首页 > 最新文献

2009 IEEE Wireless Communications and Networking Conference最新文献

英文 中文
Adaptive Sequence Detection for MPSK/MQAM with Unknown Carrier Phase Characteristics 未知载波相位特征的MPSK/MQAM自适应序列检测
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917563
Yan Li, P. Kam, Chee-Cheon Chui
In [1], we developed a Viterbi algorithm for efficient detection of M-ary phase-shift keyed (MPSK) sequences received over the additive, white, Gaussian noise (AWGN) channel with an unknown carrier phase. Its performance approaches that of coherent detection, but the observation interval for forming the decision metric is fixed and chosen based on prior statistical knowledge of the carrier phase characteristics. Thus, the metric is non-adaptive, and cannot be optimized when a priori statistical knowledge of the carrier phase is not available. The work here renders it adaptive by developing a recursive metric that is adapted on-line based on the received signal, without prior knowledge of the carrier phase characteristics. An adaptive filter is used to generate the phasor reference on-line, by extending that in [2] to sequence detection for general M-ary quadrature amplitude modulation (MQAM). Comparison between the proposed adaptive, recursive metric and those in the literature is provided. Simulation results using a random-walk carrier phase model show the superior performance of the adaptive sequence detector over the original nonadaptive sequence detector of [1].
在[1]中,我们开发了一种Viterbi算法,用于有效检测通过未知载波相位的加性高斯白噪声(AWGN)信道接收的M-ary相移键控(MPSK)序列。它的性能接近相干检测,但形成决策度量的观测间隔是固定的,并且是基于对载波相位特性的先验统计知识选择的。因此,度量是非自适应的,并且不能在载波相位的先验统计知识不可用时进行优化。这里的工作通过开发一种递归度量来实现自适应,该度量基于接收到的信号在线调整,而无需事先了解载波相位特性。通过将[2]中的相量参考扩展到一般M-ary正交调幅(MQAM)的序列检测,采用自适应滤波器在线生成相量参考。提出的自适应递归度量与文献中的度量进行了比较。采用随机行走载波相位模型的仿真结果表明,自适应序列检测器的性能优于原始的[1]非自适应序列检测器。
{"title":"Adaptive Sequence Detection for MPSK/MQAM with Unknown Carrier Phase Characteristics","authors":"Yan Li, P. Kam, Chee-Cheon Chui","doi":"10.1109/WCNC.2009.4917563","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917563","url":null,"abstract":"In [1], we developed a Viterbi algorithm for efficient detection of M-ary phase-shift keyed (MPSK) sequences received over the additive, white, Gaussian noise (AWGN) channel with an unknown carrier phase. Its performance approaches that of coherent detection, but the observation interval for forming the decision metric is fixed and chosen based on prior statistical knowledge of the carrier phase characteristics. Thus, the metric is non-adaptive, and cannot be optimized when a priori statistical knowledge of the carrier phase is not available. The work here renders it adaptive by developing a recursive metric that is adapted on-line based on the received signal, without prior knowledge of the carrier phase characteristics. An adaptive filter is used to generate the phasor reference on-line, by extending that in [2] to sequence detection for general M-ary quadrature amplitude modulation (MQAM). Comparison between the proposed adaptive, recursive metric and those in the literature is provided. Simulation results using a random-walk carrier phase model show the superior performance of the adaptive sequence detector over the original nonadaptive sequence detector of [1].","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"123 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prioritized Spectrum Sensing in Cognitive Radio Based on Spatiotemporal Statistical Fusion 基于时空统计融合的认知无线电频谱优先感知
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917920
Xiaoyu Wang, A. Wong, P. Ho
In this paper, a novel statistics-driven spectrum sensing algorithm is developed for improving spectrum sensing efficiency in the media access control (MAC) layer of cognitive radio (CR) systems. The proposed algorithm aims to achieve higher spectrum sensing efficiency and spectrum access opportunity by prioritizing channels for fine sensing based on the statistical likelihood of channel availability. The sensing priority is obtained by jointly exploiting the long-term spatiotemporal statistics recorded from the historical result of fine sensing, the short-term statistical information of channel condition obtained from a small-scale observation window, and the instantaneous statistical information obtained from fast sensing. Simulation results show that the proposed prioritization algorithm can achieve improved data transmission rates and reduced missed spectrum access opportunities when compared to the conventional nonprioritization spectrum sensing approach for situations where cooperative spectrum sensing is not suitable.
为了提高认知无线电(CR)系统中媒体访问控制(MAC)层的频谱感知效率,提出了一种统计驱动的频谱感知算法。该算法基于信道可用性的统计似然对精细感知信道进行优先级排序,从而获得更高的频谱感知效率和频谱访问机会。通过综合利用精细感知历史结果记录的长期时空统计信息、小尺度观测窗口获得的通道状况短期统计信息和快速感知获得的瞬时统计信息,获得感知优先级。仿真结果表明,在不适合协同频谱感知的情况下,与传统的非优先级频谱感知方法相比,所提出的优先级算法可以提高数据传输速率,减少错过的频谱接入机会。
{"title":"Prioritized Spectrum Sensing in Cognitive Radio Based on Spatiotemporal Statistical Fusion","authors":"Xiaoyu Wang, A. Wong, P. Ho","doi":"10.1109/WCNC.2009.4917920","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917920","url":null,"abstract":"In this paper, a novel statistics-driven spectrum sensing algorithm is developed for improving spectrum sensing efficiency in the media access control (MAC) layer of cognitive radio (CR) systems. The proposed algorithm aims to achieve higher spectrum sensing efficiency and spectrum access opportunity by prioritizing channels for fine sensing based on the statistical likelihood of channel availability. The sensing priority is obtained by jointly exploiting the long-term spatiotemporal statistics recorded from the historical result of fine sensing, the short-term statistical information of channel condition obtained from a small-scale observation window, and the instantaneous statistical information obtained from fast sensing. Simulation results show that the proposed prioritization algorithm can achieve improved data transmission rates and reduced missed spectrum access opportunities when compared to the conventional nonprioritization spectrum sensing approach for situations where cooperative spectrum sensing is not suitable.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Distributed Algorithm for Localization Error Detection-Correction, Use in In-Network Faulty Reading Detection: Applicability in Long-Thin Wireless Sensor Networks 一种分布式定位纠错算法,用于网络内错误读取检测:在长-薄无线传感器网络中的适用性
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917497
Debraj De
In near future, wireless sensors networks (WSN) are expected to be deployed for a vast variety of applications. For many of these applications, sensed data individually have no meaning without proper knowledge of position where the data was sensed. Although there have been proposed algorithms for localization, many of them fall short with respect to complexity, cost, security and accuracy. Some issues that still hinder the efficiency of available localization techniques are multi-path propagation, security attack (internal and external attack by faulty or malicious nodes), and sometimes specific network topologies. For example, the Long-Thin (LT) topology of WSN is highly prone to localization error due to its special distribution pattern. In many real world WSN applications, the localization is also needed to be Global Positioning Systems (GPS) free. Apart from efficient localization, another important operation in WSN application is the need to have in-network detection of faulty sensor readings, without compromising detection of important events. Looking at these critically important operations of WSN, our first contribution is proposing a self-organized distributed GPS free localization error detection and correction algorithm. Our next contribution is utilizing reliability gained in the proposed localization to construct an improved algorithm for in-network detection of faulty readings. We have also proposed a fault tolerant structure for Long-Thin (LT) WSN topology, that can well utilize both of the proposed algorithms.
在不久的将来,无线传感器网络(WSN)有望广泛应用于各种应用。对于许多这样的应用程序,如果不正确地了解数据被感测的位置,单独感测的数据就没有意义。虽然已经提出了定位算法,但许多算法在复杂性、成本、安全性和准确性方面都存在不足。仍然阻碍可用定位技术效率的一些问题是多路径传播、安全攻击(由错误或恶意节点进行的内部和外部攻击),以及有时特定的网络拓扑。例如,无线传感器网络的长-薄(LT)拓扑结构由于其特殊的分布模式,极易产生定位误差。在现实世界的许多无线传感器网络应用中,也需要不使用全球定位系统(GPS)进行定位。除了高效的定位之外,WSN应用中的另一个重要操作是需要在不影响重要事件检测的情况下对故障传感器读数进行网络检测。考虑到WSN的这些至关重要的操作,我们的第一个贡献是提出一种自组织的分布式无GPS定位错误检测和校正算法。我们的下一个贡献是利用在提出的定位中获得的可靠性来构建一个改进的算法,用于网络内检测错误读数。我们还提出了一种长瘦(LT) WSN拓扑的容错结构,可以很好地利用这两种算法。
{"title":"A Distributed Algorithm for Localization Error Detection-Correction, Use in In-Network Faulty Reading Detection: Applicability in Long-Thin Wireless Sensor Networks","authors":"Debraj De","doi":"10.1109/WCNC.2009.4917497","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917497","url":null,"abstract":"In near future, wireless sensors networks (WSN) are expected to be deployed for a vast variety of applications. For many of these applications, sensed data individually have no meaning without proper knowledge of position where the data was sensed. Although there have been proposed algorithms for localization, many of them fall short with respect to complexity, cost, security and accuracy. Some issues that still hinder the efficiency of available localization techniques are multi-path propagation, security attack (internal and external attack by faulty or malicious nodes), and sometimes specific network topologies. For example, the Long-Thin (LT) topology of WSN is highly prone to localization error due to its special distribution pattern. In many real world WSN applications, the localization is also needed to be Global Positioning Systems (GPS) free. Apart from efficient localization, another important operation in WSN application is the need to have in-network detection of faulty sensor readings, without compromising detection of important events. Looking at these critically important operations of WSN, our first contribution is proposing a self-organized distributed GPS free localization error detection and correction algorithm. Our next contribution is utilizing reliability gained in the proposed localization to construct an improved algorithm for in-network detection of faulty readings. We have also proposed a fault tolerant structure for Long-Thin (LT) WSN topology, that can well utilize both of the proposed algorithms.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Analysis of RFID Mutual Authentication Protocols RFID互认证协议分析
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917595
C. R. Guo
In order to secure RFID transactions, an authentication scheme has originally been included as part of the "EPC Gen2" industrial standard. This scheme, however, has been found to have some weaknesses. To overcome such weaknesses, some authors have proposed new schemes to improve its security. Two of the latest proposals are the Lim-Li protocol and the Konidala-Kim-Kim protocol presented in 2007. We propose an attack that can be applied to both these protocols. In both cases, the Search Space for the password(s) used have been drastically reduced, which effectively breaks the security of these protocols.
为了确保RFID交易的安全,认证方案最初被包含在“EPC Gen2”工业标准中。然而,人们发现这个方案有一些弱点。为了克服这些弱点,一些作者提出了新的方案来提高其安全性。最近的两个提议是2007年提出的林-李议定书和科尼达拉-金-金议定书。我们提出了一种可以应用于这两个协议的攻击。在这两种情况下,所使用的密码的搜索空间都大大减少,这有效地破坏了这些协议的安全性。
{"title":"Analysis of RFID Mutual Authentication Protocols","authors":"C. R. Guo","doi":"10.1109/WCNC.2009.4917595","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917595","url":null,"abstract":"In order to secure RFID transactions, an authentication scheme has originally been included as part of the \"EPC Gen2\" industrial standard. This scheme, however, has been found to have some weaknesses. To overcome such weaknesses, some authors have proposed new schemes to improve its security. Two of the latest proposals are the Lim-Li protocol and the Konidala-Kim-Kim protocol presented in 2007. We propose an attack that can be applied to both these protocols. In both cases, the Search Space for the password(s) used have been drastically reduced, which effectively breaks the security of these protocols.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Sliced Scalable Source Partition Streaming for Flexible Power Management in Digital Audio/Video Broadcasting 用于数字音频/视频广播中灵活电源管理的分时可扩展源分区流
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917993
Ching-Yung Chen, Fang-Chu Chen, Ce-Min Fang, Yi-Ting Wang, Chih-Chun Feng
This paper proposes a power management mechanism, via cross-layer design over application/presentation, data-link, and physical layers, for power-limited receivers in a multimedia streaming system such as the digital audio/video broadcasting system. In the transmitter, fine grain scalable source coding is utilized in the application/presentation layer to produce a bitstream of video frames that are further processed to form several partition streams in the data-link layer. Then, the partition streams are transmitted in bursts through time-slicing based modulation over the physical layer. Accordingly, depending on acceptance of various multimedia quality which is in proportion to the amount of data to be processed, power consumption can be autonomously managed by the receivers with great flexibility and wide dynamic range.
本文提出了一种针对多媒体流系统(如数字音频/视频广播系统)中功率有限的接收器的电源管理机制,该机制通过应用/表示层、数据链路层和物理层的跨层设计。在发射机中,应用/表示层利用细粒度可扩展源编码产生视频帧的比特流,在数据链路层进一步处理形成若干分割流。然后,在物理层上通过基于时间切片的调制以突发方式传输分区流。因此,根据接收的各种多媒体质量与需要处理的数据量成比例,可以由接收机自主管理功耗,具有很大的灵活性和大的动态范围。
{"title":"Time-Sliced Scalable Source Partition Streaming for Flexible Power Management in Digital Audio/Video Broadcasting","authors":"Ching-Yung Chen, Fang-Chu Chen, Ce-Min Fang, Yi-Ting Wang, Chih-Chun Feng","doi":"10.1109/WCNC.2009.4917993","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917993","url":null,"abstract":"This paper proposes a power management mechanism, via cross-layer design over application/presentation, data-link, and physical layers, for power-limited receivers in a multimedia streaming system such as the digital audio/video broadcasting system. In the transmitter, fine grain scalable source coding is utilized in the application/presentation layer to produce a bitstream of video frames that are further processed to form several partition streams in the data-link layer. Then, the partition streams are transmitted in bursts through time-slicing based modulation over the physical layer. Accordingly, depending on acceptance of various multimedia quality which is in proportion to the amount of data to be processed, power consumption can be autonomously managed by the receivers with great flexibility and wide dynamic range.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127115164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sensor Network Performance Inference Algorithm Based on Passive Measurement 一种基于被动测量的传感器网络性能推断算法
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917546
Yu Yang, Yongjun Xu, Xiaowei Li
Wireless sensor networks need energy-efficient mechanisms of performance measurement for various aspects of network design, optimization and management. In this paper, we take into account the unique data aggregation communication paradigm of wireless sensor networks: the network performance can be measured by exploiting whether application data from various sensor nodes reach the sink, without incurring any additional overhead of active probes or performance reports. Then we present a novel algorithm, which can infer sensor network topology and link loss performance simultaneously. Finally, we validate the algorithm through simulations and it exhibit ts good performance and scalability.
无线传感器网络在网络设计、优化和管理的各个方面都需要高效节能的性能测量机制。在本文中,我们考虑了无线传感器网络独特的数据聚合通信范式:网络性能可以通过利用来自各个传感器节点的应用程序数据是否到达接收器来测量,而不会产生任何额外的主动探测器或性能报告开销。然后,我们提出了一种新的算法,可以同时推断传感器网络的拓扑结构和链路损耗性能。最后,通过仿真对算法进行了验证,结果表明该算法具有良好的性能和可扩展性。
{"title":"A Sensor Network Performance Inference Algorithm Based on Passive Measurement","authors":"Yu Yang, Yongjun Xu, Xiaowei Li","doi":"10.1109/WCNC.2009.4917546","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917546","url":null,"abstract":"Wireless sensor networks need energy-efficient mechanisms of performance measurement for various aspects of network design, optimization and management. In this paper, we take into account the unique data aggregation communication paradigm of wireless sensor networks: the network performance can be measured by exploiting whether application data from various sensor nodes reach the sink, without incurring any additional overhead of active probes or performance reports. Then we present a novel algorithm, which can infer sensor network topology and link loss performance simultaneously. Finally, we validate the algorithm through simulations and it exhibit ts good performance and scalability.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127409599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FKM: A Fingerprint-Based Key Management Protocol for SoC-Based Sensor Networks FKM:一种基于soc传感器网络的指纹密钥管理协议
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917725
Xiaoguang Niu, Yanmin Zhu, Li Cui, L. Ni
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheaper tamper- resistant sensor nodes. In these nodes, we find that there exists a lifetime-secure memory fraction which stores the anterior part of the application executable binary code, namely "fingerprint". We propose a key management protocol based on this secure fingerprint-- FKM. In this protocol, any pair of nodes can build a secret key by combining two raw key elements randomly selected by both nodes from their fingerprints respectively. To further strengthen the security, we also present two multi-dimension grid key reinforcement schemes. To the best of our knowledge, this paper is the first attempt at the use of application executable binary code itself to develop a key management protocol. A thorough analysis shows that FKM supports higher security and superior operational properties while consuming less memory resource compared to the existing key establishment schemes.
近年来,系统单片(SoC)技术已被用于设计更小、更低功耗和更便宜的防篡改传感器节点。在这些节点中,我们发现存在一个终身安全的内存部分,用于存储应用程序可执行二进制代码的前端部分,即“指纹”。在此基础上提出了一种密钥管理协议——FKM。在该协议中,任何一对节点都可以通过组合两个原始密钥元素来构建密钥,这些原始密钥元素是由两个节点分别从其指纹中随机选择的。为了进一步加强安全性,我们还提出了两种多维网格密钥加固方案。据我们所知,本文是第一次尝试使用应用程序可执行二进制代码本身来开发密钥管理协议。深入分析表明,与现有的密钥建立方案相比,FKM具有更高的安全性和优越的操作性能,同时消耗更少的内存资源。
{"title":"FKM: A Fingerprint-Based Key Management Protocol for SoC-Based Sensor Networks","authors":"Xiaoguang Niu, Yanmin Zhu, Li Cui, L. Ni","doi":"10.1109/WCNC.2009.4917725","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917725","url":null,"abstract":"Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheaper tamper- resistant sensor nodes. In these nodes, we find that there exists a lifetime-secure memory fraction which stores the anterior part of the application executable binary code, namely \"fingerprint\". We propose a key management protocol based on this secure fingerprint-- FKM. In this protocol, any pair of nodes can build a secret key by combining two raw key elements randomly selected by both nodes from their fingerprints respectively. To further strengthen the security, we also present two multi-dimension grid key reinforcement schemes. To the best of our knowledge, this paper is the first attempt at the use of application executable binary code itself to develop a key management protocol. A thorough analysis shows that FKM supports higher security and superior operational properties while consuming less memory resource compared to the existing key establishment schemes.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129998959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Principle and Performance of TTI Bundling For VoIP in LTE FDD Mode LTE FDD模式下VoIP TTI捆绑的原理与性能
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917919
Jing Han, Haiming Wang
Limited transmission power and short TTI length impose a bottleneck on LTE UL performance in a coverage-limited scenario. This paper presents an effective coverage enhancement mechanism called TTI bundling to boost uplink VoIP performance in LTE FDD mode. Performance evaluation for TTI bundling with VoIP traffic is carried out by semi-static system simulation, and the impact from different bundling options with different bundle size and packet delay budget is investigated. The simulation analysis proves that with proper bundle size, TTI bundling can enhance the coverage performance for LTE FDD effectively.
在覆盖有限的情况下,有限的传输功率和较短的TTI长度对LTE UL性能造成瓶颈。本文提出了一种有效的覆盖增强机制,称为TTI捆绑,以提高LTE FDD模式下的上行VoIP性能。通过半静态系统仿真,对TTI与VoIP业务捆绑的性能进行了评估,并研究了不同捆绑方式、不同数据包大小和数据包延迟预算对TTI与VoIP业务捆绑性能的影响。仿真分析表明,在适当的数据包大小下,TTI数据包可以有效地提高LTE FDD的覆盖性能。
{"title":"Principle and Performance of TTI Bundling For VoIP in LTE FDD Mode","authors":"Jing Han, Haiming Wang","doi":"10.1109/WCNC.2009.4917919","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917919","url":null,"abstract":"Limited transmission power and short TTI length impose a bottleneck on LTE UL performance in a coverage-limited scenario. This paper presents an effective coverage enhancement mechanism called TTI bundling to boost uplink VoIP performance in LTE FDD mode. Performance evaluation for TTI bundling with VoIP traffic is carried out by semi-static system simulation, and the impact from different bundling options with different bundle size and packet delay budget is investigated. The simulation analysis proves that with proper bundle size, TTI bundling can enhance the coverage performance for LTE FDD effectively.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Novel Pairing Diversity Technique with Dynamic Code Allocation for CDMA Systems Employing Polyphase Sequences 基于多相序列的码分多址系统动态码分配新技术
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917529
A. ElKalagy, E. Alsusa
This paper introduces and analyses a novel uplink CDMA pairing diversity technique. In particular, this paper considers the use of orthogonal polyphase (OPP) sequences on the synchronous and asynchronous uplink to benefit from the codes' good cross-correlation properties. A code allocation algorithm is also presented in this paper that aims to exploit the cross-correlation properties to achieve the best possible system performance. For the sake of comprehensiveness, the paper compares the performance of this new diversity technique with a conventional pairing diversity technique and with the well known maximum gain combined (MGC) time diversity. The results show that the proposed algorithm outperforms the conventional pairing technique, in terms of BER, and with proper code allocation, is also able to outperform time diversity systems. The new algorithm is able to accommodate up to 200% system loading even under severe asynchronous and multipath conditions.
本文介绍并分析了一种新的上行CDMA配对分集技术。特别地,本文考虑在同步和异步上行链路上使用正交多相(OPP)序列,以利用码的良好互相关特性。本文还提出了一种代码分配算法,旨在利用互相关特性来实现最佳的系统性能。为了全面起见,本文将这种新分集技术的性能与传统的配对分集技术以及众所周知的最大增益组合(MGC)时分集技术进行了比较。结果表明,该算法在误码率方面优于传统的配对技术,并且通过适当的码分配,也能优于时分集系统。即使在严重的异步和多路径条件下,新算法也能够容纳高达200%的系统负载。
{"title":"A Novel Pairing Diversity Technique with Dynamic Code Allocation for CDMA Systems Employing Polyphase Sequences","authors":"A. ElKalagy, E. Alsusa","doi":"10.1109/WCNC.2009.4917529","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917529","url":null,"abstract":"This paper introduces and analyses a novel uplink CDMA pairing diversity technique. In particular, this paper considers the use of orthogonal polyphase (OPP) sequences on the synchronous and asynchronous uplink to benefit from the codes' good cross-correlation properties. A code allocation algorithm is also presented in this paper that aims to exploit the cross-correlation properties to achieve the best possible system performance. For the sake of comprehensiveness, the paper compares the performance of this new diversity technique with a conventional pairing diversity technique and with the well known maximum gain combined (MGC) time diversity. The results show that the proposed algorithm outperforms the conventional pairing technique, in terms of BER, and with proper code allocation, is also able to outperform time diversity systems. The new algorithm is able to accommodate up to 200% system loading even under severe asynchronous and multipath conditions.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Minimum Number of Adaptive Array Antenna Elements for Interference Suppression in Ubiquitous Communication Environments 泛在通信环境中抑制干扰的最小自适应阵列天线单元数
Pub Date : 2009-04-05 DOI: 10.1109/WCNC.2009.4917985
M. Yamanaka, M. Enomoto, R. Pirkl, G. Durgin, S. Sampei, N. Morinaga
This paper investigates the minimum number of antenna elements of an adaptive array antenna (AAA) required to suppress unnecessary radiation to a single location in an indoor ubiquitous communication environment. In the investigation the relationship between the number of antenna elements of an AAA and its digitally-created antenna null width is demonstrated using antenna directivity control technique that has been proposed by the authors. Also, the angular spread around a terminal to a single location in an indoor communication environment is demonstrated with propagation measurements. Based on the computer simulation results and the angular spread obtained by propagation measurements, the authors specify that at least 6 antenna elements are required to suppress radiation to a single location in an indoor communication environment up to -60 dB.
本文研究了在室内泛在通信环境中,自适应阵列天线(AAA)抑制对单个位置的不必要辐射所需的最小天线单元数。在研究中,利用作者提出的天线指向性控制技术演示了AAA天线单元数与其数字创建的天线零宽度之间的关系。此外,在室内通信环境中,通过传播测量演示了终端周围到单个位置的角传播。根据计算机模拟结果和传播测量得到的角扩展,作者明确了在室内通信环境中,至少需要6个天线单元来抑制对单个位置的辐射,最大可达-60 dB。
{"title":"The Minimum Number of Adaptive Array Antenna Elements for Interference Suppression in Ubiquitous Communication Environments","authors":"M. Yamanaka, M. Enomoto, R. Pirkl, G. Durgin, S. Sampei, N. Morinaga","doi":"10.1109/WCNC.2009.4917985","DOIUrl":"https://doi.org/10.1109/WCNC.2009.4917985","url":null,"abstract":"This paper investigates the minimum number of antenna elements of an adaptive array antenna (AAA) required to suppress unnecessary radiation to a single location in an indoor ubiquitous communication environment. In the investigation the relationship between the number of antenna elements of an AAA and its digitally-created antenna null width is demonstrated using antenna directivity control technique that has been proposed by the authors. Also, the angular spread around a terminal to a single location in an indoor communication environment is demonstrated with propagation measurements. Based on the computer simulation results and the angular spread obtained by propagation measurements, the authors specify that at least 6 antenna elements are required to suppress radiation to a single location in an indoor communication environment up to -60 dB.","PeriodicalId":186150,"journal":{"name":"2009 IEEE Wireless Communications and Networking Conference","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 IEEE Wireless Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1