7.3 Reliability with channel estimation errors 175andE%η22&=N02EpL−1=0α2μ2, (7.22)respectively. By the CLT, when L is large, η3, which contain

Page 104 - 3.3.2 FER performance

176 Impact of channel estimation on reliabilitywhereγt E[γt]=2EpN0L−1=0α2E%μ2&, (7.28)andγ02EpN0L−1=0α2. (7.29)To obtain the bound in (7.

Page 105 -  2010 IEEE) [36]

7.3 Reliability with channel estimation errors 177Now, denote X αμ+ eand Y αμ+ w. Substituting back in (7.32),D =L−1=0XY. (7.33)Conditio

Page 106 - References

178 Impact of channel estimation on reliabilityand use the alternative form of Q1(a, b)with finite limits [34, p. 79, (4.28)], to obtainQ1(a, b)= Q1(ζ

Page 107 - References 91

7.3 Reliability with channel estimation errors 179Using (7.25)in(7.45), we haveMγt(s)=L−1?=0M(s), (7.47)whereM(s)= Eexps2EpN0α2μ2, (7.48)and

Page 108

180 Impact of channel estimation on reliabilityand the unconditional BER is given byPe=1ππ/20Mγt−12sin2θdx . (7.54)As expected, this is the BER exp

Page 109 - Ruonan Zhang and Lin Cai

7.4 System optimization with channel estimation errors 1810 2 4 6 8 10 12 1410−610−510−410−310−210−1100Eb/N0 (dB)BERSimulation, M = 5 Simulation, M =

Page 110

182 Impact of channel estimation on reliability0 10 20 30 40 50 60 70 8010−410−310−210−1100Percent of symbols allocated to the pilotBEREb/N0=3 dBEb/N0

Page 111 - 4.2 AMC in MB-OFDM systems

7.4 System optimization with channel estimation errors 1830.5 1 1.5 2 2.5 3 3.578910111213141516Signal bandwidth W (GHz)Required E b/N0 (dB)M = 5 M =

Page 112

This page intentionally left blank

Page 113 -  2010 IEEE) [19, 20]

4 Short-range wireless communications and reliabilitysystems. On the other hand, multihop and cooperative communications may be consid-ered as importa

Page 114

184 Impact of channel estimation on reliability0 0.5 1 1.5 210−410−310−210−1Signal bandwidth W (GHz)BERml = 0.5 ml = 1 ml = 2Figure 7.4 BER versus the

Page 115 -  2010 Elsevier) [17]

7.4 System optimization with channel estimation errors 1850 10 20 30 40 50 60 7010−510−410−310−210−1Number of rake fingersBEREb/N0 = 12 dB Eb/N0 = 10

Page 116 - Y coordinate of the person

186 Impact of channel estimation on reliability5 10 15 20 25 30 35 40 45 5078910111213141516Number of rake fingersRequired E b/N0 (dB)BER = 10−4 BER =

Page 117

References 187of paths to be processed by the Rake receiver is determined to attain minimum error ratein the presence of imperfect CSI. For the 2 GHz

Page 118 - 4.5.2 Markovian analysis

188 Impact of channel estimation on reliability[16] L. Huang and C. C. Ko, “Performance of maximum-likelihood channel estimator for UWBcommunications,

Page 119 - Embedded Markov chain model (

References 189[33] J. G. Proakis, “Probabilities of error for adaptive reception of M-phase signals,” IEEE Trans.Commun. Technol., vol. COM-16, no. 1,

Page 120

8 Interference mitigation andawareness for improved reliabilityHuseyin Arslan, Serhan Yarkan, Mustafa E. Sahin, and Sinan GeziciWireless systems are c

Page 121

8.1 Mitigation of multiple-access interference (MAI) 191from user k is expressed ass(k)tx(t) =(EkNf∞j=−∞d(k)jb(k)j/Nfptxt − jTf− c(k)jTc− a(k)j/N

Page 122 - 4.6 Simulation results

192 Interference mitigation and awareness for improved reliabilityr (t)prx (–t)b (1)DetectorˆFigure 8.1 A receiver structure with chip-rate sampling.w

Page 123 - Queue Len

8.1 Mitigation of multiple-access interference (MAI) 193r(t)b(1)ˆstemp,1 (–t)rl1,jrl2,jrlM,j(1)stemp,2 (–t)Detector(1)stemp,M (–t)(1)Figure 8.2 A rece

Page 124 - Throughput (Mbps)

1.1 Short-range wireless communications 5Table 1.1 Example applications for short-range wireless communications.Low-rate systems High-rate systemsTele

Page 125

194 Interference mitigation and awareness for improved reliabilitywithAl, j={(n, m):n ∈{1,...,L}, m ∈ Fi, m = j,mTf+ c(1)mTc+ nTc= jTf+ c(1)jTc+lTc}

Page 126 - 4.8 Summary

8.1 Mitigation of multiple-access interference (MAI) 195Since IR-UWB systems transmit pulses with a low duty cycle, signals from some ofthe users may

Page 127

196 Interference mitigation and awareness for improved reliabilitywhere θ represents a weighting vector, and r is the vector of received signal sample

Page 128

8.1 Mitigation of multiple-access interference (MAI) 197where˜sdecorrepresents the first column ofST1S1−1with S1denoting the signaturematrix in (8.16

Page 129 - Wasim Q. Malik and Andr

198 Interference mitigation and awareness for improved reliabilityl ∈ L ={l1,...,lM}and j ∈{1,...,Nf}, and let r represent an N × 1 vector consistingo

Page 130

8.1 Mitigation of multiple-access interference (MAI) 199complexity when the number of frames and/or the number of receiver branches (Rakefingers) is la

Page 131 - 5.2.1 Channel model

200 Interference mitigation and awareness for improved reliability1. S ={1,...,N }2. for i = 1:N1− 13. Choose a random sample s from S4. S = S −{s}5.˜

Page 132 - 5.2.2 Spatial correlation

8.1 Mitigation of multiple-access interference (MAI) 2016 8 10 12 14 1610−510−410−310−210−1100SNR (dB)Bit Error ProbabilityOptimal Combining2−step MMS

Page 133 - Correlation coefficient

202 Interference mitigation and awareness for improved reliability6 8 10 12 14 1610−510−410−310−210−1100SNR (dB)Bit Error ProbabilityOptimal Combining

Page 134 - 5.2.3 Channel capacity

8.1 Mitigation of multiple-access interference (MAI) 2030 5 10 15 2010−510−410−310−210−1100SNR (dB)Bit Error ProbabilityOptimal CombiningOptimal Multi

Page 135 - 5.2.4 The role of multipath

6 Short-range wireless communications and reliabilityin such scenarios. While such techniques may also be applied to certain high-rate com-munication

Page 136

204 Interference mitigation and awareness for improved reliabilityprx (–t)ll,j ,j,…,11M1prx (–t)prx (–t)rr(1)(1)ll,j,j,…,22M1rr(2) (2)ll,j,j,…,KKM1rr(

Page 137

8.1 Mitigation of multiple-access interference (MAI) 205for j = 1,...,Nfand k = 1,...,K , where f˜r(k)j|b(k)j= iis the likelihood of thejth combined

Page 138 - (τ ), which is the temporal

206 Interference mitigation and awareness for improved reliability0 2 4 6 8 10 1210−510−410−310−210−1100SNR (dB)Bit Error ProbabilityLC 1st iter.LC 2n

Page 139 - 5.3 MIMO for 60 GHz systems

8.1 Mitigation of multiple-access interference (MAI) 2070 2 4 6 8 10 12 14 1610−410−310−210−1100SNR (dB)Bit Error ProbabilityLC 1st iter.LC 2nd iter.S

Page 140 - 5.3.2 Spatial correlation

208 Interference mitigation and awareness for improved reliabilitysignal subspace spanned by the eigenvectors associated with the largest eigenvalues

Page 141

8.1 Mitigation of multiple-access interference (MAI) 209of MAI are investigated. In particular, the design of TH sequences and/or polarity codesin (8.

Page 142 - 5.3.3 Beamforming

210 Interference mitigation and awareness for improved reliabilityFigure 8.9 Block diagram of the transmitter for user k in a PCTH system.where S ={1,

Page 143 -  2009 IEEE)

8.1 Mitigation of multiple-access interference (MAI) 211Figure 8.10 Block diagram of the receiver for user k in a PCTH system.where bi∈{0, 1}, and x ∈

Page 144

212 Interference mitigation and awareness for improved reliabilityUWB (-41 dBm/MHz)FCC Part 15 LimitIEEE 802.11bBluetoothIEEE 802.11gHome RFCordless P

Page 145 - 5.3.4 Receiver performance

8.2 Mitigation of narrowband interference (NBI) 213frequency bands. In CDMA systems, NBI is partially handled by the processing gainas well as by empl

Page 146

1.2 Definition of reliability 7Table 1.2 Review of the ISM/U-NII bands, and the spectrum used for UWB and 60 GHz systems inthe USA.ISM bands Power limi

Page 147 - = 8.3dB

214 Interference mitigation and awareness for improved reliabilityDepending on its type, the NBI can be modeled in various ways. For example, it canbe

Page 148 - 5.4 Conclusion

8.2 Mitigation of narrowband interference (NBI) 215subcarriers depending on the level of interference. The NBI models that can be consid-ered for OFDM

Page 149

216 Interference mitigation and awareness for improved reliabilityThe feedback information can be various, including the interfered subcarrier index,i

Page 150

8.2 Mitigation of narrowband interference (NBI) 2173 4 5 6 7 8 9 10−90−80−70−60−50−40−30−20−10010Normalized Spectrum Magnitude (dB)Frequency (GHz)Spec

Page 151 - References 135

218 Interference mitigation and awareness for improved reliability4.5 5 5.5−0.500.5Time (ns)Amplitude6th order Gaussian pulse0 5 10 1510−1510−1010−510

Page 152

8.2 Mitigation of narrowband interference (NBI) 219frames, which last for Tf= Ts/Nfand are divided into chips with a duration of Tc.The pseudo-random

Page 153 - Low-rate systems

220 Interference mitigation and awareness for improved reliabilityinterferers, methods such as employing notch filters or changing the parameters of th

Page 154

8.2 Mitigation of narrowband interference (NBI) 221notch filters can be used to suppress NBI. The appealing fact about this method is thatit can be uti

Page 155

222 Interference mitigation and awareness for improved reliabilityprimarily reflect the NBI rather than the UWB signal. This fact leads to the conseque

Page 156

8.3 Interference awareness 2232. Interference from other users, which can be further categorized as– Multiuser interference, which is the interference

Page 157

8 Short-range wireless communications and reliabilityitself. For some applications (e.g., data transfer), reliability is about data integrity andall t

Page 158 - 6.2 ZigBee

224 Interference mitigation and awareness for improved reliabilityproperties, interference conditions change depending on the propagation characterist

Page 159 - 6.2 ZigBee 143

8.3 Interference awareness 225estimation techniques have been popularly used for optimal receiver designs (such aschannel estimation and soft informat

Page 160

226 Interference mitigation and awareness for improved reliabilitymentioning that with the increasing services and applications, nodes are expected to

Page 161 - 6.2.2.1 Unslotted CSMA-CA

References 227[5] M. L. Welborn, “System considerations for ultrawideband wireless networks,” in Proc.IEEE Radio and Wireless Conf., Boston, MA, Aug.

Page 162 - 6.2.2.2 Slotted CSMA-CA

228 Interference mitigation and awareness for improved reliability[24] Y. C. Yoon and R. Kohno, “Optimum multi-user detection in ultrawideband (UWB)mu

Page 163 - 6.2 ZigBee 147

References 229[40] J. Foerster, “Channel modeling sub-committee report final, IEEE802.15-02/490,” 2002.[Online]. Available: http://ieee802.org/15[41] D

Page 164

230 Interference mitigation and awareness for improved reliability[57] P. Liu and Z. Xu, “Performance of POR multiuser detection for UWB communication

Page 165 - 6.3.1 Channel allocations

References 231[74] G. Durisi and S. Benedetto, “Performance evaluation of TH-PPM UWB systems in thepresence of multiuser interference,” IEEE Commun. L

Page 166

232 Interference mitigation and awareness for improved reliability[90] Y. Zhang and J. Dill, “An anti-jamming algorithm using wavelet packet modulated

Page 167 - 6.3.2.1 UWB PHY

References 233[109] C. W. Rhodes, “Reduction of NTSC co–channel interference by referencing carrier fre-quencies to the LORAN–C signal,” IEEE Trans. o

Page 168

1.2 Definition of reliability 9DataModulation and CodingRF OscillatorAmplifierTransmitter AntennaTransmitterLNADownConversionDemodulationand DecodingCh

Page 169 - 6.3.2.2 CSS PHY

9 Characterization of Wi-Fiinterference for dynamic channelallocation in WPANsFederico Penna, Claudio Pastrone, Hussein Khaleel, Maurizio A. Spirito,

Page 170 - 6.3.3.1 UWB PHY

9.1 Towards adaptive WPANs 235Figure 9.1 Channel occupation of IEEE 802.11 and IEEE 802.15.4.environments. This study is meant as a basis for the deve

Page 171 - Structure of the PHR

236 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsbands. Being a key aspect for the implementation of CR systems, spec

Page 172 - 6.3.3.2 CSS PHY

9.2 WPANs under Wi-Fi interference 237features of the IEEE 802.15.4 radio chips and then used to estimate the level of channeloccupation.Compared to p

Page 173

238 Characterization of Wi-Fi interference for dynamic channel allocation in WPANs(a)(b)Figure 9.2 Configuration of the test-beds: (a) first setup, used

Page 174 - 6.4.1 EGTS

9.2 WPANs under Wi-Fi interference 239Figure 9.3 RSSI sampling scheme (from [27],c 2009 IEEE).windows per channel in the total sensing time. Then the

Page 175 - Multi superframe

240 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsof the PHY payload to be sent over the air is a parameter as well. T

Page 176

9.2 WPANs under Wi-Fi interference 241was considered, in order to observe the combined effects of multipath propagations andmultiple sources of interf

Page 177

242 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.4 Probability distribution of the received energy fW(x ) an

Page 178

9.2 WPANs under Wi-Fi interference 243By definition of the Bernoulli process, the variable k has a binomial distribution withsuccess rate equal to p1,

Page 179

10 Short-range wireless communications and reliabilityalso be explained, along with referrals to the related chapters in the book for a morecomplete t

Page 180 - 802 15 4g

244 Characterization of Wi-Fi interference for dynamic channel allocation in WPANshave an observedˆp1in the interval[p1− 0.02, p1+ 0.02]with a confiden

Page 181

9.3 Interference characterization and performance degradation 245rSpectrograms, to observe the behavior of the interfering traffic jointly in the timea

Page 182

246 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.5 Anechoic chamber: energy PDFs of the four interfered IEEE

Page 183 - References 167

9.3 Interference characterization and performance degradation 247Time [min]Channel numberAverage RSSI [dBm],540 kb/s2 4 6 8 10121416182011121314151617

Page 184 - 7.1 Introduction

248 Characterization of Wi-Fi interference for dynamic channel allocation in WPANs(a)(b)kbps)kbps)kbps)kbps)kbps)kbps)kbps)kbps)kbpskbpskbpskbpsFigure

Page 185 - 7.1 Introduction 169

9.3 Interference characterization and performance degradation 249In this expression, the mean definition is indeed an approximation, since the distinct

Page 186 - UWB channel models

250 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.8 Relative throughput versus data rate in the anechoic cham

Page 187

9.3 Interference characterization and performance degradation 251Time [min]Channel numberAverage RSSI [dBm]2 4 6 8 10 12 14 16 18111213141516171819202

Page 188

252 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.10 Indoor 1: energy PDFs of the four interfered IEEE 802.15

Page 189

9.3 Interference characterization and performance degradation 253Time [min]Channel numberAverage RSSI [dBm],108 kb/s2 4 6 8 10121416181112131415161718

Page 190 - 7.3.1 SNR analysis

1.2 Definition of reliability 11received powers at the receiver. The power may also be focused along a certain beamdirection using beamforming techniqu

Page 191

254 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.12 Indoor 1: analysis of the results, (a) global mean (μ) a

Page 192 - 7.3.2 BER analysis

9.3 Interference characterization and performance degradation 255Figure 9.13 Relative throughput versus data rate for Indoor 1 scenario.pulse shape fil

Page 193

256 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsTime [min]Channel numberAverage RSSI [dBm]2 4 6 8 10 12 14 16 18 201

Page 194

9.3 Interference characterization and performance degradation 257Figure 9.15 Indoor 2: energy PDFs of the four interfered IEEE 802.15.4 channels (14–1

Page 195

258 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsTime [min]Channel numberAverage RSSI [dBm],108 kb/s2 4 6 8 101214161

Page 196

9.3 Interference characterization and performance degradation 259Figure 9.17 Indoor 2: analysis of the results; (a) global mean (μ) and mean of the si

Page 197 - 7.4.2 Signal bandwidth

260 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsFigure 9.18 Relative throughput versus data rate for Indoor 2 scenar

Page 198

9.4 Improving WPAN’s reliability under interference 261Spectrograms provide a temporal visualization of the spectrum occupancy state, theyare obtained

Page 199 - No estimation errors

262 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsAlgorithm 9.1 Channel selection based on outage probability.1: M: nu

Page 200 - Signal bandwidth W (GHz)

9.4 Improving WPAN’s reliability under interference 263and reactivity in the detection of interference, etc., according to Section 9.2.4 andSection 9.

Page 201 - Number of rake fingers

12 Short-range wireless communications and reliabilitymultiuser and narrowband interference for short-range wireless communication systemswill be disc

Page 202 - 7.5 Concluding remarks

264 Characterization of Wi-Fi interference for dynamic channel allocation in WPANs20 40 60 80 100 120 14000.020.040.060.080.10.120.140.160.180.2Sensin

Page 203

9.4 Improving WPAN’s reliability under interference 26520 40 60 80 100 120 14000.020.040.060.080.10.120.140.160.180.2Sensing window numberEstimated ou

Page 204

266 Characterization of Wi-Fi interference for dynamic channel allocation in WPANs50 100 150 200 250051015202530Sample numberInstantaneous throughput

Page 205 - References 189

9.5 Conclusion 267In order to discuss further the issue of the throughput reduction due to spectrumsensing as described in Section 9.2.5, it can be se

Page 206 - 8 Interference mitigation and

268 Characterization of Wi-Fi interference for dynamic channel allocation in WPANsThis work was partially supported by the European Commission in the

Page 207

References 269[17] Q. Zhao, L. Tong, A. Swami, and Y. Chen, “Decentralized cognitive MAC for opportunisticspectrum access in ad hoc networks: A POMDP

Page 208 - Detector

10 Energy saving in low-rate systemsTae Rim Park and Myung J. LeeIn low-rate wireless networks, energy saving has been one of the recent importantrese

Page 209

10.1 Background on energy efficiency 271Table 10.1 Ambient energy sources and harvested power [1].Source Source energy density Harvested energy density

Page 210

272 Energy saving in low-rate systemsFigure 10.1 Energy per frame.Figure 10.2 Comparision of two energy control methods: transmission power control (P

Page 211 - 8.1.1.2 Linear detectors

10.1 Background on energy efficiency 273Figure 10.3 Bit error probability curves for four different modulation options.Assume that the required BER is

Page 212 - Quasi-decorrelator

1.3 Review of related wireless standards 13changes in wireless channel quality, changes in traffic demand, etc. Depending on theparticular scenario, fe

Page 213 - Quasi-MMSE detector

274 Energy saving in low-rate systemsFigure 10.4 Example time line of channel activity in view of energy consumption.network devices. Exact transmissi

Page 214

10.1 Background on energy efficiency 275is used for large data exchange. However, it consumes significantly higher energy formonitoring the channel. Thu

Page 215

276 Energy saving in low-rate systemsActive time/active ratio a measure to present the effects of energy saving algorithmson the sleeping time. Althou

Page 216

10.2 Energy saving MACs 277AsymmetricSynchronous AsynchronousTransmitter notification Receiver queryAutomatic deliveryFigure 10.5 Asymmetric single-h

Page 217

278 Energy saving in low-rate systemsIdeally, automatic delivery is the best energy-saving algorithm because it does nothave any control frame exchang

Page 218 - 8.1.1.3 Iterative algorithms

10.2 Energy saving MACs 279Table 10.2 Parameters for analysis.Symbol Parameter ValueTTRTurnaround time 0.192 msTBCNBeacon frame time 0.608 ms (19 byte

Page 219

280 Energy saving in low-rate systemsAPSTA AFigure 10.7 IEEE 802.11 power save mode.method, since it requires fairly large energy consumption at each

Page 220 - (t) denotes

10.2 Energy saving MACs 281Figure 10.8 Average active time per wake-up interval in transmitter notification.average backoff time for a beacon and an RT

Page 221

282 Energy saving in low-rate systemsAPBeaconFigure 10.9 Example time line of unscheduled-automatic power save delivery.of latency constraints. The tr

Page 222 -  2008 IEEE) [39]

10.2 Energy saving MACs 283Active duration utilization rate (%)Figure 10.10 Average active time per wake-up interval in receiver query.SymmetricSynchr

Page 223 - Subspace approaches

Reliable Communications for Short-range Wireless SystemsEnsuring reliable communication is an important concern in short-range wireless com-munication

Page 224 - Blind approaches

14 Short-range wireless communications and reliabilitySource ASource BSource CDestination ADestination BDestination CXXCh. 12Ch. 1Source D Destination

Page 225

284 Energy saving in low-rate systemsactive duration and to resynchronize the active durations. A device having a frame totransmit notifies this by tra

Page 226

10.2 Energy saving MACs 285Figure 10.12 Example timeline of the X-MAC (c 2008 IEEE) [4].traffic rate. In other words, if the number of transmissions i

Page 227

286 Energy saving in low-rate systemsframes instead of a short preamble and an early ACK to facilitate the comparison withother protocols. We assume t

Page 228

10.2 Energy saving MACs 287Figure 10.13 Example time line of IEEE 802.15.5 asynchronous energy saving (AES) mode(c 2008 IEEE) [4].by the WN is long e

Page 229

288 Energy saving in low-rate systemsActive duration utilization rate (%)Figure 10.14 Comparison of symmetric MAC algorithms.The active time for data

Page 230

References 28910.3 SummaryIn this chapter, we have presented issues for saving energy in low-rate networks andexplained how MAC protocols play a criti

Page 231 - 8.2.2 NBI avoidance

290 Energy saving in low-rate systems[12] N. M. Pletcher, S. Gambini, and J. Rabaey, “A 52 W wake-up receiver with 72 dBm sensitivityusing an uncertai

Page 232 - 8.2.2.3 Pulse shaping

Part IIISelected topics forimproved reliability

Page 234 - Magnitude (dB)

11 Cooperative communicationsfor reliabilityAndreas F. Molisch, Stark C. Draper, and Neelesh B. MehtaChapter 11 describes how teams of wireless nodes

Page 235 - 8.2.3 NBI cancelation

1.3 Review of related wireless standards 15Table 1.3 Task groups (TGs) in IEEE 802.15 Working Group for WPAN [29].Name Description IEEE standardTG1 Bl

Page 236 - 8.2.3.1 MMSE combining

294 Cooperative communications for reliabilitythat in cellular communications, which until now has been the dominant wireless appli-cation, the reliab

Page 237

11.1 Introduction 295with high attenuation, which requires a high transmit power to succeed, can be avoided.These two aspects are actually two sides o

Page 238 - 8.3 Interference awareness

296 Cooperative communications for reliabilityFull CSIT The nodes know both the amplitude and the phase of the channel to thereceiving node. In this c

Page 239

11.2 Cooperative communication using virtual beamforming 297transmitting nodes. This functionality is transparent to the receiver. All complicationis

Page 240 - (WLAN) devices

298 Cooperative communications for reliabilitywith low power. One of the first suggestions of virtual beamforming can be found inreference [22].A numbe

Page 241

11.2 Cooperative communication using virtual beamforming 299h2h1hNPtPtPtN21RelaysDestinationSourceTransmissionPower PSDecode successfullyUnable to dec

Page 242 - 8.4 Summary

300 Cooperative communications for reliability2. Training: Only the M relays that receive data successfully from the source sendtraining sequences at

Page 243 - References 227

11.2 Cooperative communication using virtual beamforming 301We model only the energy required for radio transmission and not the energy consumedfor re

Page 244

302 Cooperative communications for reliabilityobtainPf(K (M), M) =N0B(2r− 1)K (M) + 1E1g[K (M)]+K (M)i=11g[i]. (11.4)The term (K (M) + 1) in the de

Page 245 - References 229

11.2 Cooperative communication using virtual beamforming 3032 4 6 8 10 12 14 16681012141618number of relaysenergy/messageoptimal relay selectionsingle

Page 246

16 Short-range wireless communications and reliabilityTable 1.4 Different classes for Bluetooth devices.Class Maximum power (mW) Range (m)Class 1 100

Page 247 - References 231

304 Cooperative communications for reliability1234657Figure 11.3 Illustration of wireless network graph, G, with seven nodes (c 2008 IEEE) [2].is not

Page 248

11.2 Cooperative communication using virtual beamforming 305As before, all transmissions are at a constant rate, r, and each message is d symboldurati

Page 249 - References 233

306 Cooperative communications for reliabilitychannel gains to j, and feeds back to each selected node, k ∈ K(D(i, j)), the gainand phase of the chann

Page 250 - 9 Characterization of Wi-Fi

11.2 Cooperative communication using virtual beamforming 30712346570.270.180.180.180.180.180.180.180.180.180.360.360.36Figure 11.4 Computation of opti

Page 251

308 Cooperative communications for reliabilityusing the Bellman–Ford algorithm, the minimum cost route from the source (node 1) todestination (node 7)

Page 252

11.3 Cooperative communication using rateless codes 309pair of independent erasure channels each having erasure probability pefrom two relaysto a sing

Page 253

310 Cooperative communications for reliabilityIn performing mutual information accumulation, the receiver must be able to distin-guish the signals tra

Page 254

11.3 Cooperative communication using rateless codes 311different codes, then the destination can perform mutual information accumulation.The second ph

Page 255

312 Cooperative communications for reliability11.3.3.1 Analysis of two-phase protocolComputing the performance (i.e., the energy consumed and delay) p

Page 256 - 9.2.2.3 Scenarios

11.3 Cooperative communication using rateless codes 313This follows from the PDF of the SNR in Rayleigh fading and Shannon’s capacityequation for AWGN

Page 257

1.3 Review of related wireless standards 17Figure 1.3 (a) Full mesh topology (b) partial mesh topology.Recently, Bluetooth 3.0 specification has been a

Page 258

314 Cooperative communications for reliability11.3.3.3 ShadowingWe now turn to the computation of transmission time and energy expenditure in theprese

Page 259 - Numerical example

11.3 Cooperative communication using rateless codes 315average energy expenditurenumber of used relay nodes LFigure 11.5 Mean energy expenditure as a

Page 260 - 9.2.5 Sensing duty cycle

316 Cooperative communications for reliabilitymean energy expenditurecorrelation coefficientFigure 11.6 Mean energy expenditure as a function of the c

Page 261 - 9.3.1.1 Energy distributions

11.3 Cooperative communication using rateless codes 317(using different fountain codes) is denoted as τ2=Gτ2− τ1, and so on. Generally, thetime until

Page 262

318 Cooperative communications for reliabilitymean transmission energymean transmission timenumber of relay nodes NFigure 11.7 Mean transmission time

Page 263

11.3 Cooperative communication using rateless codes 319pdf of transmission energynormalized transmission energyFigure 11.8 PDF of transmission energy

Page 264

320 Cooperative communications for reliabilityWe minimize this linear objective function subject to the following constraints. First,i≥ 0 for all i.

Page 265 - 9.3.1.2 Throughput

11.3 Cooperative communication using rateless codes 321Figure 11.9 Location of nodes in a 50-node network. The minimum-energy and minimum-delaycoopera

Page 266 - 9.3.2 Indoor 1

322 Cooperative communications for reliabilityis selected using Dijkstra’s shortest-path algorithm. First, we consider the situationwhere each node de

Page 267 - 9.3.2.1 Energy distributions

References 323[4] S. C. Draper, L. Liu, A. F. Molisch, and J. Yedida. “Routing in cooperative wireless networkswith mutual-information accumulation.”

Page 268

18 Short-range wireless communications and reliabilityFigure 1.4 Network topologies in the IEEE 802.15.4-2006 standard, where circles represent thePAN

Page 269

324 Cooperative communications for reliability[24] J. N. Laneman, D. N. C. Tse, and G. W. Wornell. “Cooperative diversity in wireless networks:Efficien

Page 270

References 325[44] M. Z. Win and J. H. Winters. “Analysis of hybrid selection/maximal-ratio combining inRayleigh fading.” IEEE Trans. Commun., vol. 47

Page 271 - 9.3.3 Indoor 2

12 Reliability through relay selection incooperative networksRamy Abdallah Tannious and Aria NosratiniaThis chapter first presents an overview of the p

Page 272 - 9.3.3.1 Energy distributions

12.2 Signaling in multiple-relay networks 327Figure 12.1 Sensor network with a group of nodes clustered around the source.designer recruits the help o

Page 273 - 9.3.3.2 Throughput

328 Reliability through relay selection in cooperative networksdivision multiple access (TDMA/FDMA) system. To improve the spectral efficiency,the seco

Page 274

12.3 Motivations for relay selection 3292. The data stream of the source is not known aprioriat the candidate relay nodes.Thus, acquiring such informa

Page 275

330 Reliability through relay selection in cooperative networksTable 12.1 Comparison between signaling protocols for multiple-relay networks.Protocol

Page 276

12.4 Overview of relay selection 331that relay selection is a rich problem that will continue to draw more interest due to itspracticality and simplic

Page 277 - 9.4.1 Algorithm description

332 Reliability through relay selection in cooperative networksSNR gains. If DSTC is used, xmwill be transmitted based on a space-time code structurew

Page 278

12.4 Overview of relay selection 3331 2 3 4 5 6 7 81820222426283032343638MReceive SNR (dB)Distributed beamformingDistributed STCRelay selectionFigure

Page 279 - 9.4.2 Simulation results

1.3 Review of related wireless standards 19Table 1.5 Different modulation and coding types in IEEE802.15.3, where TCM refers to trellis coded modulati

Page 280

334 Reliability through relay selection in cooperative networkswhereas the other smoothes the difference between both links via a harmonic meanoperati

Page 281

12.4 Overview of relay selection 335In reference [30], two relevant questions are posed about the relay selection problem.The first question is about w

Page 282

336 Reliability through relay selection in cooperative networksof large overhead of CSI across the network. A relay node is feasible to participate in

Page 283 - Acknowledgments

12.5 Limited feedback centralized relay selection 337and switching to the selected relay occurs ifh∗m= max{hm} > T . (12.16)It is obvious that the

Page 284

338 Reliability through relay selection in cooperative networksTable 12.2 The incremental transmission with relay selection (ITRS) protocol (c 2008 I

Page 285 - References 269

12.5 Limited feedback centralized relay selection 339therefore, the usage of channel resources may be inefficient. The details of the feedbacksignaling

Page 286 - Tae Rim Park and Myung J. Lee

340 Reliability through relay selection in cooperative networks0 5 10 15 20 25 3010−410−310−210−1100SNR (dB)Outage ProbabilityHARQ−simulationHARQ−anal

Page 287

12.5 Limited feedback centralized relay selection 341rounds of transmission for which the following outage expression can easily be derived:Pout,HARQ=

Page 288 - Figure 10.1 Energy per frame

342 Reliability through relay selection in cooperative networks0 0.2 0.4 0.6 0.8 10123456Multiplexing gain rDiversity gain d(r)DirectDSTC, ORDDFITRS

Page 289

References 343its power resources. Under these conditions, one may use a variation of ITRS, where thesource will retransmit only if all relays have fa

Page 290

20 Short-range wireless communications and reliabilityFigure 1.5 Illustration of a piconet, where the circle represents the PNC. The dashed linesindic

Page 291

344 Reliability through relay selection in cooperative networks[8] R. Pabst, B. Walke, D. Schultz, P. Herhold, H. Yanikomeroglu, S. Mukherjee, H. Visw

Page 292 - 10.2 Energy saving MACs

References 345[28] A. Bletsas and A. Lippman, “Implementing cooperative diversity antenna arrays with com-modity hardware,” IEEE Commun. Mag., vol. 44

Page 293 - Synchronous Asynchronous

346 Reliability through relay selection in cooperative networks[47] Y. Ge, S. Wen, and Y.-H. Ang, “Analysis of optimal relay selection in IEEE 802.16

Page 294

13 Fundamental performance limits inwideband relay architectures¨Ozg¨ur Oyman13.1 IntroductionThe design of large-scale distributed wireless networks

Page 295 - 10.2 Energy saving MACs 279

348 Fundamental performance limits in wideband relay architecturesThe power-limited wideband regime serves a practically relevant mode of operationfor

Page 296 - IEEE 802.11 power save mode

13.1 Introduction 349Option 1:DirectOption 2:DistributedRelaysWWWSourceSourceP/3P/3P/3DestinationDestinationTXPRXTXRXENCENCR2R1DECWDEC^^Figure 13.1 Po

Page 297 - 10.2.1.3 Receiver query

350 Fundamental performance limits in wideband relay architectures1041051061071081010109108107106105104Bandwidth (Hz)Power (W)DirectDistributed Relays

Page 298

13.1 Introduction 351bandwidth is large and the main concern is the limitation on power. Similarly, the caseof C  1 corresponds to the bandwidth-limi

Page 299 - Synchronous Asynchronous

352 Fundamental performance limits in wideband relay architecturesCommunicate in N hops1 2N N+1Range = DD/NFigure 13.4 Linear multihop network model f

Page 300 - 10.2.2.2 Transmitter sweep

13.2 Power–bandwidth tradeoff in serial relay architectures 353N = 4SIMULTANEOUS LINKSPHASE 1PHASE 2Λ = 2Δ = 21 52 3 41 52 3 4Figure 13.5 Linear multi

Page 301 - 10.2 Energy saving MACs 285

1.3 Review of related wireless standards 21include the wireless monitoring of electroencephalogram (EEG), electrocardiogram(ECG), electromyography (EM

Page 302 - 10.2.2.3 Receiver notification

354 Fundamental performance limits in wideband relay architecturestone a narrowband receiver can be employed. We assume that the length of the cyclicp

Page 303 - 10.2 Energy saving MACs 287

13.2 Power–bandwidth tradeoff in serial relay architectures 355block length, i.e., slow fading assumption. Although we assume that each receivingtermi

Page 304 - 10.2.2.4 Comparison

356 Fundamental performance limits in wideband relay architectureshop n = (m − 1) + k. The codeword error probability for transmission m over thekth

Page 305 - 10.3 Summary

13.2 Power–bandwidth tradeoff in serial relay architectures 357andS0=a.slimSNR→02%˙I (SNR)&2−¨I (SNR), (13.3)where˙I and¨I denote the first and sec

Page 306

358 Fundamental performance limits in wideband relay architectures13.2.2.1 Fixed-rate multihop relayingA suboptimal strategy that yields a lower bound

Page 307 - Selected topics for

13.2 Power–bandwidth tradeoff in serial relay architectures 359then μ belongs to one of the three families of extreme-value distributions above[32]. T

Page 308

360 Fundamental performance limits in wideband relay architecturesthe channel-fading parameters through the following relationships:5EbN0min=w.p .1Dp

Page 309 - 11 Cooperative communications

13.2 Power–bandwidth tradeoff in serial relay architectures 3610 0.5 1 1.5 200.10.20.30.40.50.60.70.80.91Cumulative distribution function (CDF)End-to-

Page 310

362 Fundamental performance limits in wideband relay architecturesgains. In other words, our results show that multihop diversity gains remain viableu

Page 311 - 11.1.2 Overview of methods

13.3 Power–bandwidth tradeoff in parallel relay architectures 363Time Slot 1W1WLSLrKtKrktkFK,lyLyly1Ek,LS1S1D1DlDLEk, 1r1F1,lt1Hk,1Hk,LRkRKR1GK,lG1,lT

Page 312

22 Short-range wireless communications and reliabilityPeer-to-peermasterslaveStarBroadcastFigure 1.7 Illustration of the three network topologies supp

Page 313 - 11.2.1 Basic principles

364 Fundamental performance limits in wideband relay architecturesspatio-temporally i.i.d. (i.e., assuming full spatial multiplexing [34] for all mult

Page 314

13.3 Power–bandwidth tradeoff in parallel relay architectures 36513.3.1.3 Coding frameworkFor any block length Q,a({2QRl,m: l = 1,...,L, m = 1,...,Ms}

Page 315 - Broadcast and training

366 Fundamental performance limits in wideband relay architecturesexpressed as Eb/N0= SNR/C(SNR).11In this context, the power–bandwidth tradeoffis bet

Page 316

13.3 Power–bandwidth tradeoff in parallel relay architectures 36713.3.2 Upper-limit on MRN power–bandwidth tradeoffIn this section, we derive an upper

Page 317

368 Fundamental performance limits in wideband relay architecturesS1R1RKSLD1DLSourceterminalscooperateRelay anddestinationterminalscooperateW1W1WL^WL^

Page 318

13.3 Power–bandwidth tradeoff in parallel relay architectures 369as K →∞. Since our application of the cut-set theorem through the broadcast cut leads

Page 319

370 Fundamental performance limits in wideband relay architecturesTable 13.1 Practical LDMRB schemes for multi-user MRNs.Relay link channel matrix MF

Page 320 - 11.2.4 Routing

13.3 Power–bandwidth tradeoff in parallel relay architectures 371bit at a finite spectral efficiency given by C∗≈ 1.15 LMsand consequentlyEbN0LDMRBmin≈(

Page 321

372 Fundamental performance limits in wideband relay architecturesterminal Dlcorresponding to spatial stream sl,mis given byyZFl,m='Kk=1dk,l,m)s

Page 322

13.3 Power–bandwidth tradeoff in parallel relay architectures 373Letting β = PR/PS, we find that SIR-maximizing power allocation (for fixedSNR) is achie

Page 323

1.3 Review of related wireless standards 23I/O deviceGateway,System managerSecurity managerRouting devicecontrolsystemplant networkFigure 1.8 Illustra

Page 324 - 11.3.1 Basic principles

374 Fundamental performance limits in wideband relay architecturesvectors hk,l,m(mth column of Hk,l) to yieldˆsMFk,l,m=8Ek,lAAhk,l,mAA2sl,m+(p,q)=(l

Page 325

13.3 Power–bandwidth tradeoff in parallel relay architectures 375Eb/N0analysis of the ZF-LDMRB scheme. We apply the same steps as in theproof of (13.2

Page 326

376 Fundamental performance limits in wideband relay architecturessince the signal power grows faster than the interference power as K →∞. Thus,while

Page 327 - 11.3.2.2 Network flooding

13.3 Power–bandwidth tradeoff in parallel relay architectures 377for an MRN under the slow fading (non-ergodic) channel model [31] and thus,our asympt

Page 328 - 11.3.3.2 Rayleigh fading

378 Fundamental performance limits in wideband relay architecturesthough SNR  1, the SIR for each stream in (13.21) simplifies to (note the additional

Page 329

13.3 Power–bandwidth tradeoff in parallel relay architectures 379scheme based on the ZF algorithm and compare with the performance under directtransmi

Page 330 - 11.3.3.3 Shadowing

10−210−110010110210310400.10.20.30.40.50.60.70.80.91SIR per streamCDFDirectLDMRBIncreasing K = 1,2,4,8,16 Figure 13.9 CDF of SIR for direct transmissi

Page 331

13.3 Power–bandwidth tradeoff in parallel relay architectures 3810 2 4 6 8 10 12 14 16 1810−210−1100101102103104105Eb/N0Spectral efficiency (b/s/Hz)ZF

Page 332

382 Fundamental performance limits in wideband relay architectures10−310−210−110010110−1100101102103104Spectral efficiency (b/s/Hz)Eb/N0cutset bound 0

Page 333 - 11.3.3.6 Performance bounds

References 383(K−1rather than K−1/2) is achievable with LDMRB compared to previous work inreference [18] and we verify the optimality of the K−1energy

Page 335 - 11.3.4.1 System model

24 Short-range wireless communications and reliabilitySlottedhoppingSlowhoppingtimeChannelsFigure 1.9 Illustration of the hybrid channel hopping opera

Page 336

384 Fundamental performance limits in wideband relay architectures[15] G. Caire and S. Shamai, “On the achievable throughput of a multiantenna Gaussia

Page 337 -  2008 IEEE) [4]

References 385[35] T. M. Cover and J. A. Thomas, Elements of Information Theory,NewYork,NY,JohnWiley,1991.[36] R. J. Serfling, Approximation Theorems o

Page 338

14 Reliable MAC layer andpacket schedulingUlas C. KozatMedium access control (MAC) is of paramount importance in wireless systems: itorchestrates how

Page 339 - References 323

14.1 Introduction 387channels at what time. Therefore, it directly impacts the access delays, the success oftransmissions, as well as the achievable c

Page 340

388 Reliable MAC layer and packet schedulingtransmission rates at the PHY layer possible at the same reliability level. The latterbenefit is achieved b

Page 341 - References 325

14.2 Opportunistic scheduling/multiuser diversity 389Time (slot number)Rate (Kbps)Figure 14.1 Representation of how channel rates fluctuate over time,

Page 342 - 12.1 Introduction

390 Reliable MAC layer and packet schedulingapproach and instead, directly start from a utility maximization problem to find out theappropriate schedul

Page 343

14.2 Opportunistic scheduling/multiuser diversity 391ABCDXYZWGFigure 14.2 Scheduling multiple multicast groups.14.2.2 Multicast caseUnlike in the unic

Page 344

392 Reliable MAC layer and packet schedulingBlock-1 Block-2 Block-3 Block-4 Block-5 Block-6R[1]Slot-1 Slot-2 Slot-3R[2]R[3]A, B, D A, B, CB, DFigure 1

Page 345

14.2 Opportunistic scheduling/multiuser diversity 3931 2 3 4 5 6 7 8 9 1000.511.522.53Normalized throughputNumber of targeted usersI.I.D. Rayleigh fad

Page 346

References 25[12] A. M. Kuzminsky and H. R. Karimi, “Multiple-antenna interference cancellation for WLANwith MAC interference avoidance in open access

Page 347

394 Reliable MAC layer and packet schedulingSimilar to the unicast case, it is also possible to define the PFS rule for single andmultiple multicast gr

Page 348

14.3 Coding and scheduling 395a repeat request is sent back to the sender using negative acknowledgement (NACK). Ifno error is detected, a positive ac

Page 349

396 Reliable MAC layer and packet schedulingWGP1 P2 P3ABCP2P3ABCP1P3P1P2P:=XOR(P1,P2,P3)PFigure 14.5 Coding and scheduling can be used together efficie

Page 350

14.3 Coding and scheduling 397Block-1 Block-2 Block-3 Block-lOriginal Source BlocksErasureEncoderEncodingBlock-1EncodingBlock-2EncodingBlock-3Encoding

Page 351

398 Reliable MAC layer and packet schedulingblocks [17]. As opposed to fixed-rate codes, a rateless code can generate as manyencoding blocks as needed

Page 352

14.3 Coding and scheduling 399is to focus on the user orderings and channel conditions that makes it possible tocompletely characterize the distributi

Page 353

400 Reliable MAC layer and packet scheduling1 2 3 4 5 6 7 8 9 1000.10.20.30.40.50.60.70.80.911.11.21.31.41.51.61.71.81.92Normalized throughputNumber o

Page 354

14.4 Media quality driven scheduling 401further processing. Some relatively recent coding techniques [17] achieve the minimumpossible recovery time fo

Page 355

402 Reliable MAC layer and packet schedulingScheduling and medium access layer have a unique role in the communication stackssince they make the ultim

Page 356 - Outage Probability

14.4 Media quality driven scheduling 403no gap between throughput and goodput. Nonetheless, when we operate over finiteframe lengths or under non-i.i.d

Page 357 - 12.5.2 DMT analysis

26 Short-range wireless communications and reliability[30] “Bluetooth SIG.” [Online]. Available: http://www.bluetooth.org[31] IEEE standard for inform

Page 358

404 Reliable MAC layer and packet scheduling14.5 SummaryIn this chapter we have covered reliability from the perspective of the scheduling layer.Relia

Page 359 - 12.6 Summary

References 405[8] H. J. Kushner and P. A. Whiting, “Convergence of proportional-fair sharing algorithmsunder general conditions,” IEEE Trans. on Wirel

Page 360

406 Reliable MAC layer and packet scheduling[28] M. Sharif and B. Hassibi, “A delay analysis for opportunistic transmission in fading broadcastchannel

Page 361 - References 345

Index60 GHz radio, 31achievable region, 249ACI, 223ACK, 98, 110active RFID, 163adaptive modulation and coding, see AMCadditive white Gaussian noise (A

Page 362

408 IndexDCM, 37, 96decode-and-forward, 298, 333, 334, 336, 342decorrelator, 196deinterleaver, 203differential QPSK (DQPSK), 154differential quadratur

Page 363 - 13.1 Introduction

Index 409ISA SP-100 standard, 16ISI, 194, 222ISM band, 6iterative MUD, 202knapsack problem, 336Kolmogorov condition, 368L-MMSE, 369Laplacian distribut

Page 364

410 Indexpseudo-chaotic time-hopping, 210pulse discarding detector, 196pulse repetition frequency, see PRFquantization of feedback, 298quasi-decorrela

Page 365 - Distributed

Index 411video, 401virtual beamforming, 295–299, 304, 308–310virtual branch analysis, 302visible light communication (VLC), 22wake-up interval, 276, 2

Page 366 - Distributed Relays?

References 27for high-rate wireless personal area networks (WPANs),” Sep. 2003. [Online]. Available:http://standards.ieee.org/getieee802/download/802.

Page 368 - Range = D

Part IHigh-rate systems

Page 370

2 High-rate UWB and 60 GHzcommunicationsSinan Gezici and Ismail GuvencIn this chapter, two technologies for high data-rate communications systems for

Page 371 - 13.2.1.3 Coding framework

32 High-rate UWB and 60 GHz communications100101−80−75−70−65−60−55−50−45−40Frequency (GHz)EIRP Emission Level (dBm) 0 961.611.993.1 10.6Figure 2.1 FC

Page 372

2.1 Overview and application scenarios 33Figure 2.2 A commercial wireless USB product.The frequency spectrum from 57 GHz to 64 GHz is allocated for MM

Page 373

Reliable Communications forShort-range Wireless SystemsEdited byISMAIL GUVENCDOCOMO C ommunications Laboratories USA, Inc.SINAN GEZICIBilkent Universi

Page 374

34 High-rate UWB and 60 GHz communicationsFigure 2.3 Wireless transfer of HD video/audio from a DVD player to an HDTV, and from alaptop to a projector

Page 375

2.2 ECMA-368 high-rate UWB standard 35Table 2.1 Allocation of frequency bands in the ECMA-368 standard.Band index Center frequency (GHz) Band group1 3

Page 376

36 High-rate UWB and 60 GHz communicationsTable 2.2 Seven TFCs for band group 1 [2].TFC-1123123TFC-2132132TFC-3112233TFC-4113322TFC-5111111TFC-6222222

Page 377 -  2008 IEEE [26])

2.2 ECMA-368 high-rate UWB standard 37Figure 2.5 Basic blocks of an MB-OFDM UWB transmitter according to the ECMA-368 [2].the rate 1/3 convolutional e

Page 378 - 13.3.1.1 General assumptions

38 High-rate UWB and 60 GHz communicationswhere Tsis the symbol length, Nsis the number of symbols in the packet, si(t)isthecomplex baseband signal re

Page 379 -  2007 IEEE [27])

2.2 ECMA-368 high-rate UWB standard 39Table 2.3 Various data rate options and corresponding parameters in the ECMA-368 standard [2].Data rate (Mbps) M

Page 380

40 High-rate UWB and 60 GHz communicationsTable 2.4 Systems parameters for the MB-OFDM UWB transmitter accordingto the ECMA-368 standard [2].Parameter

Page 381 - 13.3.1.3 Coding framework

2.3 ECMA-387 millimeter-wave radio standard 41Table 2.5 Band allocation in ECMA 387 [17].Band ID Channel bonding fL(GHz) fC(GHz) fU(GHz)1 No 57.24 58.

Page 382

42 High-rate UWB and 60 GHz communicationsTable 2.7 Transmit spectral mask requirements in ECMA-387 for Type A, Type B, andType C devices (in MHz) [17

Page 383

2.3 ECMA-387 millimeter-wave radio standard 43Figure 2.7 Block diagram of the SCBT PHY baseband of Type A devices in ECMA-387 (withEEP) [17].at the ce

Page 384

CAMBRIDGE UNIVERSITY PRESSCambridge, New York, Melbourne, Madrid, Cape Town,Singapore, S˜ao Paulo, Delhi, Tokyo, Mexico CityCambridge University Press

Page 385

44 High-rate UWB and 60 GHz communicationsFigure 2.8 Constellation of QPSK modulation with (a) EEP, and (b) UEP.Figure 2.9 An example of the SCBT symb

Page 386

2.3 ECMA-387 millimeter-wave radio standard 45Figure 2.10 Block diagram of the OFDM PHY baseband of Type A devices in ECMA-387 [17].NCP∈{0, 32, 64, 96

Page 387

46 High-rate UWB and 60 GHz communicationsFigure 2.11 An example for SC symbol structure.symbols are mapped onto separate subcarriers, all of the modu

Page 388

2.3 ECMA-387 millimeter-wave radio standard 47Figure 2.12 Encoding and mapping for DAMI devices [17].Figure 2.13 Encoding procedure for Type C devices

Page 389

48 High-rate UWB and 60 GHz communicationsunified way as follows [17]sRF(t) = ReNf−1n=0snt − nTsymexp( j2π fct), (2.11)where Re{.} captures the re

Page 390

2.3 ECMA-387 millimeter-wave radio standard 49Table 2.8 Discovery modes with different data rates [17].Mode NDISCREPData rate (Mbps)D0 128 2.255D1 64

Page 391

50 High-rate UWB and 60 GHz communicationsTable 2.9 Mode dependent parameters for Type A devices [17].Base data rate (Gbps)Mode NB= 1 NB= 2 NB= 3 NB=

Page 392 - The fact that SIR

2.3 ECMA-387 millimeter-wave radio standard 51Table 2.10 Mode-dependent parameters for Type B devices [17].Base data rate (Gbps)Mode NB= 1 NB= 2 NB= 3

Page 393

52 High-rate UWB and 60 GHz communicationsTable 2.12 Timing-related parameters for SCBTs of Type A devices, and SC transmissions of Type B andType C d

Page 394 - 13.3.4 Numerical results

2.4 IEEE 802.15.3c millimeter-wave radio standard 53Table 2.14 Frame-related parameters for ECMA-387 transmissions (all time units in nanoseconds) [17

Page 395

ContentsList of contributors page xi1 Short-range wireless communications and reliability 1Ismail Guvenc, Sinan Gezici, Zafer Sahinoglu, and Ulas C. K

Page 396 - Increasing K = 1,2,4,8,16

54 High-rate UWB and 60 GHz communicationsf1= 0.94 GHz, f2= 1.1 GHz, f3= 1.6 GHz, and f4= 2.2 GHz. For OOK transmis-sions, up to 40 dB transmission po

Page 397

2.4 IEEE 802.15.3c millimeter-wave radio standard 55Table 2.15 MCS dependent parameters for SC PHY MCS [18].Data rate Data rateMCS MCS (Mbps), (Mbps),

Page 398 - 13.3.5 Section summary

56 High-rate UWB and 60 GHz communicationsFigure 2.15 General transmitter structure for SC PHY in IEEE 802.15.3c [18].Table 2.16 MCS-dependent paramet

Page 399

2.4 IEEE 802.15.3c millimeter-wave radio standard 57Figure 2.16 General transmitter structure for HSI PHY in IEEE 802.15.3c [18].is composed of eight

Page 400

58 High-rate UWB and 60 GHz communicationsTable 2.17 MCS-dependent parameters for AV PHY (HRP) [18].Inner code rate CodingMCS Data rate Modulationinde

Page 401 - References 385

References 59Figure 2.18 General transmitter structure for AV PHY in IEEE 802.15.3c (LRP) [18].bit interleaving is applied. The output bit sequence is

Page 402 - 14 Reliable MAC layer and

60 High-rate UWB and 60 GHz communications[12] N. Guo, R. C. Qiu, S. S. Mo, and K. Takahashi, “60-GHz millimeter-wave radio: Principle,technology, and

Page 403 - 14.1 Introduction 387

3 Channel estimation forhigh-rate systemsZhongjun Wang, Yan Xin, and Xiaodong WangIn this chapter, we consider the channel estimation issue in orthogo

Page 404

62 Channel estimation for high-rate systemsFor example, application requirements and channel environments may become equallyaccountable for properly s

Page 405 - Rate (Kbps)

3.1 Channel models for high-rate systems 63wireless propagation channel. It can be evaluated by the ratio of the transmitted power Ptto the received p

Page 406

vi Contents2.4 IEEE 802.15.3c millimeter-wave radio standard 532.4.1 Single-carrier PHY 552.4.2 High-speed interface PHY 562.4.3 Audio/visual PHY 573

Page 407 - 14.2.2 Multicast case

64 Channel estimation for high-rate systemsVariation in received signal power due to multipath occurs over very short distances,on the order of the si

Page 408

3.1 Channel models for high-rate systems 65MPCsRelative Power of MPCsTo A¯AoA0σθ1/Cluster 0Cluster 1Cluster LFigure 3.1 Illustration of clustered MPCs

Page 409 - Number of targeted users

66 Channel estimation for high-rate systemsIn the angular domain, on the other hand, the conditional distribution of lgiven l−1(or p(l|l−1)forl &g

Page 410 - 14.3 Coding and scheduling

3.1 Channel models for high-rate systems 67Correspondingly, the root-mean-square (RMS) delay spread that is defined as the squareroot of the second cen

Page 411 - 14.3.1.2 Network coding

68 Channel estimation for high-rate systemsTable 3.1 Multipath characteristics for UWB channel modeling providedby the IEEE 802.15.3 Study Group 3a [5

Page 412 - P:=XOR(P1,P2,P3)

3.1 Channel models for high-rate systems 69where NG=GτQ−1+ 0.5 and G is a sufficiently large integer. A rule of thumb forchoosing G is to ensure that

Page 413 - 14.3.2 Multicast case

70 Channel estimation for high-rate systemsFrequencyFrequencyTimeTimeBlock-type Pilot ArrangementComb-type Pilot ArrangementDataPilotFigure 3.2 Block-

Page 414

3.2 Review of channel estimation techniques 71use of pilots, for achieving high spectral efficiency. This is achieved at the cost of higherimplementati

Page 415

72 Channel estimation for high-rate systems1716151413121195010876431OFDM SymbolsMFrame Header12 OFDM Symbols6 OFDM SymbolsSequencedaolyaP emarFgniniar

Page 416

3.2 Review of channel estimation techniques 7361 7372686766636258575621 1270 IndexSubcarrierGuard TonesData TonesNullData Tones Guard TonesDC. . ..

Page 417

Contents vii5 MIMO techniques for high-rate communications 113Wasim Q. Malik and Andr´e Pollok5.1 Principles of MIMO systems 1135.2 MIMO for ultrawide

Page 418

74 Channel estimation for high-rate systemswhere [·]∗denotes complex conjugation. Such a spreading maximizes frequency diver-sity by transmitting the

Page 419

3.2 Review of channel estimation techniques 75data-subcarrier-related subsets of Yn, H, and Vn, respectively, i.e.,ˇYn= [Yn(N −R0), Yn(N −R0+1),...,Yn

Page 420 - 14.5 Summary

76 Channel estimation for high-rate systems3.2.3 LMMSE channel frequency response estimatorThe LMMSE is based on the Bayesian approach to statistical

Page 421 - References 405

3.2 Review of channel estimation techniques 77where U is a unitary matrix containing the singular vectors, and Λ is a diagonal matrixcontaining the si

Page 422

78 Channel estimation for high-rate systemsrequired complexity becomes necessary in the actual implementation of a low-rankLMMSE estimator.3.2.4 ML ch

Page 423

3.2 Review of channel estimation techniques 79residual error in the initial LS estimate can be further reduced in time-domain as longas Nmis selected

Page 424 - 408 Index

80 Channel estimation for high-rate systemswhere CRis the R-point DCT matrix and WRis an R × R matrix with the formWR=⎛⎜⎜⎜⎝INm0 ··· 000··· 0...

Page 425 - Index 409

3.2 Review of channel estimation techniques 81In the second step, we apply a simple frequency domain smoothing operation toˆH1and obtainˆH2asˆH2(k) =

Page 426 - 410 Index

82 Channel estimation for high-rate systems00.050.10102001SNR (dB)(a) CM1αhR1,2mse (dB)00.050.10102001SNR (dB)(b) CM2αhR1,2mse (dB)00.050.1−5051001SNR

Page 427 - Index 411

3.2 Review of channel estimation techniques 83ˆSn(k) = c[ˆun(k) + j ˆvn(k)], where c =√2/2 andˆun(k), ˆvn(k) ∈{+1, −1}. Thus, from(3.12) and (3.13),ˆu

Comments to this Manuals

No comments