Webinar Slides: Digital Power Management and Power Integrity Analysis and Tes...teledynelecroy
Join Teledyne LeCroy for an overview of digital power management, power integrity, and power sequencing. We'll discuss test of single or multi-phase digital power management ICs (PMICs), voltage regulator modules (VRMs), point-of-load (POLs) switching regulators, low-dropout (LDO) regulators or other DC-DC converter operations under transient load conditions, and test of complete embedded systems that contain these devices.
Screaming Channels: When Electromagnetic Side Channels Meet Radio TransceiversPriyanka Aash
The drive for ever smaller and cheaper components in microelectronics has popularized so-called "mixed-signal circuits," in which analog and digital circuitry are residing on the same silicon die. A typical example is WiFi chips which include a microcontroller (digital logic) where crypto and protocols are implemented together with the radio transceiver (analog logic). The special challenge of such designs is to separate the "noisy" digital circuits from the sensitive analog side of the system.
In this talk, we show that although isolation of digital and analog components is sufficient for those chips to work, it's often insufficient for them to be used securely. This leads to novel side-channel attacks that can break cryptography implemented in mixed-design chips over potentially large distances. This is crucial as the encryption of wireless communications is essential to widely used wireless technologies, such as WiFi or Bluetooth, in which mixed-design circuits are prevalent on consumer devices.
The key observation is that in mixed-design radio chips the processor's activity leaks into the analog portion of the chip, where it is amplified, up-converted and broadcast as part of the regular radio output. While this is similar to electromagnetic (EM) side-channel attacks which can be mounted only in close proximity (millimeters, and in a few cases a few meters), we show that it is possible to recover the original leaked signal over large distances on the radio. As a result, variations of known side-channel analysis techniques can be applied, effectively allowing us to retrieve the encryption key by just listening on the air with a software defined radio (SDR).
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...Silicon Labs
As new designs adopt FPGAs, SoCs, ASICs, and CPUs with higher speed SerDes, it’s becoming increasingly important to understand the impact of reference timing on overall system performance. This deck provides practical guidance on overcoming common timing design challenges by reviewing timing requirements for 10G/25G/40G/56G-based designs, explaining when to use clocks versus oscillators, highlighting system-level factors that degrade signal integrity and reviewing how to budget jitter and/or phase noise margin in order to select an optimal timing solution. This deck also explains how to use common bench equipment and software-based tools to simplify the design-in process.
Watch the complete webinar here: http://bit.ly/2zkBIHb
Best sync practices and architecture strategies for secure, resilient PNT in ...ADVA
Nino De Falcis' presentation at ION ITM/PTTI 2022 outlined strategies and technologies for ensuring resilient, secure end-to-end PNT services for power utilities.
Webinar Slides: Digital Power Management and Power Integrity Analysis and Tes...teledynelecroy
Join Teledyne LeCroy for an overview of digital power management, power integrity, and power sequencing. We'll discuss test of single or multi-phase digital power management ICs (PMICs), voltage regulator modules (VRMs), point-of-load (POLs) switching regulators, low-dropout (LDO) regulators or other DC-DC converter operations under transient load conditions, and test of complete embedded systems that contain these devices.
Screaming Channels: When Electromagnetic Side Channels Meet Radio TransceiversPriyanka Aash
The drive for ever smaller and cheaper components in microelectronics has popularized so-called "mixed-signal circuits," in which analog and digital circuitry are residing on the same silicon die. A typical example is WiFi chips which include a microcontroller (digital logic) where crypto and protocols are implemented together with the radio transceiver (analog logic). The special challenge of such designs is to separate the "noisy" digital circuits from the sensitive analog side of the system.
In this talk, we show that although isolation of digital and analog components is sufficient for those chips to work, it's often insufficient for them to be used securely. This leads to novel side-channel attacks that can break cryptography implemented in mixed-design chips over potentially large distances. This is crucial as the encryption of wireless communications is essential to widely used wireless technologies, such as WiFi or Bluetooth, in which mixed-design circuits are prevalent on consumer devices.
The key observation is that in mixed-design radio chips the processor's activity leaks into the analog portion of the chip, where it is amplified, up-converted and broadcast as part of the regular radio output. While this is similar to electromagnetic (EM) side-channel attacks which can be mounted only in close proximity (millimeters, and in a few cases a few meters), we show that it is possible to recover the original leaked signal over large distances on the radio. As a result, variations of known side-channel analysis techniques can be applied, effectively allowing us to retrieve the encryption key by just listening on the air with a software defined radio (SDR).
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...Silicon Labs
As new designs adopt FPGAs, SoCs, ASICs, and CPUs with higher speed SerDes, it’s becoming increasingly important to understand the impact of reference timing on overall system performance. This deck provides practical guidance on overcoming common timing design challenges by reviewing timing requirements for 10G/25G/40G/56G-based designs, explaining when to use clocks versus oscillators, highlighting system-level factors that degrade signal integrity and reviewing how to budget jitter and/or phase noise margin in order to select an optimal timing solution. This deck also explains how to use common bench equipment and software-based tools to simplify the design-in process.
Watch the complete webinar here: http://bit.ly/2zkBIHb
Best sync practices and architecture strategies for secure, resilient PNT in ...ADVA
Nino De Falcis' presentation at ION ITM/PTTI 2022 outlined strategies and technologies for ensuring resilient, secure end-to-end PNT services for power utilities.
In last 40 years, significant research have happened on how to preserve and enhance fundamental quality of voice when it traverses in "packet" form over networks. The author presents here his earlier work carried out in the context of VoATM, VoFR, VoIP. With current interest in VoLTE (Voice over LTE) and Voice-based Intelligent Systems, work on essence of voice quality in packet communication has emerged very meaningful. The article covers how Quality-of-Service could be enhanced by combating latency, jitter, noise, echo, packet error, packet loss, activity discontinuity as well as codec tandemming.
DeepALM: Holistic optical network monitoring based on machine learningADVA
At OFC, Sai Kireet Patri demonstrated a single solution capable of fiber monitoring, predictive maintenance of optical hardware and security information management. Leveraging machine learning, the system integrates ADVA’s comprehensive ALM fiber monitoring solution and its robust FSP 3000 ConnectGuard™ Optical security technology.
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationADVA
Check out the Mobile Backhaul Synchronization slides that Gil Biran will be presenting at this week's Telecordia NIST/WSTS workshop in San Jose, California
Synchronization protection & redundancy in ng networks itsf 2015Daniel Sproats
In this presentation, delivered at ITSF 2015, Nir Laufer outlines the optimum solution for synchronization protection and redundancy in next-generation networks
Conférence débat du 10 juin 2015, organisée par le groupe Réseaux et Services de Telecom ParisTech Amumni "Quels réseaux pour l'Internet des Objets ?"
présentation de Christophe Fourtet (Sigfox)
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
Standard Ethernet continues to expand its range, functionality and applications with the IEEE open standard, Time Sensitive Networking (TSN). The capabilities of TSN provide the industrial community with the ability to use standard Ethernet to support highly reliable and precise synchronized networking for industrial control. The presentation provides an update on the roadmap for TSN and an explanation around ways in which TSN enables seamless convergence within control networks. TSN updates to standard Ethernet will meet industrial control and measurement applications' needs, and solve interoperability issues by incorporating new capabilities needed in distributed systems. This presentation was held at the Hannover Messe Industry 4.0 Forum by Intel's Neil Stroud and National Instruments' Erik van Hilten.
Presentation by Steve Condra, Senior Director, Engineering and Product Management for Teleste Intercept. SCTE® LiveLearning for Professionals Webinar™ Series: Swimming Upstream: How to Boost Upstream Network Capacity, February 17th 2022
The paper presents an Arduino-based wireless sensor network to monitor parking lots using a non-standard low-power energy-balanced system. The event-driven routing protocol follows the hierarchical clustering philosophy. Energy is saved by minimising the number of transmissions needed to forward information to the base station. The smart sensor platform is build using the popular Arduino development platform, Sharp IR distance sensors and nRF24 low-power radio modules. Our practical results show that this platform is easy to use, but not the most appropriate platform to develop low-power wireless sensor network applications.
An Overview of LoRA, Sigfox, and IEEE 802.11ahFaheem Zafari
The slides provide an insight into different IoT and M2M specific protocols. Their main features and differences are highlighted. Potential research area in IEEE 802.11ah is identified. The slides also identifies the coexistence problem between Lora and Sigfox
HFC passives - Ready for DOCSIS 4.0? #TelesteLive webinar presentation May 19...Teleste Corporation
Vesa Veijalainen presented about 1.8 GHz HFC passives on the #TelesteLive webinar Network Transformation in 2020's, organized May 19, 2020. You can now watch the webinar on video as well as read answers to audience questions by clicking to: https://www.telestehub.com/broadbandvideo/telestelive-network-transformation-in-2020s/
Essential quality criteria for planning and validation of PROFINET networks
For PROFINET devices the quality criteria that are checked within the scope of the device certification are described in published specifications, standards and test specifications. Interoperability is protected by both the specification and the test procedures in the cooperation of the devices. From practical experience in the realization of network arrangements it appears that beside the device qualities also the planning quality and the quality of the validation of a whole arrangement can have an influence on the functionality.
In the task force CB / PG3 "Installation Guidelines" the suitable planning directives and introduction directives are now integrated into the quality criteria for the planning and validation of the PROFINET networks. The methods, measuring procedures and also the background will be fully explained.
Bezprzewodowa komunikacja ethernet w obszarach przemysłowychAgnieszka Kuba
Tematyka prezentacji obejmuje zagadnienia:
Obszary zastosowań
Jaką technologię transmisji wybrać? WLAN kontra Bluetooth
Charakterystyka urządzeń WLAN i Bluetooth
Topologia sieci WLAN i Bluetooth
Bezprzewodowa komunikacja Profinet
WLAN Roaming
Zastosowania specjalne
Nowe trendy w komunikacji bezprzewodowej
Technologia MIMO i SISO
In last 40 years, significant research have happened on how to preserve and enhance fundamental quality of voice when it traverses in "packet" form over networks. The author presents here his earlier work carried out in the context of VoATM, VoFR, VoIP. With current interest in VoLTE (Voice over LTE) and Voice-based Intelligent Systems, work on essence of voice quality in packet communication has emerged very meaningful. The article covers how Quality-of-Service could be enhanced by combating latency, jitter, noise, echo, packet error, packet loss, activity discontinuity as well as codec tandemming.
DeepALM: Holistic optical network monitoring based on machine learningADVA
At OFC, Sai Kireet Patri demonstrated a single solution capable of fiber monitoring, predictive maintenance of optical hardware and security information management. Leveraging machine learning, the system integrates ADVA’s comprehensive ALM fiber monitoring solution and its robust FSP 3000 ConnectGuard™ Optical security technology.
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationADVA
Check out the Mobile Backhaul Synchronization slides that Gil Biran will be presenting at this week's Telecordia NIST/WSTS workshop in San Jose, California
Synchronization protection & redundancy in ng networks itsf 2015Daniel Sproats
In this presentation, delivered at ITSF 2015, Nir Laufer outlines the optimum solution for synchronization protection and redundancy in next-generation networks
Conférence débat du 10 juin 2015, organisée par le groupe Réseaux et Services de Telecom ParisTech Amumni "Quels réseaux pour l'Internet des Objets ?"
présentation de Christophe Fourtet (Sigfox)
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
Standard Ethernet continues to expand its range, functionality and applications with the IEEE open standard, Time Sensitive Networking (TSN). The capabilities of TSN provide the industrial community with the ability to use standard Ethernet to support highly reliable and precise synchronized networking for industrial control. The presentation provides an update on the roadmap for TSN and an explanation around ways in which TSN enables seamless convergence within control networks. TSN updates to standard Ethernet will meet industrial control and measurement applications' needs, and solve interoperability issues by incorporating new capabilities needed in distributed systems. This presentation was held at the Hannover Messe Industry 4.0 Forum by Intel's Neil Stroud and National Instruments' Erik van Hilten.
Presentation by Steve Condra, Senior Director, Engineering and Product Management for Teleste Intercept. SCTE® LiveLearning for Professionals Webinar™ Series: Swimming Upstream: How to Boost Upstream Network Capacity, February 17th 2022
The paper presents an Arduino-based wireless sensor network to monitor parking lots using a non-standard low-power energy-balanced system. The event-driven routing protocol follows the hierarchical clustering philosophy. Energy is saved by minimising the number of transmissions needed to forward information to the base station. The smart sensor platform is build using the popular Arduino development platform, Sharp IR distance sensors and nRF24 low-power radio modules. Our practical results show that this platform is easy to use, but not the most appropriate platform to develop low-power wireless sensor network applications.
An Overview of LoRA, Sigfox, and IEEE 802.11ahFaheem Zafari
The slides provide an insight into different IoT and M2M specific protocols. Their main features and differences are highlighted. Potential research area in IEEE 802.11ah is identified. The slides also identifies the coexistence problem between Lora and Sigfox
HFC passives - Ready for DOCSIS 4.0? #TelesteLive webinar presentation May 19...Teleste Corporation
Vesa Veijalainen presented about 1.8 GHz HFC passives on the #TelesteLive webinar Network Transformation in 2020's, organized May 19, 2020. You can now watch the webinar on video as well as read answers to audience questions by clicking to: https://www.telestehub.com/broadbandvideo/telestelive-network-transformation-in-2020s/
Essential quality criteria for planning and validation of PROFINET networks
For PROFINET devices the quality criteria that are checked within the scope of the device certification are described in published specifications, standards and test specifications. Interoperability is protected by both the specification and the test procedures in the cooperation of the devices. From practical experience in the realization of network arrangements it appears that beside the device qualities also the planning quality and the quality of the validation of a whole arrangement can have an influence on the functionality.
In the task force CB / PG3 "Installation Guidelines" the suitable planning directives and introduction directives are now integrated into the quality criteria for the planning and validation of the PROFINET networks. The methods, measuring procedures and also the background will be fully explained.
Bezprzewodowa komunikacja ethernet w obszarach przemysłowychAgnieszka Kuba
Tematyka prezentacji obejmuje zagadnienia:
Obszary zastosowań
Jaką technologię transmisji wybrać? WLAN kontra Bluetooth
Charakterystyka urządzeń WLAN i Bluetooth
Topologia sieci WLAN i Bluetooth
Bezprzewodowa komunikacja Profinet
WLAN Roaming
Zastosowania specjalne
Nowe trendy w komunikacji bezprzewodowej
Technologia MIMO i SISO
Wireless communication is rapidly growing, making it possible to design wireless network systems that can constantly collect, analyse, evaluate and validate our environment to get more control of the factors that influence it. With over a decade of intensive research and development, wireless sensor network technology has been emerging as viable solution to many innovative applications. In this project, we have developed a wireless TV audio transceiver (transmitter to multiple receivers) using microcontroller atmega 328 and nRF24L01 module. The nRF24L01 transceiver module uses the 2.4 GHz band and it can operate with band rates from 250 kbps up to 2 Mbps. If used in closed space and with lower band rate its range can reach up to 100 meters.
Discussing the Industrial Internet and the crucial role that low-power wireless sensor networks will play to gather these vast amounts of data. Describing how existing industrial wireless technologies must be extended to reach higher scales at lower costs (albeit, with lower guarantees), and the architectural approach and standards that are being developed at 6TiSCH, which encompasses work at IETF, IEEE, and industrial standard bodies.
9.) audio video ethernet (avb cobra net dante)Jeff Green
Replacing a crossbar switch with ‘virtual’ IP packet switching - The ability to expand video-over-IP systems ‘one piece at a time’ and the decentralized nature of the matrix makes the technology very compelling for any size or scope of AV project.. AV-over-IP is the transport of AV signals over a standard Ethernet network, including…
HD Video (e.g. HDMI, DVI)
Audio
Control Signals (e.g. IR)
Peripheral Signals (e.g. USB)
Does Dante require special switches? No. We strongly recommend that Gigabit switches be used due to the clear advantages in performance and scalability.
Does Dante require a dedicated network infrastructure? No, a dedicated network infrastructure is not required. Dante-enabled devices can happily coexist with other equipment making use of the network, such as general purpose PCs sending and receiving email and other data.
Does Dante require any special network infrastructure? No, special network infrastructure is not required. Since Dante is based upon universally accepted networking standards, Dante-enabled devices can be connected using inexpensive off-the-shelf Ethernet switches and cabling.
What features are important when purchasing a switch? Dante makes use of standard Voice over IP (VoIP) Quality of Service (QoS) switch features, to prioritize clock sync and audio traffic over other network traffic. VoIP QoS features are available in a variety of inexpensive and enterprise Ethernet switches. Any switches with the following features should be appropriate for use with Dante:
Gigabit ports for inter-switch connections
Quality of Service (QoS) with 4 queues
Diffserv (DSCP) QoS, with strict priority
Totally new to AV over IT? This may help. If you have worked with any of the popular protocols, your time is better spent in other sessions. AV over IT methods vary in application of OSI model. Audio Networking - One RJ45 and CAT5 cable for dozens of signal paths. Switches can provide hardware time stamping which allows synchronization, offsets, and corrections. All covered in IEEE 1588.
Ethernet Timing & Priority Standards - All audio over Ethernet protocols require Priority, Sequence, & Sync
Differentiated Services / Quality of Service (DiffServ, QoS)
Priority by data type (Clock Sync and Audio Packets over Email)
Traffic prioritized based upon tags in IP Header (Layer 3)
Priority number assigned by manage switch to each packet
Real-time Transport Protocol (RTP)
Keeps data sequenced in the right order
Time stamp on UDP header
Works with RTCP (Real Time Control Protocol) for QoS and Sync
Variation: RTSP (Real Time Streaming Protocol) works on TCP and not UDP
Does not reserve resources or provide for quality of service
Precision Timing Protocol (PTP)
IEEE 1588
Sub-microsecond accuracy to synchronize subnets
Layer 2 - Switches provide hardware-based time stamping
[Nov./2010] Adaptive Video Streaming over Wireless LAN with ns-2 Hayoung Yoon
I was invite to give a lecture about NS-2 Simulation on adaptative multimedia delivery by KICS (The Korean Institute of Communications and Information Sciences)
Globecom 2015: Adaptive Raptor Carousel for 802.11Andrew Nix
These slides describe an adaptive raptor carousel for multicast transmission over 802.11. This work was presented by Berna Bulut at Globecom 2015, San Diego.
Link Planner Proposal Report, Estudio de Enlace Inalambrico 5.8 GHzJhon Pillaca Salazar
Estudio de un Enlace Inalambrico de 5.8 GHz realizado con Link Planner para determinar la viabilidad y el Link Budget.
Radio Mobile Perú: Realiza proyectos de telecomunicaciones a nivel nacional
Web: http: //radiomobileperu.blogspot.com/
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
Spectrum management best practices in a Gigabit wireless worldCisco Canada
With the introduction of 802.11ac the news is full of the potential for Gigabit networking. Very few of us will have the luxury of running a network that strictly supports 802.11ac and that means a mixed environment for most of us. Get the facts on what 802.11ac means to you, how to evaluate using 20, 40, 80 or 160 Mhz OBSS/Channels. How does RRM's DCA handle a mixed environment and what performance considerations do you need to consider to make decisions that make the best of the spectrum you have today and in the future. What is in the future for our spectrum? To learn more please visit our website here: http://www.cisco.com/ca/
AREA EFFICIENT 3.3GHZ PHASE LOCKED LOOP WITH FOUR MULTIPLE OUTPUT USING 45NM ...VLSICS Design
This paper present area efficient layout designs for 3.3GigaHertz (GHz) Phase Locked loop (PLL) with four multiple output. Effort has been taken to design Low Power Phase locked loop with multiple output, using VLSI technology. VLSI Technology includes process design, trends, chip fabrication, real circuit parameters, circuit design, electrical characteristics, configuration building blocks, switching circuitry, translation onto silicon, CAD and practical experience in layout design. The proposed PLL is designed using 45 nm CMOS/VLSI technology with microwind 3.1. This software allows designing and simulating an integrated circuit at physical description level. The main novelties related to the 45 nm technology are the high-k gate oxide, metal gate and very low-k interconnect dielectric. The effective gate length required for 45 nm technology is 25nm. Low Power (0.211miliwatt) phase locked loop with four multiple outputs as PLL8x, PLL4x, PLL2x, & PLL1x of 3.3 GHz, 1.65 GHz, 0.825 GHz, and 0.412 GHz respectively is obtained using 45 nm VLSI technology.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
1. doc.: IEEE 802.11-00/269
Submissio
n
Performance of Smart AntennasPerformance of Smart Antennas
and PCFand PCF
Vinayak NandikalVinayak Nandikal
Courtesy: Nokia Research CenterCourtesy: Nokia Research Center
2. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Introduction
• IEEE802.11 will be an important method for providing
high rate low mobility data services
• While existing capacity may seem high, particularly
for IEEE802.11a, the enterprise environment may
experience capacity limits
• Antenna technologies offer a means to boast
IEEE802.11 capacity without changing the existing
PHYs
3. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
What is a SMART Antenna?
AP
G S WG S W
P D E
G S WG S W
G S WG S W
G S WG S W
D X 2 0 0
STA
STA
Antenna that adjusts its beam pattern based upon the
channel and interference between AP and STA
4. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Approach to Model Performance
• Measure channel using a channel sounder to
determine
– Multipath power profile as a function of time
– Signal-to-interference ratio
• Simulate PHY to obtain PER information as a
function of channel measurements and the number of
packets delivered as a function of time
• Use PER, number of packets delivered by the PHY
as a function of time and models of real-time traffic to
examine delay and throughput using a PHY with and
without smart antennas
• PCF is used for delivery of audio and video packets
5. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
PHY Simulation Parameters
DOCUMENTTYPE 1 (1)
TypeUnitOrDepartmentHere
TypeYourNameHere TypeDateHere
Parameter Value
Data Rate 12 Mbps/channel
Packet LossRate 10-2
Channel Model experimental
Number of Antenna
Elements
4
Adjacent BSSInterference
Level
varying
Center Frequency 5.3 GHz
6. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
PHY Channel Sounder Approach
• 127 chip pn sequence is transmitted at 5.3 GHz with
a bandpass bandwidth of 30 MHz
• A 32 element array with 0.5 wavelength space is
used to downconvert the transmitted pn sequence
• Snap shots of the delay spread are written to memory
and stored on a hard disk
For further information see:
Jarmo Kivinen, Timo O. Korhonen, Pauli Aikio, Ralf Gruber,
Pertti Vainikainen, and Sven-Gustav Häggman,
IEEE Transactions on Instrumentation and Measurement,
vol. 48, no. 1, pp. 39-44, 1999.
7. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Smart Antenna Operation (5GHz)
RF A/D FFT
RF A/D FFT
RF A/D FFT
AntennaCombining
Weight
Calculation
[ ] [ ] [ ]pkxkwpky n
N
n
n
,,
1
*
∑=
=
Decoding
[ ]pkx ,1
[ ]pkx ,2
[ ]pkxN ,
[ ]kw
STA
[ ]kH1
[ ]kH2
[ ]kHN
[ ]kc
STA
[ ]kH1
[ ]kH2
[ ]kHN
OFDM Symbol IndexSubcarrier
D/A RF
D/A RF
D/A RF
IFFT
IFFT
IFFT
AntennaWeighting
Coding &
Modulation
[ ]kH1
[ ]kH2
[ ]kHN
STA
STA
Uplink Operation
Downlink Operation
8. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Channel Correlation
• The figure to the right
shows the correlation
coefficient for different
measurement
environments
• For smart antenna
operation, the AP needs
the ability to probe the
channel between any
STA and AP
0 50 100 150 200 250 300 350 400 450
0.93
0.94
0.95
0.96
0.97
0.98
0.99
1
time [ms]
amplitudecorrelationcoefficient
average over TX positions
Ruoholahti
Heikkilä ntie
Airport
Airport 2
Note: Ruholahti and Heikkiläntie are Nokia office buildings
9. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
MAC Simulation Parameters
DOCUMENTTYPE 1 (1)
TypeUnitOrDepartmentHere
TypeYourNameHere TypeDateHere
Parameter Value
Speech Packet Size 640 bits
Video Packet Size 3.8 kb
CFP 1.5 ms
Packet Buffer Lifetime Audio: 5 ms
Video: 100 ms
CFPRepetition Interval 3 ms
Average # of Speech STAs 10/30 users
Average# of Video STAs 10/30 users
10. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Traffic Model:
• All traffic measured in data-units/slot-time
– 1 data-unit takes 1 slot-time for transmission
– Max traffic in network = 1.0
• Audio and video traffic originates from “calls” made
by the user
• Calls are Poisson distributed; once placed, each call
generates periodic packet traffic
• Mean inter-call-arrival-time controls load on the
network
11. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Traffic Model (cont.):
• Real-time traffic load =
+
+
+ vcallsacalls
vcalls
x
timearvlvpkt
szvpkt
vcallsacalls
acalls
x
timearvlapkt
szapkt
X
timearvlcall
durncall
___
_
___
_
___
_
intint
int
apkt_sz: audio packet size
vpkt_sz: video packet size
int_call_arvl_time: mean intercall arrival time (8:1 ratio between audio and video calls)
int_apkt_arvl_time, int_vpkt_arvl_time: arrival time between audio packets and video packets respectively
acalls, vcalls: number of audio anc video calls respectively
16. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
New Control Frame Subtypes for
Smart Antennas
• AP to STA
– A message requesting the STA to transmit a
preamble (null frame) for channel estimation
– Channel Id Request
• STA to AP
– A response to the above request
– Channel Id Response
Duration RA TA FCS
Message Fields Frame
Control
17. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Remove Polling Dependence
• The existing standards reads,
"During each CFP, the PC shall issue polls to a
subset of the STAs on the polling list in order by
ascending AID value".
18. March 31, 2015
Vinayak NandikalSlid
doc.: IEEE 802.11-00/269
Submissio
n
Conclusions
• Particularly in a large enterprise environment, smart
antennas can help boast capacity
– Wireless office replacement for "wired" Ethernet
– Public service networks such as airports
• Changes to the existing MAC are minor to enable
antenna technologies in IEEE802.11a networks
• SDMA is not for all WLANS
– Multiple antennas cost additional money for the
AP that may not be required in homes and small
businesses