• Title/Summary/Keyword: IEEE802.11a

Search Result 1,111, Processing Time 0.026 seconds

Receive Diversity for OFDM Systems with Cochannel Interference (동일 채널 간섭을 고려한 OFDM 시스템의 수신 다이버시티 기법)

  • Seo Bo-Seok
    • Journal of Broadcast Engineering
    • /
    • v.11 no.2 s.31
    • /
    • pp.222-228
    • /
    • 2006
  • In this paper, we propose a receive diversity method for orthogonal frequency division multiplexing (OFDM) systems with cochannel interference. In the method, combining is done in the frequency domain by using the subcarrier based maximum ratio combining (MRC) method. For MRC, we exploit the power of cochannel interference as well as the power of channel noise. The accuracy of the power estimate of interference plus noise is enhanced by averaging the initial estimates over the correlated subchannels where the coherency between the subchannel gains comes from the limited delay spread of the channel. Simulation results show that the proposed method yields 2-3.5dB gain of signal to noise ratio compared to the conventional MRC method and less than 1 dB difference to the ideal case.

Throughput Performance analysis of AMC based on New SNR Estimation Algorithm using Preamble (프리앰블을 이용한 새로운 SNR 추정 알고리즘 기반의 AMC 기법의 전송률 성능 분석)

  • Seo, Chang-Woo;Portugal, Sherlie;Hwang, In-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.6-14
    • /
    • 2011
  • The fast growing of the number of users requires the development of reliable communication systems able to provide higher data rates. In order to meet those requirements, techniques such as Multiple Input Multiple Out (MIMO) and Orthogonal Frequency Division multiplexing (OFDM) have been developed in the recent years. In order to combine the benefits of both techniques, the research activity is currently focused on MIMO-OFDM systems. In addition, for a fast wireless channel environment, the data rate and reliability can be optimized by setting the modulation and coding adaptively according to the channel conditions; and using sub-carrier frequency, and power allocation techniques. Depending on how accurate the feedback-based system obtain the channel state information (CSI) and feed it back to the transmitter without delay, the overall system performance would be poor or optimal. In this paper, we propose a Signal to Noise Ratio (SNR) estimation algorithm where the preamble is known for both sides of the transciever. Through simulations made over several channel environments, we prove that our proposed SNR estimation algorithm is more accurate compared with the traditional SNR estimation. Also, We applied AMC on several channel environments using the parameters of IEEE 802.11n, and compared the Throughput performance when using each of the different SNR Estimation Algorithms. The results obtained in the simulation confirm that the proposed algorithm produces the highest Throughput performance.

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation (가시광 통신에서 성능 저하 없는 보안 인코딩 연구)

  • Kim, Minchul;Suh, Taeweon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.

MAC Schemes for Best Effort Service in Wireless MAN: Design and Performance Analysis (무선 MAN에서 Best Effort 서비스를 위한 MAC 방식의 설계 및 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.128-140
    • /
    • 2006
  • In the IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple services. Among the service classes supported between the base station and subscriber stations in the wireless MAN, the best effort service class is ranked on the lowest position in priority and is assisted by a MAC scheme based on reservation ALOHA. The wireless MAN standard, however, does not reveal every detail of the MAC scheme but only describes the skeleton of the MAC scheme. Focusing on the amount of resource that a subscriber demands by a request and the amount of resource that the base grants to a request we thus present a number of resource demand rules and resource grant rules. Also, we construct a candidate MAC scheme by implanting a pair of resource demand and grant rules into the skeleton of the MAC scheme. Meanwhile a difficult situation for the best effort service is expected wherein only scarce resource is available after most of the resource is already preempted by other services. Perceiving such a situation, we evaluate the throughput and delay performance of each candidate MAC scheme. Especially we develop an analytical method to approximately calculate the throughput in the saturated environment. From the numerical results, we observe that the candidate MAC scheme which adopts the non-gated exhaustive demand rule paired with the full grant rule attains superior performance at the expense of the fairness.

CE-OLSR: a Cartography and Stability Enhanced OLSR for Dynamic MANETs with Obstacles

  • Belghith, Abdelfettah;Belhassen, Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.270-286
    • /
    • 2012
  • In this paper, we propose a novel routing protocol called the Cartography Enhanced OLSR (CE-OLSR) for multi hop mobile ad hoc networks (multi hop MANETs). CE-OLSR is based on an efficient cartography gathering scheme and a stability routing approach. The cartography gathering scheme is non intrusive and uses the exact OLSR reduced signaling traffic, but in a more elegant and efficient way to improve responsiveness to the network dynamics. This cartography is a much richer and accurate view than the mere network topology gathered and used by OLSR. The stability routing approach uses a reduced view of the collected cartography that only includes links not exceeding a certain distance threshold and do not cross obstacles. In urban environments, IEEE 802.11 radio signals undergo severe radio shadowing and fading effects and may be completely obstructed by obstacles such as buildings. Extensive simulations are conducted to study the performances of CE-OLSR and compare them with those of OLSR. We show that CE-OLSR greatly outperforms OLSR in delivering a high percentage of route validity, a much higher throughput and a much lower average delay. In particular the extremely low average delay exacerbated by CE-OLSR makes it a viable candidate for the transport of real time data traffic in multi hop MANETs.

Adaptive Parameter Estimation Method for Wireless Localization Using RSSI Measurements

  • Cho, Hyun-Hun;Lee, Rak-Hee;Park, Joon-Goo
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.6
    • /
    • pp.883-887
    • /
    • 2011
  • Location-based service (LBS) is becoming an important part of the information technology (IT) business. Localization is a core technology for LBS because LBS is based on the position of each device or user. In case of outdoor, GPS - which is used to determine the position of a moving user - is the dominant technology. As satellite signal cannot reach indoor, GPS cannot be used in indoor environment. Therefore, research and study about indoor localization technology, which has the same accuracy as an outdoor GPS, is needed for "seamless LBS". For indoor localization, we consider the IEEE802.11 WLAN environment. Generally, received signal strength indicator (RSSI) is used to obtain a specific position of the user under the WLAN environment. RSSI has a characteristic that is decreased over distance. To use RSSI at indoor localization, a mathematical model of RSSI, which reflects its characteristic, is used. However, this RSSI of the mathematical model is different from a real RSSI, which, in reality, has a sensitive parameter that is much affected by the propagation environment. This difference causes the occurrence of localization error. Thus, it is necessary to set a proper RSSI model in order to obtain an accurate localization result. We propose a method in which the parameters of the propagation environment are determined using only RSSI measurements obtained during localization.

Sampling Jitter Effect on a Reconfigurable Digital IF Transceiver to WiMAX and HSDPA

  • Yu, Bong-Guk;Lee, Jae-Kwon;Kim, Jin-Up;Lim, Kyu-Tae
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.326-334
    • /
    • 2011
  • This paper outlines the time jitter effect of a sampling clock on a software-defined radio technology-based digital intermediate frequency (IF) transceiver for a mobile communication base station. The implemented digital IF transceiver is reconfigurable to high-speed data packet access (HSDPA) and three bandwidth profiles: 1.75 MHz, 3.5 MHz, and 7 MHz, each incorporating the IEEE 802.16d worldwide interoperability for microwave access (WiMAX) standard. This paper examines the relationship between the signal-to-noise ratio (SNR) characteristics of a digital IF transceiver with an under-sampling scheme and the sampling jitter effect on a multichannel orthogonal frequency-division multiplexing (OFDM) signal. The simulation and experimental results show that the SNR of the OFDM system with narrower band profiles is more susceptible to sampling clock jitter than systems with relatively wider band profiles. Further, for systems with a comparable bandwidth, HSDPA outperforms WiMAX, for example, a 5 dB error vector magnitude improvement at 15 picoseconds time jitter for a bandwidth of WiMAX 3.5 MHz profile.

Enhancing Location Estimation and Reducing Computation using Adaptive Zone Based K-NNSS Algorithm

  • Song, Sung-Hak;Lee, Chang-Hoon;Park, Ju-Hyun;Koo, Kyo-Jun;Kim, Jong-Kook;Park, Jong-Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.119-133
    • /
    • 2009
  • The purpose of this research is to accurately estimate the location of a device using the received signal strength indicator (RSSI) of IEEE 802.11 WLAN for location tracking in indoor environments. For the location estimation method, we adopted the calibration model. By applying the Adaptive Zone Based K-NNSS (AZ-NNSS) algorithm, which considers the velocity of devices, this paper presents a 9% improvement of accuracy compared to the existing K-NNSS-based research, with 37% of the K-NNSS computation load. The accuracy is further enhanced by using a Kalman filter; the improvement was about 24%. This research also shows the level of accuracy that can be achieved by replacing a subset of the calibration data with values computed by a numerical equation, and suggests a reasonable number of calibration points. In addition, we use both the mean error distance (MED) and hit ratio to evaluate the accuracy of location estimation, while avoiding a biased comparison.

  • PDF

A Channel State Information Feedback Method for Massive MIMO-OFDM

  • Kudo, Riichi;Armour, Simon M.D.;McGeehan, Joe P.;Mizoguchi, Masato
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.352-361
    • /
    • 2013
  • Combining multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) with a massive number of transmit antennas (massive MIMO-OFDM) is an attractive way of increasing the spectrum efficiency or reducing the transmission energy per bit. The effectiveness of Massive MIMO-OFDM is strongly affected by the channel state information (CSI) estimation method used. The overheads of training frame transmission and CSI feedback decrease multiple access channel (MAC) efficiency and increase the CSI estimation cost at a user station (STA). This paper proposes a CSI estimation scheme that reduces the training frame length by using a novel pilot design and a novel unitary matrix feedback method. The proposed pilot design and unitary matrix feedback enable the access point (AP) to estimate the CSI of the signal space of all transmit antennas using a small number of training frames. Simulations in an IEEE 802.11n channel verify the attractive transmission performance of the proposed methods.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.