Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068965
Ville Syrjälä, M. Valkama, N. Tchamov, J. Rinne
This paper addresses the analysis and mitigation of the signal distortion caused by oscillator phase noise (PN) in OFDM communications systems. Two new PN mitigation techniques are proposed, especially targeted for reducing the intercarrier interference (ICI) effects due to PN. The first proposed method is a fairly simple one, stemming from the idea of linearly interpolating between two consecutive common phase error (CPE) estimates to obtain a linearized estimate of the time-varying phase characteristics. The second technique, in turn, is an extension to the existing state-of-the-art ICI estimation methods. Here the idea is to use an additional interpolation stage to improve the phase estimation performance around the boundaries of two consecutive OFDM symbols. The paper also verifies the performance improvement of these new PN estimation techniques by comparing them to the existing state-of-the-art techniques using extensive computer simulations. To emphasize practicality, the simulations are carried out in 3GPP-LTE downlink -like system context, covering both additive white Gaussian noise (AWGN) and extended ITU-R Vehicular A multipath channel types.
{"title":"Phase noise modelling and mitigation techniques in ofdm communications systems","authors":"Ville Syrjälä, M. Valkama, N. Tchamov, J. Rinne","doi":"10.1109/WTS.2009.5068965","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068965","url":null,"abstract":"This paper addresses the analysis and mitigation of the signal distortion caused by oscillator phase noise (PN) in OFDM communications systems. Two new PN mitigation techniques are proposed, especially targeted for reducing the intercarrier interference (ICI) effects due to PN. The first proposed method is a fairly simple one, stemming from the idea of linearly interpolating between two consecutive common phase error (CPE) estimates to obtain a linearized estimate of the time-varying phase characteristics. The second technique, in turn, is an extension to the existing state-of-the-art ICI estimation methods. Here the idea is to use an additional interpolation stage to improve the phase estimation performance around the boundaries of two consecutive OFDM symbols. The paper also verifies the performance improvement of these new PN estimation techniques by comparing them to the existing state-of-the-art techniques using extensive computer simulations. To emphasize practicality, the simulations are carried out in 3GPP-LTE downlink -like system context, covering both additive white Gaussian noise (AWGN) and extended ITU-R Vehicular A multipath channel types.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068941
I. Jawhar, N. Mohamed
Considerable advancements in the technology of wireless sensor networks (WSNs) are taking place due to smaller, and more efficient electronic devices which are capable of increased processing power, and communication capabilities. In addition, the cost of such devices is constantly decreasing, which makes it possible to employ large quantities of networked sensors in numerous commercial, environmental, military and health care applications. A lot of these applications involve lining up the sensor nodes in a linear structure giving rise to a new class of WSNs, which is defined in this work as Linear Sensor Networks (LSNs). This paper identifies some of the applications that might use such networks and offers a classification of the different types of LSNs from a topological and hierarchical points of view. Finally, a motivation for designing specialized protocols that take advantage of the linearity of such networks in order to increase reliability, efficiency, energy savings, and network lifetime is offered along with the new research issues, challenges and opportunities that exist in this field.
{"title":"A hierarchical and topological classification of linear sensor networks","authors":"I. Jawhar, N. Mohamed","doi":"10.1109/WTS.2009.5068941","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068941","url":null,"abstract":"Considerable advancements in the technology of wireless sensor networks (WSNs) are taking place due to smaller, and more efficient electronic devices which are capable of increased processing power, and communication capabilities. In addition, the cost of such devices is constantly decreasing, which makes it possible to employ large quantities of networked sensors in numerous commercial, environmental, military and health care applications. A lot of these applications involve lining up the sensor nodes in a linear structure giving rise to a new class of WSNs, which is defined in this work as Linear Sensor Networks (LSNs). This paper identifies some of the applications that might use such networks and offers a classification of the different types of LSNs from a topological and hierarchical points of view. Finally, a motivation for designing specialized protocols that take advantage of the linearity of such networks in order to increase reliability, efficiency, energy savings, and network lifetime is offered along with the new research issues, challenges and opportunities that exist in this field.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068940
Christos Papathanasiou, I. Koutsopoulos, L. Tassiulas
In a densely deployed Wireless Local Area Network (WLAN) environment, Access Points (APs) could be so close to cause significant channel interference. In the next generation IEEE 802.11n WLANs, inter-cell interference decreases spectral efficiency. By applying common transmission weight vectors in all sub-carriers at a set of users, the paper proposes a new distributed algorithm that permits interfering APs to select appropriately their operating frequency and suppress interference in co-working IEEE 802.11n WLANs. Our method increase system performance and significantly reduces implementation complexity and power consumption. Simulation results in a strong interference environment show substantial gain for our proposed strategies.
{"title":"Interference mitigation in co-working IEEE 802.11n WLANs","authors":"Christos Papathanasiou, I. Koutsopoulos, L. Tassiulas","doi":"10.1109/WTS.2009.5068940","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068940","url":null,"abstract":"In a densely deployed Wireless Local Area Network (WLAN) environment, Access Points (APs) could be so close to cause significant channel interference. In the next generation IEEE 802.11n WLANs, inter-cell interference decreases spectral efficiency. By applying common transmission weight vectors in all sub-carriers at a set of users, the paper proposes a new distributed algorithm that permits interfering APs to select appropriately their operating frequency and suppress interference in co-working IEEE 802.11n WLANs. Our method increase system performance and significantly reduces implementation complexity and power consumption. Simulation results in a strong interference environment show substantial gain for our proposed strategies.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068996
G. Salami, S. Thilakawardana, R. Tafazolli
This paper proposes spectrum sharing algorithms between two Universal Mobile Telecommunication System (UMTS) operators in order to improve underutilization of the spectrum. Furthermore, it investigates the call setup delays present in the proposed Fixed Spectrum Allocation (FSA) and Dynamic Spectrum Allocation (DSA) schemes, and the associated messages involved. The spectrum efficiency gains of the proposed algorithms are obtained by simulations. The impact of the queuing and call setup messages on the overall algorithm performance is also discussed. It is shown that due to the proposed techniques, spectrum sharing gain of about three percent (3%) is possible at an operating point of 98% satisfaction ratio, when the impact of the call setup messages is considered.
{"title":"The impact of queuing and call setup delays on UMTS spectrum sharing algorithm","authors":"G. Salami, S. Thilakawardana, R. Tafazolli","doi":"10.1109/WTS.2009.5068996","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068996","url":null,"abstract":"This paper proposes spectrum sharing algorithms between two Universal Mobile Telecommunication System (UMTS) operators in order to improve underutilization of the spectrum. Furthermore, it investigates the call setup delays present in the proposed Fixed Spectrum Allocation (FSA) and Dynamic Spectrum Allocation (DSA) schemes, and the associated messages involved. The spectrum efficiency gains of the proposed algorithms are obtained by simulations. The impact of the queuing and call setup messages on the overall algorithm performance is also discussed. It is shown that due to the proposed techniques, spectrum sharing gain of about three percent (3%) is possible at an operating point of 98% satisfaction ratio, when the impact of the call setup messages is considered.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068934
Rong-Terng Juang, Pangan Ting, Kun-Yi Lin, Hsin-Piao Lin, D. Lin
This paper proposes a packet retransmission scheme with interference cancellation for OFDM systems based on the basic principle of spread spectrum technique. The proposed design orthogonally spreads packets in transmission-domain to separate the desired signal from the interferences. Almost without increasing complexity, it outperforms the conventional packet retransmission scheme.
{"title":"Packet retransmission with interference cancellation for MIMO-OFDM systems","authors":"Rong-Terng Juang, Pangan Ting, Kun-Yi Lin, Hsin-Piao Lin, D. Lin","doi":"10.1109/WTS.2009.5068934","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068934","url":null,"abstract":"This paper proposes a packet retransmission scheme with interference cancellation for OFDM systems based on the basic principle of spread spectrum technique. The proposed design orthogonally spreads packets in transmission-domain to separate the desired signal from the interferences. Almost without increasing complexity, it outperforms the conventional packet retransmission scheme.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125709575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068959
Jyh-ming Huang, Shih-Chieh Tai, Kuong-Ho Chen
A critical security threat in a WSN is the compromising of sensor nodes. Not only can attackers use such vulnerability to eavesdrop on the dataflow, but could also inject bogus information into the network. However, most current secure data collection methods trade fault-tolerant ability for end-to-end protection, thus with poor performance. This work proposes CRINet, a secure and fault-tolerant data collection scheme with group key management mechanism. To achieve high reliability, sensing data would be transferred to the sink through multi-path. EBS is applied in CRINet for group key management in order to reduce re-key efforts. Simulation results demonstrate that CRINet scheme is superior in terms of data confidentiality and availability.
{"title":"CRINet: A secure and fault-tolerant data collection scheme using 3-way forwarding and group key management in wireless sensor networks","authors":"Jyh-ming Huang, Shih-Chieh Tai, Kuong-Ho Chen","doi":"10.1109/WTS.2009.5068959","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068959","url":null,"abstract":"A critical security threat in a WSN is the compromising of sensor nodes. Not only can attackers use such vulnerability to eavesdrop on the dataflow, but could also inject bogus information into the network. However, most current secure data collection methods trade fault-tolerant ability for end-to-end protection, thus with poor performance. This work proposes CRINet, a secure and fault-tolerant data collection scheme with group key management mechanism. To achieve high reliability, sensing data would be transferred to the sink through multi-path. EBS is applied in CRINet for group key management in order to reduce re-key efforts. Simulation results demonstrate that CRINet scheme is superior in terms of data confidentiality and availability.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5355510
N. Ermolova
In this paper, we derive dosed-form expressions for the output power spectral density of a memory RF power amplifier driven by a Gaussian signal. The considered memory model of the nonlinearity is a general parallel Hammnerstein system. The obtained results can be applied for design and analysis of various communication systems with Gaussian inputs (such as OFDM, CDMA)
{"title":"Spectral analysis of a memory RF power amplifier with Gaussian inputs","authors":"N. Ermolova","doi":"10.1109/WTS.2009.5355510","DOIUrl":"https://doi.org/10.1109/WTS.2009.5355510","url":null,"abstract":"In this paper, we derive dosed-form expressions for the output power spectral density of a memory RF power amplifier driven by a Gaussian signal. The considered memory model of the nonlinearity is a general parallel Hammnerstein system. The obtained results can be applied for design and analysis of various communication systems with Gaussian inputs (such as OFDM, CDMA)","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068981
H. Lau
With the advance in wireless technology, latest generation of wireless personal area networks (WPANs) can provide a data rate of hundreds (or even thousands) of Mbps at a distance of less than 10 meters. This paper reports the latest development of high-speed WPANs. Systems like Certified Wireless USB, Bluetooth 3.0, WirelessHD, and TransferJet will be reported in this paper. Since ultra-wideband (UWB) technology has been adopted in many high-speed WPANs, this paper also discusses technical challenges and applications of UWB-based WPANs.
{"title":"High-speed short-range systems for wireless personal area networks","authors":"H. Lau","doi":"10.1109/WTS.2009.5068981","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068981","url":null,"abstract":"With the advance in wireless technology, latest generation of wireless personal area networks (WPANs) can provide a data rate of hundreds (or even thousands) of Mbps at a distance of less than 10 meters. This paper reports the latest development of high-speed WPANs. Systems like Certified Wireless USB, Bluetooth 3.0, WirelessHD, and TransferJet will be reported in this paper. Since ultra-wideband (UWB) technology has been adopted in many high-speed WPANs, this paper also discusses technical challenges and applications of UWB-based WPANs.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068937
L. Rong, S. Elayoubi
In this paper, we propose a cross-layer analytical model to assess the capacity of a cellular network offering both TV and unicast (voice, data) services. Different mobile TV deployment strategies are then studied. This includes unicast-based TV and two broadcast/multicast approaches based on 3GPP MBMS, namely, Single Cell Point to Multipoint (SC-PtM) and MBSFN (MBMS over Single Frenquency Networks). We compare the different strategies from two points of view: 1. the Quality of Service (QoS) they insure for TV users and their impact on unicast services and 2. the trade off between the QoS needs of the different services is discussed and the best TV deployment strategy is given for different traffic scenarios.
{"title":"Comparison of mobile TV deployment strategies in 3G LTE networks","authors":"L. Rong, S. Elayoubi","doi":"10.1109/WTS.2009.5068937","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068937","url":null,"abstract":"In this paper, we propose a cross-layer analytical model to assess the capacity of a cellular network offering both TV and unicast (voice, data) services. Different mobile TV deployment strategies are then studied. This includes unicast-based TV and two broadcast/multicast approaches based on 3GPP MBMS, namely, Single Cell Point to Multipoint (SC-PtM) and MBSFN (MBMS over Single Frenquency Networks). We compare the different strategies from two points of view: 1. the Quality of Service (QoS) they insure for TV users and their impact on unicast services and 2. the trade off between the QoS needs of the different services is discussed and the best TV deployment strategy is given for different traffic scenarios.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-22DOI: 10.1109/WTS.2009.5068943
Mikko V. J. Heikkinen, S. Luukkainen
We developed a value analysis framework based on existing literature. We used our framework to analyze novel mobile peer-to-peer communications technologies on three distinct evolution paths. According to our analysis, the telecom-driven evolution path concentrates on preserving established business models of current telecom operators; the Internet-driven and proprietary paths initiate competing business models where the service operator partially replaces the service provision value generation mode of the network operator. The value networks of the proprietary and the telecom-driven paths are centralized on one actor, whereas the value network of the Internet-driven path is more balanced and establishes value generation opportunities for more actors.
{"title":"Value analysis of technology evolution: Case mobile peer-to-peer communications","authors":"Mikko V. J. Heikkinen, S. Luukkainen","doi":"10.1109/WTS.2009.5068943","DOIUrl":"https://doi.org/10.1109/WTS.2009.5068943","url":null,"abstract":"We developed a value analysis framework based on existing literature. We used our framework to analyze novel mobile peer-to-peer communications technologies on three distinct evolution paths. According to our analysis, the telecom-driven evolution path concentrates on preserving established business models of current telecom operators; the Internet-driven and proprietary paths initiate competing business models where the service operator partially replaces the service provision value generation mode of the network operator. The value networks of the proprietary and the telecom-driven paths are centralized on one actor, whereas the value network of the Internet-driven path is more balanced and establishes value generation opportunities for more actors.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}