The document proposes improving a (2,1,2) convolutional encoder to a (3,2,3) encoder. This would increase the code rate from 1/2 to 2/3, reducing error control information and increasing bit rate. The proposed encoder has 8 states compared to the original 4 states. Encoding involves following state transitions while outputting codewords. Decoding uses the Soft-Output Viterbi Algorithm to find the most likely path through the trellis diagram by comparing received codewords to possible code sequences. The improved encoder is expected to significantly increase wireless communication system performance and reduce costs by more efficiently using bandwidth.
This document discusses an OFDM-based wireless LAN transmitter architecture. It begins with an abstract that describes OFDM signals used in 802.11 wireless LAN systems and the need for high data rate wireless communication. It then provides background on OFDM and orthogonal frequency division multiplexing. The document describes the proposed OFDM-based wireless LAN architecture, which includes modules for time and frequency recovery, channel estimation, and channel coding to protect data from noise and interference during transmission.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
This paper discusses key aspects of 4G mobile communication systems. 4G aims to provide high-quality services from voice to video as well as high-speed wireless internet access. It describes technologies like OFDMA, MIMO and software defined radio that enable high data rates of 50-500 bits/Hz/km2. 4G will use a multi-technology approach including 3G, WiFi and WiMAX. Seamless coverage will be achieved through a parent network and smaller picocells. Caching and multimedia adaptation will improve quality of experience for users. 4G promises ubiquitous high-speed connectivity through integration of networks, terminals and applications.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
: The requirements of the rapidly expanding
second and third generation mobile communication systems
place increasing demands on DSP algorithms and their
implementations. This paper presents a survey of the
implications of the new cellular system technology on the DSP
functionality and implementation of 1V DSP processors for
mobile systems. Modern cellular phones are placing
increasingly stringent demands on battery life and, therefore,
on the power dissipation of the embedded DSP circuitry.
At the same time, greater computational throughput is
being required of the DSP, for example to implement more
sophisticated speech and channel coding algorithms. Earlier
low-power DSPs have been reported. How-ever, further
improvements in power and performance are required. As is
well known, the demand for wireless communications has been
steadily increasing in recent years and the number of
subscribers in wireless systems is expected to grow also in the
future
The document proposes a vision of a future distributed artificial intelligence organized at the network level rather than through increasingly intelligent individual machines. It suggests machines will function as sensors transmitting local data wirelessly via 218-219 MHz spectrum to a network level intelligence which aggregates the information and directs responses. This would create a global intelligence composed of millions of connected devices communicating via common protocols and languages. The network would be useful for various applications and help address predicted bandwidth shortages.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
A Comparative Study on 4G and 5G Technology for Wireless Applicationsiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses an OFDM-based wireless LAN transmitter architecture. It begins with an abstract that describes OFDM signals used in 802.11 wireless LAN systems and the need for high data rate wireless communication. It then provides background on OFDM and orthogonal frequency division multiplexing. The document describes the proposed OFDM-based wireless LAN architecture, which includes modules for time and frequency recovery, channel estimation, and channel coding to protect data from noise and interference during transmission.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
This paper discusses key aspects of 4G mobile communication systems. 4G aims to provide high-quality services from voice to video as well as high-speed wireless internet access. It describes technologies like OFDMA, MIMO and software defined radio that enable high data rates of 50-500 bits/Hz/km2. 4G will use a multi-technology approach including 3G, WiFi and WiMAX. Seamless coverage will be achieved through a parent network and smaller picocells. Caching and multimedia adaptation will improve quality of experience for users. 4G promises ubiquitous high-speed connectivity through integration of networks, terminals and applications.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
: The requirements of the rapidly expanding
second and third generation mobile communication systems
place increasing demands on DSP algorithms and their
implementations. This paper presents a survey of the
implications of the new cellular system technology on the DSP
functionality and implementation of 1V DSP processors for
mobile systems. Modern cellular phones are placing
increasingly stringent demands on battery life and, therefore,
on the power dissipation of the embedded DSP circuitry.
At the same time, greater computational throughput is
being required of the DSP, for example to implement more
sophisticated speech and channel coding algorithms. Earlier
low-power DSPs have been reported. How-ever, further
improvements in power and performance are required. As is
well known, the demand for wireless communications has been
steadily increasing in recent years and the number of
subscribers in wireless systems is expected to grow also in the
future
The document proposes a vision of a future distributed artificial intelligence organized at the network level rather than through increasingly intelligent individual machines. It suggests machines will function as sensors transmitting local data wirelessly via 218-219 MHz spectrum to a network level intelligence which aggregates the information and directs responses. This would create a global intelligence composed of millions of connected devices communicating via common protocols and languages. The network would be useful for various applications and help address predicted bandwidth shortages.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
A Comparative Study on 4G and 5G Technology for Wireless Applicationsiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...ijtsrd
The wireless communications is one of the most active areas of technology development of our time. Recently, orthogonal frequency division multiplexing has been regarded as one of the core technologies for various wireless communication systems. The BER level is depend on the modulation type, SNR value and channel behavior. The Modulation schemes that we have used in this thesis are 4 QAM, 8 QAM, 16 QAM and 64 QAM which further improved using forward error correction codes FEC . A comparison is made between the diversity gain of MIMO systems in terms of BER for high QAM modulation scheme. This work presents, by a simulation toll MATLAB R2013a used for model implemented using fading channel to the performance analysis of Bit Error rate BER V S Signal to Noise ratio SNR . Mona Ranjan | Praven K Patidar "Performance Analysis of MIMO System on Different Modulation Scheme over Rician Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31730.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31730/performance-analysis-of-mimo-system-on-different-modulation-scheme-over-rician-channel/mona-ranjan
This document provides an introduction to wireless communications and networks. It outlines topics that will be covered, including an overview of communication systems, digital vs analog communications, examples of wireless systems, challenges of wireless communications, wireless system architecture, multiple access techniques, evolution of cellular networks from 1G to 3G, and wireless local area networks. It then goes on to describe the components of a communication system, digital and analog signals, noise immunity of digital signals, and the interface between analog and digital systems using A/D and D/A conversion.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Potential key challenges for terahertz communication systems IJECEIAES
This document discusses potential key challenges for terahertz communication systems. It begins by introducing terahertz waves as a promising technology for 6G networks due to their ability to provide significantly higher bandwidths than current technologies. It then summarizes several major challenges for terahertz communication systems, including high path losses, the need for new transceiver and antenna designs capable of generating and receiving terahertz signals, developing network architectures and protocols suitable for terahertz frequencies, modeling the 3D propagation environment, and safety concerns regarding human exposure to terahertz radiation. Addressing these challenges will be critical for realizing the vision of terabit wireless communication using terahertz frequencies in 6G and beyond.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
A Review on Cooperative Communication Protocols in Wireless World ijwmn
Future generations of cellular communications requires higher data rates and a more reliable
transmission link with the growth of multimedia services, while keeping satisfactory quality of service, .
MIMO antenna systems have been considered as an efficient approach to address these demands by
offering significant multiplexing and diversity gains over single antenna systems without increasing
bandwidth and power. Although MIMO systems can unfold their huge benefit in cellular base stations,
but they may face limitations when it comes to their deployment in mobile handsets.
To overcome this drawback, relays (fixed or mobile terminals) can cooperate to improve the overall
system performance in cellular networks. Cooperative communications can efficiently combat the severity
of fading and shadowing through the assistance of relays. It has been found that using relays the capacity
and coverage of cellular networks can be extended without increasing mobile transmit power or
demanding extra bandwidth.
WiFi Transmit Power and its Effect on Co-Channel InterferenceIJCNCJournal
The mass adoption of WiFi (IEEE 802.11) technology has increased numbers of devices simultaneously attempting to use high-bandwidth applications such as video streaming in a finite portion of the frequency spectrum. These increasing numbers can be seen in the deployment of highly-dense wireless environments in which performance can be affected due to the intensification of challenges such as co-channel interference (CCI). There are mechanisms in place to try to avoid sources of interference from non-WiFi devices. Still, CCI caused by legitimate WiFi traffic can be equally or even more disruptive, and also though some tools and protocols try to address CCI, these are no longer sufficient for this type of environment. Therefore, this paper investigates the effect of transmit power and direction have on CCI in a high-density environment consisting of multiple access points (APs) and multiple clients. We suggest improvements on publicly- existing documented power control algorithms and techniques by proposing a cooperative approach consisting of the incorporation of feedback from the receiver to the transmitter to allow it to reduce power level where possible, which will minimize the range of CCI for near clients without compromising coverage for the most distant ones.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
The document discusses LTE technology developments and the vision for 2020. It notes that Release 12 of LTE, expected in 2014, will significantly extend mobile broadband availability, improve service quality, and help meet exponentially growing data demands through approaches like using 3x more spectrum, achieving 6x greater spectral efficiency, and deploying small cells for 56x higher average cell density. LTE is positioned as the dominant air interface standard moving forward for both existing operators and new deployments worldwide. Release 12 aims to not only satisfy current users but facilitate new usage profiles and applications through enhancements.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
This document analyzes the performance of a 4x4 Vertical Bell Labs Layered Space-Time (V-Blast) multiple-input multiple-output multi-carrier code division multiple access (MIMO MC-CDMA) wireless communication system using different digital modulation schemes. The system uses minimum mean square error (MMSE) signal detection and 1/2-rated convolution and cyclic redundancy check (CRC) channel encoding. Simulation results show that binary phase-shift keying (BPSK) modulation outperforms differential phase-shift keying (DPSK), quadrature phase-shift keying (QPSK), and 16-quadrature amplitude modulation (QAM), achieving the lowest bit error rate (BER) especially at
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Turbo codes are error-correcting codes with performance that is close to the
Shannon theoretical limit (SHA). The motivation for using turbo codes is
that the codes are an appealing mix of a random appearance on the channel
and a physically realizable decoding structure. The communication systems
have the problem of latency, fast switching, and reliable data transfer. The
objective of the research paper is to design and turbo encoder and decoder
hardware chip and analyze its performance. Two convolutional codes are
concatenated concurrently and detached by an interleaver or permuter in the
turbo encoder. The expected data from the channel is interpreted iteratively
using the two related decoders. The soft (probabilistic) data about an
individual bit of the decoded structure is passed in each cycle from one
elementary decoder to the next, and this information is updated regularly.
The performance of the chip is also verified using the maximum a posteriori
(MAP) method in the decoder chip. The performance of field-programmable
gate array (FPGA) hardware is evaluated using hardware and timing
parameters extracted from Xilinx ISE 14.7. The parallel concatenation offers
a better global rate for the same component code performance, and reduced
delay, low hardware complexity, and higher frequency support.
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...IJECEIAES
The consistent demand for higher data rates and need to send giant volumes of data while not compromising the quality of communication has led the development of a new generations of wireless systems. But range and data rate limitations are there in wireless devices. In an attempt to beat these limitations, Multi Input Multi Output (MIMO) systems will be used which also increase diversity and improve the bit error rate (BER) performance of wireless systems. They additionally increase the channel capacity, increase the transmitted data rate through spatial multiplexing, and/or reduce interference from other users. MIMO systems therefore create a promising communication system because of their high transmission rates without additional bandwidth or transmit power and robustness against multipath fading. This paper provides the overview of Multiuser MIMO system. A detailed review on how to increase performance of system and reduce the bit error rate (BER) in different fading environment e.g. Rayleigh fading, Rician fading, Nakagami fading, composite fading.
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
WiMAX is Wireless Interoperability for Microwave Access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as Multipath, Doppler spread, Delay spread and Line Of Sight (LOS)/Non Line Of Sight (NLOS) components. To attain higher data rates the Multi Carrier System with Multiple Input and Multiple Output (MIMO) is incorporated in the WiMAX. The Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier technique used with the WiMAX systems. In OFDM the available spectrum is split into numerous narrow band channels of dissimilar frequencies to achieve high data rate in a multi path fading environment. And all these sub carriers are considered to be orthogonal to each other. As the number of sub carriers is increased there is no guarantee of sustained orthogonality, i.e. at some point the carriers are not
independent to each other, and hence where the orthogonality can be loosed which leads to interference and also owing to the synchronization between transmitter and receiver local oscillator, it causes interference known as Inter Carrier Interference (ICI). The systems uses MIMO-OFDM will suffer with the effects of ICI and Carrier Frequency Offset (CFO) “ε”. However these affect the power leakage in the midst of sub carriers, consequently degrading the system performance. In this paper a new approach is proposed in order to reduce the ICI caused in WiMAX and improve the system performance. In this scheme at the transmitter side the modulated data and a few predefined pilot symbols are mapped onto the non
neighboring sub carriers with weighting coefficients of +1 and -1. With the aid of pilot symbols the frequency offset is exactly estimated by using Maximum Likelihood Estimation (MLE) and hence can be minimized. At demodulation stage the received signals are linearly combined along with their weighted
coefficients and pilot symbols, called as Pilot Aided Self Cancellation Method (PASCS). And also to realize the various wireless environments the simulations are carried out on Stanford University Interim (SUI) channels. The simulation results shows that by incorporating this method into WiMAX systems it performs better when the Line Of Sight (LOS) component is present in the transmission and also it improves the Bit Error Rate (BER) and Carrier to Interference Ratio (CIR). The CIR can be improved 20 dB. In this paper the effectiveness of PASCS scheme is compared with the Self Cancellation Method (SCM). It provides accurate estimation of frequency offset and when residual CFO is less significant the ICI can be diminished successfully.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...theijes
Digital communications has evolved rapidly with a lot of success. The new trend seems to be the reinvention of already existing and even discredited or discarded theories or in this case, channels. Extensive research into optimizing or enhancing already existing schemes is still gaining momentum with practical results for all to experience and utilize. This paper describes the design and BER performance of an M-ary frequency shift keyed (FSK) signaling and demodulation scheme improved by MIMO antenna technology for wireless communications. MFSK and MIMO systems were briefly reviewed including AWGN, Non LOS fading and an important factor employed to estimate the performance of digital transmission. The research was performed using MATLAB for simulation and evaluation of the BER
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...ijtsrd
The wireless communications is one of the most active areas of technology development of our time. Recently, orthogonal frequency division multiplexing has been regarded as one of the core technologies for various wireless communication systems. The BER level is depend on the modulation type, SNR value and channel behavior. The Modulation schemes that we have used in this thesis are 4 QAM, 8 QAM, 16 QAM and 64 QAM which further improved using forward error correction codes FEC . A comparison is made between the diversity gain of MIMO systems in terms of BER for high QAM modulation scheme. This work presents, by a simulation toll MATLAB R2013a used for model implemented using fading channel to the performance analysis of Bit Error rate BER V S Signal to Noise ratio SNR . Mona Ranjan | Praven K Patidar "Performance Analysis of MIMO System on Different Modulation Scheme over Rician Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31730.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31730/performance-analysis-of-mimo-system-on-different-modulation-scheme-over-rician-channel/mona-ranjan
This document provides an introduction to wireless communications and networks. It outlines topics that will be covered, including an overview of communication systems, digital vs analog communications, examples of wireless systems, challenges of wireless communications, wireless system architecture, multiple access techniques, evolution of cellular networks from 1G to 3G, and wireless local area networks. It then goes on to describe the components of a communication system, digital and analog signals, noise immunity of digital signals, and the interface between analog and digital systems using A/D and D/A conversion.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Potential key challenges for terahertz communication systems IJECEIAES
This document discusses potential key challenges for terahertz communication systems. It begins by introducing terahertz waves as a promising technology for 6G networks due to their ability to provide significantly higher bandwidths than current technologies. It then summarizes several major challenges for terahertz communication systems, including high path losses, the need for new transceiver and antenna designs capable of generating and receiving terahertz signals, developing network architectures and protocols suitable for terahertz frequencies, modeling the 3D propagation environment, and safety concerns regarding human exposure to terahertz radiation. Addressing these challenges will be critical for realizing the vision of terabit wireless communication using terahertz frequencies in 6G and beyond.
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
I provide a comprehensive overview on various traffic offloading solutions:
1. Femtocells, which provides the benefits of scalability, automatic configuration and self-optimization.
2. WiFi, widely available in homes and hotspots.
3. Integrating femto and WiFi together to reap the benefits of both femtocell and WiFi technology.
A Review on Cooperative Communication Protocols in Wireless World ijwmn
Future generations of cellular communications requires higher data rates and a more reliable
transmission link with the growth of multimedia services, while keeping satisfactory quality of service, .
MIMO antenna systems have been considered as an efficient approach to address these demands by
offering significant multiplexing and diversity gains over single antenna systems without increasing
bandwidth and power. Although MIMO systems can unfold their huge benefit in cellular base stations,
but they may face limitations when it comes to their deployment in mobile handsets.
To overcome this drawback, relays (fixed or mobile terminals) can cooperate to improve the overall
system performance in cellular networks. Cooperative communications can efficiently combat the severity
of fading and shadowing through the assistance of relays. It has been found that using relays the capacity
and coverage of cellular networks can be extended without increasing mobile transmit power or
demanding extra bandwidth.
WiFi Transmit Power and its Effect on Co-Channel InterferenceIJCNCJournal
The mass adoption of WiFi (IEEE 802.11) technology has increased numbers of devices simultaneously attempting to use high-bandwidth applications such as video streaming in a finite portion of the frequency spectrum. These increasing numbers can be seen in the deployment of highly-dense wireless environments in which performance can be affected due to the intensification of challenges such as co-channel interference (CCI). There are mechanisms in place to try to avoid sources of interference from non-WiFi devices. Still, CCI caused by legitimate WiFi traffic can be equally or even more disruptive, and also though some tools and protocols try to address CCI, these are no longer sufficient for this type of environment. Therefore, this paper investigates the effect of transmit power and direction have on CCI in a high-density environment consisting of multiple access points (APs) and multiple clients. We suggest improvements on publicly- existing documented power control algorithms and techniques by proposing a cooperative approach consisting of the incorporation of feedback from the receiver to the transmitter to allow it to reduce power level where possible, which will minimize the range of CCI for near clients without compromising coverage for the most distant ones.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
The document discusses LTE technology developments and the vision for 2020. It notes that Release 12 of LTE, expected in 2014, will significantly extend mobile broadband availability, improve service quality, and help meet exponentially growing data demands through approaches like using 3x more spectrum, achieving 6x greater spectral efficiency, and deploying small cells for 56x higher average cell density. LTE is positioned as the dominant air interface standard moving forward for both existing operators and new deployments worldwide. Release 12 aims to not only satisfy current users but facilitate new usage profiles and applications through enhancements.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
This document analyzes the performance of a 4x4 Vertical Bell Labs Layered Space-Time (V-Blast) multiple-input multiple-output multi-carrier code division multiple access (MIMO MC-CDMA) wireless communication system using different digital modulation schemes. The system uses minimum mean square error (MMSE) signal detection and 1/2-rated convolution and cyclic redundancy check (CRC) channel encoding. Simulation results show that binary phase-shift keying (BPSK) modulation outperforms differential phase-shift keying (DPSK), quadrature phase-shift keying (QPSK), and 16-quadrature amplitude modulation (QAM), achieving the lowest bit error rate (BER) especially at
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Turbo codes are error-correcting codes with performance that is close to the
Shannon theoretical limit (SHA). The motivation for using turbo codes is
that the codes are an appealing mix of a random appearance on the channel
and a physically realizable decoding structure. The communication systems
have the problem of latency, fast switching, and reliable data transfer. The
objective of the research paper is to design and turbo encoder and decoder
hardware chip and analyze its performance. Two convolutional codes are
concatenated concurrently and detached by an interleaver or permuter in the
turbo encoder. The expected data from the channel is interpreted iteratively
using the two related decoders. The soft (probabilistic) data about an
individual bit of the decoded structure is passed in each cycle from one
elementary decoder to the next, and this information is updated regularly.
The performance of the chip is also verified using the maximum a posteriori
(MAP) method in the decoder chip. The performance of field-programmable
gate array (FPGA) hardware is evaluated using hardware and timing
parameters extracted from Xilinx ISE 14.7. The parallel concatenation offers
a better global rate for the same component code performance, and reduced
delay, low hardware complexity, and higher frequency support.
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...IJECEIAES
The consistent demand for higher data rates and need to send giant volumes of data while not compromising the quality of communication has led the development of a new generations of wireless systems. But range and data rate limitations are there in wireless devices. In an attempt to beat these limitations, Multi Input Multi Output (MIMO) systems will be used which also increase diversity and improve the bit error rate (BER) performance of wireless systems. They additionally increase the channel capacity, increase the transmitted data rate through spatial multiplexing, and/or reduce interference from other users. MIMO systems therefore create a promising communication system because of their high transmission rates without additional bandwidth or transmit power and robustness against multipath fading. This paper provides the overview of Multiuser MIMO system. A detailed review on how to increase performance of system and reduce the bit error rate (BER) in different fading environment e.g. Rayleigh fading, Rician fading, Nakagami fading, composite fading.
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
WiMAX is Wireless Interoperability for Microwave Access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as Multipath, Doppler spread, Delay spread and Line Of Sight (LOS)/Non Line Of Sight (NLOS) components. To attain higher data rates the Multi Carrier System with Multiple Input and Multiple Output (MIMO) is incorporated in the WiMAX. The Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier technique used with the WiMAX systems. In OFDM the available spectrum is split into numerous narrow band channels of dissimilar frequencies to achieve high data rate in a multi path fading environment. And all these sub carriers are considered to be orthogonal to each other. As the number of sub carriers is increased there is no guarantee of sustained orthogonality, i.e. at some point the carriers are not
independent to each other, and hence where the orthogonality can be loosed which leads to interference and also owing to the synchronization between transmitter and receiver local oscillator, it causes interference known as Inter Carrier Interference (ICI). The systems uses MIMO-OFDM will suffer with the effects of ICI and Carrier Frequency Offset (CFO) “ε”. However these affect the power leakage in the midst of sub carriers, consequently degrading the system performance. In this paper a new approach is proposed in order to reduce the ICI caused in WiMAX and improve the system performance. In this scheme at the transmitter side the modulated data and a few predefined pilot symbols are mapped onto the non
neighboring sub carriers with weighting coefficients of +1 and -1. With the aid of pilot symbols the frequency offset is exactly estimated by using Maximum Likelihood Estimation (MLE) and hence can be minimized. At demodulation stage the received signals are linearly combined along with their weighted
coefficients and pilot symbols, called as Pilot Aided Self Cancellation Method (PASCS). And also to realize the various wireless environments the simulations are carried out on Stanford University Interim (SUI) channels. The simulation results shows that by incorporating this method into WiMAX systems it performs better when the Line Of Sight (LOS) component is present in the transmission and also it improves the Bit Error Rate (BER) and Carrier to Interference Ratio (CIR). The CIR can be improved 20 dB. In this paper the effectiveness of PASCS scheme is compared with the Self Cancellation Method (SCM). It provides accurate estimation of frequency offset and when residual CFO is less significant the ICI can be diminished successfully.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...theijes
Digital communications has evolved rapidly with a lot of success. The new trend seems to be the reinvention of already existing and even discredited or discarded theories or in this case, channels. Extensive research into optimizing or enhancing already existing schemes is still gaining momentum with practical results for all to experience and utilize. This paper describes the design and BER performance of an M-ary frequency shift keyed (FSK) signaling and demodulation scheme improved by MIMO antenna technology for wireless communications. MFSK and MIMO systems were briefly reviewed including AWGN, Non LOS fading and an important factor employed to estimate the performance of digital transmission. The research was performed using MATLAB for simulation and evaluation of the BER
Multicarrier modulation can be implemented by using Orthogonal Frequency Division Multiplexing (OFDM) to achieve utmost bandwidth exploitation and soaring alleviation attributes profile besides multipath fading. To support delay sensitive and band bandwidth demanding multimedia applications and internet services, MIMO in addition with other techniques can be used to achieve high capacity and reliability. To obtain high spatial rate by transmitting data on several antennas by using MIMO with OFDM results in reducing error recovery features and the equalization complexities arise by sending data on varying frequency levels. Three parameters frequency OFDM, Spatial (MIMO) and time (STC) can be used to achieve diversity in MIMO-OFDM. This technique is dynamic and well-known for services of wireless broadband access. MIMO if used with OFDM is highly beneficial for each scheme and provides high throughput. There are several space time block codes to exploit MIMO OFDM; one of the techniques is called Alamouti Codes. The paper investigates adaptive Alamouti Codes and their application in IEEE 802.11n.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. ireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi
simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]. 1. In this paper, our area of interest is to compare and study the performance analysis of VoIP codecs in Non-mobility scenarios by changing some parameters and plotting the graphs throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to 5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
The recent Voice over IP (VOIP) applications such as Skype, Google Talk, and Face Time have
changed the way people communicate to each other. Due to the low cost, people find VOIP as an
alternative to the expensive traditional Public Switched Telephone Network (PSTN). VOIP has
set of parameters that defined its Quality of Service (QoS) such as end to delay, jitter, packets
loss, Mean Opinion Score (MOS, and throughput[13]. The existing wireless networks such as WiFi offer flexibility to support such applications. At the time the IEEE 802.11 (Wi-Fi) technology
showed great success as cheap wireless internet access. The Motive of this survey paper is to
analyse of Qos in VOIP [13].
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsIOSR Journals
ABSTRACT: Multiple Input Multiple Output is a wireless technology that uses multiple transmitters and
receivers to transfer more data at the same time. Orthogonal Frequency Division Multiplexing, an FDM
modulation technique which splits the signal into multiple smaller sub-signals that are then transmitted
simultaneously at different frequencies to the receiver. OFDM technique spreads the data over number of
carriers which are at specific predefined frequencies. This reduces or eliminates the ISI. Forward error
correction or channel coding is a technique used for controlling errors in data transmission over unreliable or
noisy communication channels. The objective of our proposed paper is to implement the FEC into the MIMO
OFDM systems and its performance is analysed by using MATLAB over different fading channels. For
modulation it employs M-QAM which combines both ASK and PSK thereby enabling several bits to be
transmitted per symbol. The performance of MIMO-OFDM system is evaluated by BER Vs SNR when the bits
propagates through the different fading channels.
Keywords– OFDM, MIMO, QAM, FEC, BER.
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
In this paper, optical CDMA which combines the large bandwidth of the fibre medium with the flexibility of the
CDMA technique to achieve high speed connectivity has been used. For achieving this purpose, OPPM
signalling and switching techniques have been employed. This helps in the achievement of high tolerance to
Multiple Access Interference, further resulting in improvement of both the Bit Error Rate and optical channel
capacity without the need to decrease the light pulse width. An OPPM scheme to support multimedia services
with different transmission rates and Quality of Service requirements is proposed. Packet Switching technique
has been employed to help in the transfer of data in the form of packets from the source to the destination via a
specified route. The results are calculated by using PPM signalling and switching technology.But switching
technology has been found to be far better than the OOK-OCDMA if the average power has been considered as
the restraining factor.
An effective technique for increasing capacity and improving bandwidth in 5G ...IJECEIAES
In recent years, the wireless spectrum has become increasingly scarce as demand for wireless services has grown, requiring imaginative approaches to increase capacity within a limited spectral resource. This article proposes a new method that combines modified symbol time compression with orthogonal frequency division multiplexing (MSTC-OFDM), to enhance capacity for the narrow-band internet of things (NB-IoT) system. The suggested method, MSTC-OFDM, is based on the modified symbol time compression (MSTC) technique. The MSTC is a compressed waveform technique that increases capacity by compressing the occupied symbol time without losing bit error rate (BER) performance or data throughput. A comparative analysis is provided between the traditional orthogonal frequency division multiplexing (OFDM) system and the MSTC-OFDM method. The simulation results show that the MSTC-OFDM scheme drastically decreases the symbol time (ST) by 75% compared to a standard OFDM system. As a result, the MSTC-OFDM system offers four times the bit rate of a typical OFDM system using the same bandwidth and modulation but with a little increase in complexity. Moreover, compared to an OFDM system with 16 quadrature amplitude modulation (16QAM-OFDM), the MSTC-OFDM system reduces the signal-to-noise ratio (SNR) by 3.9 dB to transmit the same amount of data.
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...cscpconf
In the present simulated system, text message transmission has been secured with concatenated
implementation of Cipher Feedback(CFB) cryptographic algorithm. It is anticipated from the numerical
results that the pre-ZF channel equalization based MIMO OFDM wireless communication
system outperforms in QAM digital modulation and BCH channel coding under AWGN and
Raleigh fading channels .In Pre-MMSE/pre-ZF channel equalization scheme, the system shows
comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital
modulation. It has been observed from the present study that the system performance deteriorates with
increase in noise power as compared to signal power. study of a secured MIMO Orthogonal
Frequency-Division Multiplexing wireless communication system with implementation of two pre
channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and PreZero
Forcing(Pre-ZF) under QPSK and QAM digital modulations.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
The wideband code division multiple access (WCDMA) based 3G cellular mobile
wireless networks are expected to provide a diverse range of multimedia services to
mobile users with guaranteed quality of service (QoS). To serve diverse quality of service
requirements of these networks it necessitates new radio resource management strategies
for effective utilization of network resources with coding schemes. In this paper coverage
area for voice traffic and with different modulation techniques, coding schemes and
decision decoder are discussed. These discussions are to improve the coverage area in
the mobile communication system. This paper is mainly focuses on coverage area of
WCDMA system using link budget calculation with different modulation, coding schemes
and decision decoder. Simulation results demonstrate coverage extension for voice
service with different modulation,coding scheme, soft and hard decision decoder using
appropriate Bit error rate (BER) to maintain QoS of the voice.
This document summarizes a paper presented at the 2023 International Conference on Computer Communication and Informatics. The paper proposes a novel interference mitigation technique and signal prediction method for future wireless communication. It discusses using IDMA (interleaved division multiple access) which improves error rate performance by suppressing interference. It also evaluates using Elliot wave theory to predict mobile signal strength without requiring extra hardware. Simulation results show IDMA with space-time transmit diversity and 256 quantization levels achieves a 10^-4 bit error rate at -0.5 dB. The paper concludes IDMA is a promising technology but further research is needed to explore its potential.
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
This document discusses improving bit error rate (BER) performance in orthogonal frequency division multiplexing (OFDM) systems using hybrid low-density parity check (LDPC) codes and space-time block coding (STBC). It first describes MMSE and LS channel estimation techniques in OFDM and an adaptive modulation and coding WiMAX system. It then proposes using LDPC codes with STBC across multiple transmit antennas to achieve coding gain and diversity gain. Simulation results show the hybrid LDPC-STBC method provides better BER performance than STBC alone, especially at low signal-to-noise ratios in flat Rayleigh fading channels.
A collaborative physical layer security schemeIJECEIAES
High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
Similar to Bandwidth aware fec algorithms for wireless communication systems (20)
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
Bandwidth aware fec algorithms for wireless communication systems
1. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
8
Bandwidth Aware FEC Algorithms for Wireless Communication
Systems
Salehe I. Mrutu*
, Sadath Kalolo, Mastidia Byanyuma, Christina Nyakyi and Anael Sam
The Nelson Mandela African Institute of Science and Technology, P. O. Box 447 Arusha, Tanzania
* E-mail of the corresponding author: mrutui@nm-aist.ac.tz
Abstract
Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission
add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall
network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and
discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth
utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The
proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and
increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi Algorithm.
Keywords: FEC, Bandwidth, Convolutional Codes, Code Rate, Soft Output Viterbi Algorithm
1. Introduction
In the recent years wireless communication industry has experienced a drastic growth of traffic volumes on its
networks. According to Cisco Visual Networking traffic update, the Global mobile data traffic grew by 70% in
2012(Cisco-Visual-Networking-Index, 2013). Global mobile data traffic reached 885 petabytes per month at the
end of 2012, up from 520 petabytes per month at the end of 2011(Cisco-Visual-Networking-Index, 2013). The
rapid traffic growth lies on large increase in the number of mobile devices users; the emerging of popular
bandwidth-intensive applications such as rich media gaming, streaming media, video conferencing, mapping
and navigation applications, telemedicine and virtue education applications as new services (Bazelon, Jackson,
& McHenry, 2011). The invention of new devices such as smart phones, tablets and notebooks that use the
aforementioned services contributes much to the situation (Hanzo et al., 2012). All of the above mentioned
reasons require the availability of wireless networks that are capable to offer more bandwidth or higher data rate.
Bandwidth allocation in wireless communication involves the process of assigning radio frequencies to different
applications. The radio frequency spectrum is a finite and limited natural resource which is increasingly in
demand due to a large growing number of wireless telecommunication services such as mobile phone, radio and
TV broadcasting, space research, environmental monitoring and other communication services that ensure
wellbeing of life in the world.
Mobile-cellular penetration rates stand at 96% globally; 128% in developed countries; and 89% in developing
Countries(ITU-ICT-Facts-and-Figures, 2013). In developing countries such as Tanzania 75% of people live in
rural areas which are characterized by inadequate resources such as teachers and books in schools, doctors in
health centers and other necessary facilities. The emergence of e-services such as e-education, virtual education,
e-health, telemedicine and other e-business services brings up new hope to reach remote and marginalized
communities in rural areas. However, most of the aforementioned services are bandwidth intensive and require
high data rate networks to operate in wireless communication systems. Contrary to that, Tanzanian rural areas are
characterized by limited ICT infrastructure that are dominated by low data rate such as GPRS, EDGE and VSAT
network services which are also too expensive for the rural population.
Despite the high demand for bandwidth a considerable portion of it is used to transfer control information rather
than actual or intended information. Communication systems are congested by various control information such
as error control, security and application format which are system use information. Any attempt to reduce these
control information while maintaining quality of service in data transmission favors the communication system
in two ways. First, more bandwidth is offered for the intended data (End user data) and therefore increasing the
capacity of the transmission network. Secondly, communication costs are reduced as end users are charged based
on the amount of bandwidth used during transmission of data.
This work proposes a new FEC Convolutional code model that reduces system error control information in
wireless communication systems. Thus, offering more room for actual user information to be delivered at the
2. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
9
same cost.
Section 2 of this paper presents the state of art of selected FEC algorithms with their bandwidth requirements.
Section 3 presents the proposed model of improved FEC Convolutional code and section 4 concludes this work.
2. State Of The Art
There are many types of FEC codes in use today; however, FEC codes are basically divided into two main
categories which are Block codes and Convolutional codes (Liumeng, 2011; Sijia & Zexi, 2011). Block codes
work on fixed-size blocks (packets) of bits or symbols of predetermined size. The output of block codes only
depends on the immediate inputs to the same block; while Convolutional codes work for bit or symbol streams
transmission with outputs that depends not only on the immediate input but also the previous inputs.
Convolution codes (CC) are one of the popular FEC codes in use today. This type of code was first introduced by
Elias in 1955(Morelos-Zaragoza, 2006). Through the age, FEC Convolutional code has found numerous
applications in wireless communication including digital terrestrial, satellite communication and broadcasting
systems and space communication systems (IMT-2000, GSM, IS-95,WiMAX (802.16), WCDMA, GPRS,
UMTS, CDMA 2000, DVB-T and DVB-S) (Morelos-Zaragoza, 2006). The most popular decoding mechanism
of CC is the Viterbi algorithm introduced by Viterbi in 1967(Viterbi, 1967). CCs have memory and are defined
as (n, k, m) codes, where n is the number of output bits, k is the number of input bits at a time, and m is the
memory length of encoder(Liumeng, 2011). If an encoder receives k bits of information as input at a time and
gives out n bits as output (codeword) at a time, then k/n is a code rate of that particular encoder. The common
code rate for this codes are 1/2,1/3, 1/4 (Johannesson & Stahl, 1999) and 4/8(Johannesson, Stahl, & Wittenmark,
2000).
To reduce the number of bits transmitted, various puncturing schemes are used which discard selected bits from
the encoder output. Typical puncture rates are 2/3, 3/4, 5/6, and 7/8. For example, a 3/4 puncture rate means that
for every 3 input bits, 4 output bits are transmitted from the encoder output rather than the 6 bits that are actually
generated. Puncturing can be implemented using external logic to the Convolutional encoder(Francis & Green,
2007). This allows the freedom to change between the various puncture rates but it increases data processing
load. Higher gains of CCs are also achieved by Convolutional Turbo Code (CTC) and concatenation of CCs with
other schemes (Benedetto, Garello, & Montorsi, 1998). A good example of this is DVB-T where Convolutional
code is concatenated with Reed Solomon as inner and outer code(Francis & Green, 2007).
According to ViaSat (ViaSat, 2013), CTCs perform extremely well at lower code rates. Communication systems
with less bandwidth and power constraints can use low rate concatenated code to achieve high coding gains or
very low error rates. However, tight bandwidth situations and power constraints communication system drive
this solution in opposite direction. Thus, demanding for an interleaver to be integrated into FEC systems to
enhance burst error dispersion as used in most of the contemporary communication systems (Francis & Green,
2007; ViaSat, 2013). More efforts are still needed to improve FEC codes to support communication systems to
meet modern applications bandwidth requirements.
Below are few selected FEC block codes that are used in serial or parallel concatenation with Convolutional
Codes. This selection includes Reed-Solomon (R-S) codes, Bose-Chaudhuri-Hochquenghem (BCH), Low
Density Parity Codes (LDPC) and Turbo Product Codes (TPC). In communication systems the aforementioned
codes are sometimes concatenated in either serial or parallel form to give a desired exceptional performance. In
serial arrangement there is inner and outer channel code. This fact makes the situation even worse as the extra
bandwidth required for the communication system is a total of all redundant bits in inner and outer code.
2.1 Reed Solomon (R-S)
R-S is a class of non-binary cyclic block codes defined by (n, k) code; where n is the output block size and k is
the number of information symbols and (n-k) gives a number of redundant information. This type of code is used
in communication systems as component code for building more powerful codes through concatenation such as
Reed Solomon Turbo Product Code (RS-TPC). R-S codes type has its application in WiMAX (802.16), DVB-T,
DVB-S, DVB-C, ISDB, DMB, DOCSIS and GPON.
2.2 Bose Chaudhuri Hacquenghem (BCH)
BCH is a class of cyclic block codes; it is used as a component for building more powerful codes. BCH encodes
3. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
10
k data bits into n code bits by adding n-k parity checking bits for the purpose of detecting and checking the errors.
Given the length of the codes n=2m-1 for any integer m≥3, we have t (where t<2m-1), as the bound of the error
correction. The number of parity checking bits is n-k≤ mt. Its applications are found in Video Broadcasting,
DVB-S2 and memory controllers.
2.3 Low Density Parity Codes (LDPC)
LDPC is a FEC linear block code defined by a very sparse parity check matrices which allow for parallel
iterative decoder. LDPC works with a code rate from 0.67 to 0.92 (Gho & Kahn, 2012), Applications of LDPC
are also in China Multimedia Mobile Broadcasting (CMMB), IEEE 802.11n-2009 (Wi-Fi standard), WiMAX,
VSAT, DVB-T2, DVB-C and DVB-S2
2.4 Turbo Product Codes (TPC)
TPC is a class of high-performance FEC codes developed in 1993, TPC are finding use in 3G mobile
communications and (deep space) satellite communications as well as other applications where designers seek to
achieve reliable information transfer over bandwidth or latency-constrained communication links in the presence
of data-corrupting noise(ViaSat, 2013). Code rates for selected FECs are presented in table 1.
Table 1: Selected FEC Codes with Their Corresponding Code Rates
In the next section, we present the proposed model of FEC convolution code to be used in application layer for
encoding and decoding data streams.
3. System Model
The model improves the (2, 1, 2) Convolutional encoder from four states (i.e. S0, S1 S2, and S3) to eight states (i.e.
S0, S1, S2, S3, S4, S5, S6, and S7). This improvement results into a two level encoder. The inner level states which
include the first four states (i.e. S0, S1 S2, and S3) and the outer level states that include the rest of the states (i.e.
S4, S5 S6, and S7). We assume that:
• The encoding process starts and ends at state S0.
• The implementation of the proposed code is in the application layer to support specific real time
applications.
At each state, there are four possible ways to move to other states, where two ways allow the encoder to move to
other two states of the same level and the other two ways to another level. All the same there are four possible
ways to enter a state from other states, where two ways come from states of the same level and another two ways
enter a state from states of another level as shown in the fig. 1.
3.1 Encoding
The encoding process in the fig. 1 starts and terminates at state S0. By following the arrows leaving a state, the
input/output labels (e.g. 01/011 representing 01 as input bits and 011 as the codeword associated to it) gives
guidance through the encoding process. We easily follow the arrows from state to another while taking care of
the input and codeword generated. Suppose the bits {10-11-10-00-01} are supplied as a string of input to the
encoder (starting with 10), then the encoder will produce the following string as codeword at the output {100-
111-110-011-011} and the encoder will change states from S0, S4, S5, S6, S0, to S1.
S/N Code Type Supported Code Rate
1 LPDC ≤ 1
2 TPC ≤ 0.93
3 CTC ≤ 0.83333
4 R-S ≤ 0.9375
5 BCH t<=12 ; t=1,2, (3)
6 CC ≤ 0.5
4. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
11
Figure 1: Proposed model of (3, 2, 3) convolution encoder
3.2 Decoding
The Soft-Decision Output Viterbi algorithm (SOVA) proposed by Viterbi (Viterbi, 1967) and improved by
Joachim Hagenauer and Peter Hoeher (Hagenauer & Hoeher, 1989) is used to decode the received bits. SOVA
decodes received data against random errors by comparing the received code sequence with every possible code
sequence of a node or state. A bit by bit comparison yield a branch metric also known as hamming distance
which is used to determine the most likely path of correct data.
Trellis diagram presented in fig. 2 contains information of states and uses time as a horizontal axis to show the
possible paths through the states. The decoding process starts at S0 where four possible branches with their
possible codes can be compared with the received codeword at the top. The path with minimum comparison
metrics is the most likely path with correct data. The comparison metrics are calculated cumulatively as you
move along from time zero onwards. Viterbi realized that at any stage when different paths converge into one
state, then only those paths with smaller hamming metric need to be remembered and not all paths. Therefore,
the surviving path with minimum hamming distance metrics is the winner path.
For example, the trellis diagram in fig. 2 shows how eight states are used to decode the received codewords
stream {100-111-110-011-011} to give back the original data stream {i.e. 10-11-10-00-01}.
Through the red colored path in the trellis diagram which shows how the decoding process moves through S0, S4,
S5, S6, S0, to S1.
5. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
12
Figure 2: Trellis diagram to show the path
4. Conclusion
We have discussed the selected FECs, their applications and respective code rates. The improved FEC
Convolutional Code model from (2, 1, 2) to (3, 2, 3) is also presented and enables the algorithm to improve the
code rate by 0.17 from 1/2 to 2/3 and hence reducing error control information in transmission media. The paper
shows clearly that the improved FEC Convolutional Code can significantly improve performance i.e data
throughput of wireless communication systems in comparison with the rate of 1/2 convolutional coding case.
Hence, the reduction of operational costs. The decoding process that uses the normal SOVA has also been
presented.
References
Bazelon, C., Jackson, C., & McHenry, G. (2011). An Engineering and Economic Analysis of the Prospects of
Reallocating Radio Spectrum from the Broadcast Band through the Use of Voluntary Incentive Auctions.
Benedetto, S., Garello, R., & Montorsi, G. (1998). A search for good convolutional codes to be used in the
construction of turbo codes. Communications, IEEE Transactions on, 46(9), 1101-1105.
Cisco-Visual-Networking-Index. (2013). Global Mobile Data Traffic Forecast Update, 2012-2017.
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-
520862.html,.
Francis, M., & Green, R. (2007). Forward Error Correction in Digital Television Broadcast Systems. XILINX,
White Paper: Virtex-5, Virtex-4, Spartan-3, LogiCORE, WP27.
Gho, G.-H., & Kahn, J. M. (2012). Rate-adaptive modulation and low-density parity-check coding for optical
fiber transmission systems. Journal of Optical Communications and Networking, 4(10), 760-768.
Hagenauer, J., & Hoeher, P. (1989, 27-30 Nov 1989). A Viterbi algorithm with soft-decision outputs and its
applications. Paper presented at the Global Telecommunications Conference, 1989, and Exhibition.
Communications Technology for the 1990s and Beyond. GLOBECOM '89., IEEE.
Hanzo, L., Haas, H., Imre, S., O''Brien, D., Rupp, M., & Gyongyosi, L. (2012). Wireless Myths, Realities, and
Futures: From 3G/4G to Optical and Quantum Wireless. Proceedings of the IEEE, 100(Special
Centennial Issue), 1853-1888. doi: 10.1109/JPROC.2012.2189788
ITU-ICT-Facts-and-Figures. (2013). The World in 2013: ICT Facts and Figures. http://www.itu.int/en/ITU-
D/Statistics/Documents/facts/ICTFactsFigures2013.pdf.
Johannesson, R., & Stahl, P. (1999). New rate 1/2, 1/3, and 1/4 binary convolutional encoders with an optimum
6. Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
13
distance profile. Information Theory, IEEE Transactions on, 45(5), 1653-1658.
Johannesson, R., Stahl, P., & Wittenmark, E. (2000). A note on type II convolutional codes. Information Theory,
IEEE Transactions on, 46(4), 1510-1514.
Liumeng, S. (2011). Application and Principle of Error Corrected Encoding Technology. Energy Procedia,
Elsevier Ltd., 13, 9087-9092.
Morelos-Zaragoza, R. H. (2006). The Art of Error Correcting Coding (Second Edition ed.): John Wiley & Sons,
Ltd.;The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England.
Sijia, H., & Zexi, Z. (2011, 9-11 Sept. 2011). Principles of FECs with evaluating different types of FEC used in
the Internet and wireless networks. Paper presented at the Electronics, Communications and Control
(ICECC), 2011 International Conference on.
ViaSat. (2013). Convolutional Turbo Codes (CTCs) Retrieved 10-May 2013, from
http://www.viasat.com/convolutional-turbo-codes-ctcs
Viterbi, A. J. (1967). Error bounds for convolutional codes and an asymptotically optimum decoding algorithm.
Information Theory, IEEE Transactions on, 13(2), 260-269. doi: 10.1109/tit.1967.1054010
7. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar