On the performance of non-orthogonal multiple access (NOMA) using FPGAIJECEIAES
In this paper, non-orthogonal multiple access (NOMA) is designed and implemented for the fifth generation (5G) of multi-user wireless communication. Field-programmable gate array (FPGA) is considered for the implementation of this technique for two users. NOMA is applied in downlink phase of the base-station (BS) by applying power allocation mechanism for far and near users, in which one signal contains the superposition of two scaled signals depending on the distance of each user from the BS. We assume an additive white Gaussian noise (AWGN) channel for each user in the presence of the interference due to the non-orthogonality between the two users’ signals. Therefore, successive-interference cancellation (SIC) is exploited to remove the undesired signal of the other user. The outage probability and the biterror rate performance are presented over different signal-to-interference-plus-noise ratio (SINR). Furthermore, Monte-Carlo simulations via Matlab are utilized to verify the results obtained by FPGA, which show exact-close match.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
On the performance of non-orthogonal multiple access (NOMA) using FPGAIJECEIAES
In this paper, non-orthogonal multiple access (NOMA) is designed and implemented for the fifth generation (5G) of multi-user wireless communication. Field-programmable gate array (FPGA) is considered for the implementation of this technique for two users. NOMA is applied in downlink phase of the base-station (BS) by applying power allocation mechanism for far and near users, in which one signal contains the superposition of two scaled signals depending on the distance of each user from the BS. We assume an additive white Gaussian noise (AWGN) channel for each user in the presence of the interference due to the non-orthogonality between the two users’ signals. Therefore, successive-interference cancellation (SIC) is exploited to remove the undesired signal of the other user. The outage probability and the biterror rate performance are presented over different signal-to-interference-plus-noise ratio (SINR). Furthermore, Monte-Carlo simulations via Matlab are utilized to verify the results obtained by FPGA, which show exact-close match.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Outage performance analysis of non-orthogonal multiple access systems with RF...IJECEIAES
Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
One of the main challenges faced by the developing (3GPP-LTE-Advanced) standard is providing high throughput at the cell edge.
One solution to improve coverage is the use of fixed relays.
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
This paper provides analysis of BER and Number of Errors for MIMO-OFDM wireless communication system by using different modulation techniques. Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. So the performances of the wireless communication systems can be enhanced by using multiple transmit and receive antennas, which is generally referred to as the MIMO technique. Here analysis will be carried out for an OFDM wireless communication system using different modulation techniques and considering the effect and the wireless channel like AWGN, fading. Performance results will be evaluated numerically and graphically using the plots of BER versus SNR and plots of number of errors versus SNR.
In Frequency-division multiple access (FDMA), the available channel bandwidth is divided into many non overlapping frequency bands, where each band is dynamically assigned to a specific user to transmit data.
Like FDM, OFDM uses multiple subcarriers BUT:
There are closely spaces to each other without causing interference, removing guard bands.
Its possible because subcarriers are orthogonal.
OFDMA allocates multi-user in time domain as well in frequency domain. OFDMA is a very popular Multiplexing method used for many of the latest wireless and telecommunication standards,
Deterministic MIMO Channel Capacity
• CSI is Known to the Transmitter Side
• CSI is Not Available at the Transmitter Side
Channel Capacity of Random MIMO Channels
Optical channel Capacity of MIMO system
This ppt is useful for all candidates of Electronics and Communication Engineering. It contains theory and mathematical
derivation of complete syllabus.
One of the main challenges faced by the developing (3GPP-LTE-Advanced) standard is providing high throughput at the cell edge.
One solution to improve coverage is the use of fixed relays.
COMPARISON OF BER AND NUMBER OF ERRORS WITH DIFFERENT MODULATION TECHNIQUES I...Sukhvinder Singh Malik
This paper provides analysis of BER and Number of Errors for MIMO-OFDM wireless communication system by using different modulation techniques. Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. So the performances of the wireless communication systems can be enhanced by using multiple transmit and receive antennas, which is generally referred to as the MIMO technique. Here analysis will be carried out for an OFDM wireless communication system using different modulation techniques and considering the effect and the wireless channel like AWGN, fading. Performance results will be evaluated numerically and graphically using the plots of BER versus SNR and plots of number of errors versus SNR.
In Frequency-division multiple access (FDMA), the available channel bandwidth is divided into many non overlapping frequency bands, where each band is dynamically assigned to a specific user to transmit data.
Like FDM, OFDM uses multiple subcarriers BUT:
There are closely spaces to each other without causing interference, removing guard bands.
Its possible because subcarriers are orthogonal.
OFDMA allocates multi-user in time domain as well in frequency domain. OFDMA is a very popular Multiplexing method used for many of the latest wireless and telecommunication standards,
Deterministic MIMO Channel Capacity
• CSI is Known to the Transmitter Side
• CSI is Not Available at the Transmitter Side
Channel Capacity of Random MIMO Channels
Optical channel Capacity of MIMO system
This ppt is useful for all candidates of Electronics and Communication Engineering. It contains theory and mathematical
derivation of complete syllabus.
A family of operating systems developed and produced by Microsoft Corp. It provides a software graphical user interface (GUI) used on IBM and compatible computers.
An electron gun generates an electron beam that is interacting with a slow-wave structure.
It sustains the oscillations by propagating a traveling wave backwards against the beam
. The generated electromagnetic wave power has its group velocity directed oppositely to the direction of motion of the electrons.
The output power is coupled out near the electron gun.
Interstage buffer B1 feeds the Decode stage with a newly-fetched instruction.
Interstage buffer B2 feeds the Compute stage with the two operands
Interstage buffer B3 holds the result of the ALU operation
Interstage buffer B4 feeds the Write stage with a value to be written into the register file
Challenges for Educators in 21st Centaury Skill Education AJAL A J
Digital Literacy
Critical thinking and problem Solving
Effective oral and written communication
Collaboration across networks and leading by influence
Accessing and analyzing information's
Ability to survive
Curiosity and imagination
Entrepreneurialism
Frequency Independent Antennas:
Wide band antennas
Frequency independent bandwidth in octave range
Broadband antennas
Frequency independent bandwidth in the range 40:1
Multiband antennas
Antenna resonate at different frequencies.
In statically induced emf, conductor is stationary with respect to the magnetic field.
Transformer is an example of statically induced emf. Here the windings are stationary,magnetic field is moving around the conductor and produces the emf.
Social network based astrology consultation ( through skype/ google hangout / Facebook/ whatsapp) for busy people who do not get time to meet an astrologer
connectivity to a few major cities with 5 to 10 lakhs or above population and high internet penetration
The medium we use will be English.
astrology is one of the fastest growing industries in India with cash flows of more than Rs.40000 crore
Exhibit quiet confidence.
Organize your thoughts and apply your knowledge, skills and abilities.
Think globally! Relate “outside” experiences to demonstrate your qualifications.
Electromagnetic Flow meters
Blood flow helps to understand basic physiological processes and e.g. the dissolution of a medicine into the body.
Blood flow and changes in blood volume, are usually correlated with concentration of nutrients and other substance in the blood.
Also, Blood Flow measurement reflects the concentration of O2.
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated cycle
There are three classes of hazards
Structural hazard
Data hazard
Branch hazard
Loss of strength, A periodic reduction in the received strength of a radio transmission.
This is about the phenomenon of loss of signal in telecommunications.Fading refers to the
time variation of the received signal power caused by changes in the transmission medium or path.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Course Objective
• Past decade has seen a surge of research activities in
the field of wireless communication.
• Emerging from this research thrust are new points of
view on how to communicate effectively over wireless
channels.
• The goal of this course is to study in a unified way the
fundamentals as well as the new research
developments.
• The concepts are illustrated using examples from
several modern wireless systems (GSM, IS-95, CDMA
2000 1x EV-DO, Flarion's Flash OFDM, ArrayComm
systems.)
3. Course Outline
Part I: Basics
1. The Wireless Channel
2. Diversity
3. Capacity of Wireless Channels
4. Course Outline (2)
Part II: MIMO
4. Spatial Multiplexing and Channel Modelling
5. Capacity and Multiplexing Architectures
6. Diversity-Multiplexing Tradeoff
5. Course Outline (3)
Part III: Wireless Networks
7. Multiple Access and Interference Management: A
comparison of 3 systems.
8. Opportunistic Communication and Multiuser Diversity
6. This short course only gives an overview of the ideas.
Full details can be found in
D. Tse and P. Viswanath, Fundamentals of Wireless
Communication, Cambridge University Press, 2005.
http://www.eecs.berkeley.edu/~dtse
9. Large-scale fading
• In free space, received power attenuates like 1/r2.
• With reflections and obstructions, can attenuate even
more rapidly with distance. Detailed modelling
complicated.
• Time constants associated with variations are very long
as the mobile moves, many seconds or minutes.
• More important for cell site planning, less for
communication system design.
10. Small-scale multipath fading
• Wireless communication typically happens at very high
carrier frequency. (eg. fc = 900 MHz or 1.9 GHz for
cellular)
• Multipath fading due to constructive and destructive
interference of the transmitted waves.
• Channel varies when mobile moves a distance of the
order of the carrier wavelength. This is about 0.3 m for
900 Mhz cellular.
• For vehicular speeds, this translates to channel variation
of the order of 100 Hz.
• Primary driver behind wireless communication system
design.
11. Game plan
• We wish to understand how physical parameters such as
carrier frequency, mobile speed, bandwidth, delay
spread impact how a wireless channel behaves from the
communication system point of view.
• We start with deterministic physical model and progress
towards statistical models, which are more useful for
design and performance evaluation.
12. Physical Models
• Wireless channels can be modeled as linear time-
varying systems:
where ai(t) and τi(t) are the gain and delay of path i.
• The time-varying impulse response is:
• Consider first the special case when the channel is time-
invariant:
13. Passband to Baseband Conversion
• Communication takes place at [f_c-W/2, f_c+ W/2].
• Processing takes place at baseband [-W/2,W/2].
14. Baseband Equivalent Channel
• The frequency response of the system is shifted from the
passband to the baseband.
• Each path is associated with a delay and a complex
gain.
16. Multipath Resolution
Sampled baseband-equivalent channel model:
where hl is the l th complex channel tap.
and the sum is over all paths that fall in the delay bin
System resolves the multipaths up to delays of 1/W .
17. Flat and Frequency-Selective Fading
• Fading occurs when there is destructive interference of
the multipaths that contribute to a tap.
23. Statistical Models
• Design and performance analysis based on statistical
ensemble of channels rather than specific physical
channel.
• Rayleigh flat fading model: many small scattered paths
Complex circular symmetric Gaussian .
• Rician model: 1 line-of-sight plus scattered paths
24. Correlation over Time
• Specified by autocorrelation
function and power spectral
density of fading process.
• Example: Clarke’s (or Jake’s)
model.
25. Additive Gaussian Noise
• Complete baseband-equivalent channel model:
• Special case: flat fading:
• Will use this throughout the course.
27. Main story
• Communication over a flat fading channel has poor
performance due to significant probability that channel is
in deep fading.
• Reliability is increased by providing more signal paths
that fade independently.
• Diversity can be provided across time, frequency and
space.
• Name of the game is how to exploit the added diversity
in an efficient manner.
28. Baseline: AWGN Channel
y = x+ w
BPSK modulation x = ± a
Error probability decays exponentially with SNR.
33. BPSK, QPSK and 4-PAM
• BPSK uses only the I-phase.The Q-phase is wasted.
• QPSK delivers 2 bits per complex symbol.
• To deliver the same 2 bits, 4-PAM requires 4 dB more transmit power.
• QPSK exploits the available degrees of freedom in the channel better.
34. Time Diversity
• Time diversity can be obtained by interleaving and coding over
symbols across different coherent time periods.
35. Example:GSM
• Amount of diversity limited by delay constraint and how fast
channel varies.
• In GSM, delay constraint is 40ms (voice).
• To get full diversity of 8, needs v > 30 km/hr at fc = 900Mhz.
40. Beyond Repetition Coding
• Repetition coding gets full diversity, but sends only one
symbol every L symbol times: does not exploit fully the
degrees of freedom in the channel.
• How to do better?
47. Space-time Codes
• Transmitting the same symbol simultaneously at the
antennas doesn’t work.
• Using the antennas one at a time and sending the same
symbol over the different antennas is like repetition
coding.
• More generally, can use any time-diversity code by
turning on one antenna at a time.
50. Cooperative Diversity
• Different users can form a distributed antenna array to
help each other in increasing diversity.
• Distributed versions of space-time codes may be
applicable.
• Interesting characteristics:
– Users have to exchange information and this consumes
bandwidth.
– Operation typically in half-duplex mode
– Broadcast nature of the wireless medium can be exploited.
53. ISI Equalization
• Suppose a sequence of uncoded symbols are
transmitted.
• Maximum likelihood sequence detection is performed
using the Viterbi algorithm.
• Can full diversity be achieved?
58. Channel Uncertainty
• In fast varying channels, tap gain measurement errors
may have an impact on diversity combining performance
• The impact is particularly significant in channel with
many taps each containing a small fraction of the total
received energy. (eg. Ultra-wideband channels)
60. Information Theory
• So far we have only looked at uncoded or simple coding
schemes.
• Information theory provides a fundamental
characterization of coded performance.
• It succintly identifies the impact of channel resources on
performance as well as suggests new and cool ways to
communicate over the wireless channel.
• It provides the basis for the modern development of
wireless communication.
77. Summary
• A slow fading channel is a source of unreliability: very
poor outage capacity. Diversity is needed.
• A fast fading channel with only receiver CSI has a
capacity close to that of the AWGN channel: only a small
penalty results from fading. Delay is long compared to
channel coherence time.
• A fast fading channel with full CSI can have a capacity
greater than that of the AWGN channel: fading now
provides more opportunities for performance boost.
• The idea of opportunistic communication is even more
powerful in multiuser situations, as we will see.
78. 4. MIMO I: Spatial Multiplexing and
Channel Modeling
79. Main Story
• So far we have only considered single-input multi-output
(SIMO) and multi-input single-output (MISO) channels.
• They provide diversity and power gains but no degree-
of-freedom (d.o.f.) gain.
• D.o.f gain is most useful in the high SNR regime.
• MIMO channels have a potential to provide d.o.f gain.
• We would like to understand how the d.o.f gain depends
on the physical environment and come up with statistical
models that capture the properties succinctly.
• We start with deterministic models and then progress to
statistical ones.
101. Outline
• Capacity of MIMO channels
• Nature of performance gains
• Receiver architectures for fast fading (V-BLAST family)
• Transceiver architecture for slow fading (D-BLAST)
• More on performance in slow fading in next section.
102. Transmitter and Receiver CSI
• Can decompose the MIMO channel into a bunch of orthogonal
sub-channels.
• Can allocate power and rate to each sub-channel according to
waterfilling
116. Gap at High SNR
• MMSE improves the performance of decorrelator at moderate and
low SNR.
• Does not remove the gap in performance at high SNR
• To remove that gap we have to go to non-linear receivers.
120. Uplink Architectures
• So far we have considered point-to-point
communication.
• But since we are sending independent
streams from each transmit antennas, we
can use the receiver structures for the uplink
with multiple users.
• This is called space-division multiple access
(SDMA)
• Several simultaneous users can be
supported.
• Linear MMSE also called receive
beamforming.
121. Downlink
• In the uplink, transmitters cannot
cooperate, but receiver can jointly
process the received signal at all the
antennas.
• In the downlink, it is the receivers that
cannot cooperate.
• If the transmitter does not track the
channel, cannot do SDMA on the
downlink.
• If it does, can use techniques
reciprocal to the uplink.
124. Example: ArrayComm
• SDMA overlay on Japan’s PHS system, also a newer
data system (iBurst)
• Up to 12 antennas at BS, with up to 4 users
simultaneously in SDMA.
• Antennas also used to null out inter-cell interference,
increasing frequency-reuse factor (from 1/8 to 1 in PHS)
• System is TDD.
• Channel is measured from pilot in uplink, and used in
downlink transmit beamforming.
125. Uplink-Downlink Duality
• Linear receive beamforming strategies for the uplink map
to linear transmit beamforming strategies in the
downlink.
• But in the uplink we can improve performance by doing
successive interference cancellation at the receiver
• Is there a dual to this strategy in the downlink?
126. Transmit Precoding
• In downlink transmit beamforming, signals for different
users interfere with each other.
• A user is in general not able to decode information for
other users to cancel them off.
• However, the transmitter knows the information to be
transmitted for every user and can precode to cancel at
the transmitter.
130. Writing on Dirty Paper
• Can extend this idea to block precoding.
• Problem is to design codes which are simultaneously
good source codes (vector quantizers) as well as good
channel codes.
• Very active research area.
• Somewhat surprising, information theory guarantees that
one can get to the capacity of the AWGN channel with
the interference completely removed.
132. Slow Fading MIMO Channel
• So far we have emphasized the spatial multiplexing
aspect of MIMO channels.
• But we also learnt that in slow fading scenario, diversity
is an important thing.
• How do the two aspects interact?
• It turns out that you can get both in a slow fading
channel but there is a fundamental tradeoff.
• We characterize the optimal tradeoff and find schemes
that approach the optimal tradeoff.
133. Diversity and Freedom
Two fundamental resources of a MIMO fading channel:
diversity
degrees of freedom
134. Diversity
Channel Quality
t
A channel with more diversity has smaller probability in deep fades.
135. Diversity
Fading Channel: h 1
• Additional independent channel paths increase diversity.
• Spatial diversity: receive, transmit or both.
• For a m by n channel, maximum diversity is mn.
136. Diversity
Fading Channel: h 1
Fading Channel: h 2
• Additional independent fading channels increase diversity.
• Spatial diversity: receive, transmit or both.
• For a m by n channel, maximum diversity is mn.
137. Diversity
Fading Channel: h 1
Fading Channel: h 2
• Additional independent fading channels increase diversity.
• Spatial diversity : receive, transmit or both.
• For a m by n channel, maximum diversity is mn.
138. Diversity
Fading Channel: h 1
Fading Channel: h 2
• Additional independent fading channels increase diversity.
• Spatial diversity: receive, transmit or both.
• For a m by n channel, maximum diversity is mn.
139. Diversity
Fading Channel: h 1
Fading Channel: h 2
Fading Channel: h 3
Fading Channel: h 4
• Additional independent fading channels increase diversity.
• Spatial diversity: receive, transmit or both.
• For a m by n channel, maximum diversity is mn.
140. Diversity
Fading Channel: h 1
Fading Channel: h 2
Fading Channel: h 3
Fading Channel: h 4
• Additional independent fading channels increase diversity.
• Spatial diversity: receive, transmit or both.
• For a m by n channel, diversity is mn.
141. Degrees of Freedom
y2
y1
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
142. Degrees of Freedom
y2
Signature 1
y1
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
143. Degrees of Freedom
y2
Signature 1
y1
Signature 2
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
144. Degrees of Freedom
y2 Signature 1
Signature 2
y1
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
145. Degrees of Freedom
y2
Signature 1
Fading
Environment y1
Signature 2
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
146. Degrees of Freedom
y2
Signature 1
Fading
Environment y1
Signature 2
Signals arrive in multiple directions provide multiple degrees of freedom
for communication.
Same effect can be obtained via scattering even when antennas are
close together.
In a m by n channel with rich scattering, there are min{m, n} degrees of
freedom.
147. Diversity and Freedom
In a MIMO channel with rich scattering:
maximum diversity = mn
degrees of freedom = min{m, n}
The name of the game in space-time coding is to design schemes which
exploit as much of both these resources as possible.
148. Space-Time Code Examples: 2 × 1 Channel
Repetition Scheme: Alamouti Scheme:
time time
x1 0 x 1 -x *
2
X= X=
0 x1 x2 x*
1
space space
diversity: 2 diversity: 2
data rate: 1/2 sym/s/Hz data rate: 1 sym/s/Hz
150. Space-Time Code Examples: 2 × 2 Channel
Repetition Scheme: Alamouti Scheme:
time time
x1 0 x 1 -x *
2
X= X=
0 x1 x2 x*
1
space space
diversity gain : 4 diversity gain : 4
data rate: 1/2 sym/s/Hz data rate: 1 sym/s/Hz
But the 2 × 2 channel has 2 degrees of freedom!
151. Space-Time Code Examples: 2 × 2 Channel
Repetition Scheme: Alamouti Scheme:
time time
x1 0 x 1 -x *
2
X= X=
0 x1 x2 x*
1
space space
diversity: 4 diversity: 4
data rate: 1/2 sym/s/Hz data rate: 1 sym/s/Hz
But the 2 × 2 channel has 2 degrees of freedom!
152. V-BLAST with Nulling
Send two independent uncoded streams over the two transmit antennas.
Demodulate each stream by nulling out the other stream.
Data rate: 2 sym/s/Hz
Diversity: 1
Winters, Salz and Gitlins 93:
Nulling out k interferers using n receive antennas yields a diversity gain
of n − k.
153. Performance Summary: 2 × 2 Channel
Diversity gain d.o.f. utilized /s/Hz
Repetition 4 1/2
Alamouti 4 1
V-Blast with nulling 1 2
channel itself 4 2
Questions:
• Alaomuti is clearly better than repetition, but how can it be
compared to V-Blast?
• How does one quantify the “optimal” performance achievable by
any scheme?
• We need to make the notions of “fiversity gain” and “d.o.f.
utilized” precise and enrich them.
154. Performance Summary: 2 × 2 Channel
Diversity gain d.o.f. utilized /s/Hz
Repetition 4 1/2
Alamouti 4 1
V-Blast with nulling 1 2
channel itself 4 2
Questions:
• Alaomuti is clearly better than repetition, but how can it be
compared to V-Blast?
• How does one quantify the “optimal” performance achievable by
any scheme?
• We need to make the notions of “fiversity gain” and “d.o.f.
utilized” precise and enrich them.
155. Performance Summary: 2 × 2 Channel
Diversity gain d.o.f. utilized /s/Hz
Repetition 4 1/2
Alamouti 4 1
V-Blast with nulling 1 2
channel itself 4 2
Questions:
• Alaomuti is clearly better than repetition, but how can it be
compared to V-Blast?
• How does one quantify the “optimal” performance achievable by
any scheme?
• We need to make the notions of “fiversity gain” and “d.o.f.
utilized” precise and enrich them.
156. Classical Diversity Gain
Motivation: PAM
y = hx + w Pe ≈ P ( h is small ) ∝ SNR−1
y1 = h1 x + w1 Pe ≈ P ( h1 , h2 are both small)
y2 = h2 x + w2 ∝ SNR−2
Definition
A space-time coding scheme achieves (classical) diversity gain d, if
Pe (SNR) ∼ SNR−d
for a fixed data rate .
i.e. error probability deceases by 2− d for every 3 dB increase in SNR, by
1/4d for every 6dB increase, etc.
157. Classical Diversity Gain
Motivation: PAM
y = hx + w Pe ≈ P ( h is small ) ∝ SNR−1
y1 = h1 x + w1 Pe ≈ P ( h1 , h2 are both small)
y2 = h2 x + w2 ∝ SNR−2
General Definition
A space-time coding scheme achieves (classical) diversity gain dmax , if
Pe (SNR) ∼ SNR−dmax
for a fixed data rate.
i.e. error probability deceases by 2−dmax for every 3 dB increase in SNR,
by 4−dmax for every 6dB increase, etc.
158. Example: PAM vs QAM in 1 by 1 Channel
Every 6 dB increase in SNR doubles the distance between constellation
points for a given rate.
1
Pe ↓ 4
PAM
-a +a -2a +2a
Both PAM and QAM have the same (classical) diversity gain of 1.
(classical) diversity gain does not say anything about the d.o.f. utilized
by the scheme.
159. Example: PAM vs QAM in 1 by 1 Channel
Every 6 dB increase in SNR doubles the distance between constellation
points for a given rate.
1
Pe ↓ 4
PAM
-a +a -2a +2a
1
Pe ↓ 4
QAM
Both PAM and QAM have the same (classical) diversity gain of 1.
(classical) diversity gain does not say anything about the d.o.f. utilized
by the scheme.
160. Example: PAM vs QAM in 1 by 1 Channel
Every 6 dB increase in SNR doubles the distance between constellation
points for a given rate.
1
Pe ↓ 4
PAM
-a +a -2a +2a
1
Pe ↓ 4
QAM
Both PAM and QAM have the same (classical) diversity gain of 1.
(classical) diversity gain does not say anything about the d.o.f. utilized
by the scheme.
161. Ask a Dual Question
Every 6 dB doubles the constellation size for a given reliability, for PAM.
+1 bit
PAM
-a +a -3a -a +a +3a
But for QAM, every 6 dB quadruples the constellation size.
162. Ask a Dual Question
Every 6 dB doubles the constellation size for a given reliability, for PAM
+1 bit
PAM
-a +a ∼-3a ∼-a ∼+a ∼+3a
+2 bits
QAM
But for QAM, every 6 dB quadruples the constellation size.
163. Degrees of Freedom Utilized
Definition:
A space-time coding scheme utilizes rmax degrees of freedom/s/Hz if
the data rate scales like
R(SNR) ∼ rmax log2 SNR bits/s/Hz
for a fixed error probability (reliability)
In a 1 × 1 channel, rmax = 1/2 for PAM, rmax = 1 for QAM.
Note: A space-time coding scheme is a family of codes within a certain
structure, with varying symbol alphabet as a function of SNR.
164. Degrees of Freedom Utilized
Definition:
A space-time coding scheme utilizes rmax degrees of freedom/s/Hz if
the data rate scales like
R(SNR) ∼ rmax log2 SNR bits/s/Hz
for a fixed error probability (reliability)
In a 1 × 1 channel, rmax = 1/2 for PAM, rmax = 1 for QAM.
Note: A space-time coding scheme is a family of codes within a certain
structure, with varying symbol alphabet as a function of SNR.
165. Diversity-Multiplexing Tradeoff
Every 3 dB increase in SNR yields
either
a 2−dmax decrease in error probability for a fixed rate;
or
rmax additional bits/s/Hz for a fixed reliability.
But these are two extremes of a rate-reliability tradeoff.
More generally, one wants to increase reliability and the data rate at the
same time.
166. Diversity-Multiplexing Tradeoff
Every 3 dB increase in SNR yields
either
a 2−dmax decrease in error probability for a fixed rate;
or
rmax additional bits/s/Hz for a fixed reliability.
But these are two extremes of a rate-reliability tradeoff.
More generally, one wants to increase reliability and the data rate at the
same time.
167. Diversity-Multiplexing Tradeoff
Every 3 dB increase in SNR yields
either
a 2−dmax decrease in error probability for a fixed rate;
or
rmax additional bits/s/Hz for a fixed reliability.
But these are two extremes of a rate-reliability tradeoff.
More generally, one can increase reliability and the data rate at the
same time.
168. Diversity-Multiplexing Tradeoff of A Scheme
(Zheng and Tse 03)
Definition
A space-time coding scheme achieves a diversity-multiplexing tradeoff
curve d(r) if for each multiplexing gain r, simultaneously
R(SNR) ∼ r log2 SNR bits/s/Hz
and
Pe (SNR) ∼ SNR−d(r) .
The largest multiplexing gain is rmax , the d.o.f. utilized by the scheme.
The largest diversity gain is dmax = d(0), the classical diversity gain.
169. Diversity-Multiplexing Tradeoff of A Scheme
(Zheng and Tse 03)
Definition
A space-time coding scheme achieves a diversity-multiplexing tradeoff
curve d(r) if for each multiplexing gain r, simultaneously
R(SNR) ∼ r log2 SNR bits/s/Hz
and
Pe (SNR) ∼ SNR−d(r) .
The largest multiplexing gain is rmax , the d.o.f. utilized by the scheme.
The largest diversity gain is dmax = d(0), the classical diversity gain.
170. Diversity-Multiplexing Tradeoff of the Channel
Definition
The diversity-multiplexing tradeoff d∗ (r) of a MIMO channel is the best
possible diversity-multiplexing tradeoff achievable by any scheme.
∗
rmax is the largest multiplexing gain achievable in the channel.
d∗ ∗
max = d (0) is the largest diversity gain achievable.
For a m × n MIMO channel, it is not difficult to show:
∗
rmax = min{m, n}
d∗
max = mn
What is more interesting is how the entire curve looks like.
171. Diversity-Multiplexing Tradeoff of the Channel
Definition
The diversity-multiplexing tradeoff d∗ (r) of a MIMO channel is the best
possible diversity-multiplexing tradeoff achievable by any scheme.
∗
rmax is the largest multiplexing gain achievable in the channel.
d∗ ∗
max = d (0) is the largest diversity gain achievable.
For a m × n MIMO channel, it is not difficult to show:
∗
rmax = min{m, n}
d∗
max = mn
What is more interesting is how the entire curve looks like.
181. ML vs Nulling in V-Blast
d*(r)
V−BLAST(ML)
Diversity Gain:
(0,2)
V−BLAST(Nulling)
(0,1)
(2,0)
Spatial Multiplexing Gain: r=R/log SNR
Winters, Salz and Gitlins 93:
Nulling out k interferers using n receive antennas provides a diversity
gain of n − k.
Tse,Viswanath and Zheng 03:
Jointly detecting all users provides a diversity gain of n to each.
There is free lunch. (?)
182. ML vs Nulling in V-Blast
d*(r)
V−BLAST(ML)
Diversity Gain:
(0,2)
V−BLAST(Nulling)
(0,1)
(2,0)
Spatial Multiplexing Gain: r=R/log SNR
Winters, Salz and Gitlins 93:
Nulling out k interferers using n receive antennas provides a diversity
gain of n − k.
Tse,Viswanath and Zheng 03:
Jointly detecting all users provides a diversity gain of n to each.
There is free lunch. (?)
183. ML vs Nulling in V-Blast
d*(r)
V−BLAST(ML)
Diversity Gain:
(0,2)
V−BLAST(Nulling)
(0,1)
(2,0)
Spatial Multiplexing Gain: r=R/log SNR
Winters, Salz and Gitlins 93:
Nulling out k interferers using n receive antennas provides a diversity
gain of n − k.
Tse,Viswanath and Zheng 03:
Jointly detecting all users provides a diversity gain of n to each.
There is free lunch. (?)
184. Optimal D-M Tradeoff for General m × n Channel
(Zheng and Tse 03)
As long as block length l ≥ m + n − 1:
(0,mn)
d (r)
*
Diversity Gain:
(min{m,n},0)
Spatial Multiplexing Gain: r=R/log SNR
For integer r, it is as though r transmit and r receive antennas were
dedicated for multiplexing and the rest provide diversity.
185. Optimal D-M Tradeoff for General m × n Channel
(Zheng and Tse 03)
As long as block length l ≥ m + n − 1:
(0,mn)
(1,(m−1)(n−1))
d (r)
*
Diversity Gain:
(min{m,n},0)
Spatial Multiplexing Gain: r=R/log SNR
For integer r, it is as though r transmit and r receive antennas were
dedicated for multiplexing and the rest provide diversity.
186. Optimal D-M Tradeoff for General m × n Channel
(Zheng and Tse 03)
As long as block length l ≥ m + n − 1:
(0,mn)
(1,(m−1)(n−1))
d (r)
*
Diversity Gain:
(2, (m−2)(n−2))
(min{m,n},0)
Spatial Multiplexing Gain: r=R/log SNR
For integer r, it is as though r transmit and r receive antennas were
dedicated for multiplexing and the rest provide diversity.
187. Optimal D-M Tradeoff for General m × n Channel
(Zheng and Tse 03)
As long as block length l ≥ m + n − 1:
(0,mn)
(1,(m−1)(n−1))
d (r)
*
Diversity Gain:
(2, (m−2)(n−2))
(r, (m−r)(n−r))
(min{m,n},0)
Spatial Multiplexing Gain: r=R/log SNR
For integer r, it is as though r transmit and r receive antennas were
dedicated for multiplexing and the rest provide diversity.
188. Optimal D-M Tradeoff for General m × n Channel
(Zheng and Tse 03)
As long as block length l ≥ m + n − 1:
(0,mn)
(1,(m−1)(n−1))
d (r)
*
Diversity Gain:
(2, (m−2)(n−2))
(r, (m−r)(n−r))
(min{m,n},0)
Spatial Multiplexing Gain: r=R/log SNR
For integer r, it is as though r transmit and r receive antennas were
dedicated for multiplexing and the rest provide diversity.
189. Achieving Optimal Diversity-Multiplexing Tradeoff
• Hao and Wornell 03: MIMO rotation code (2 × 2 channel only).
• Tavildar and Viswanath 04: D-Blast plus permutation code.
• El Gamal, Caire and Damen 03: Lattice codes.
191. Tavildar and Viswanth 04
• First use D-Blast to convert the MIMO channel into a parallel
channel.
• Then design permutation codes to achieve the optimal
diversity-multiplexing tradeoff on the parallel channel.
196. Original D-Blast is sub-optimal.
D-Blast with MMSE suppression is information lossless
h11 g1
h12 D−BLAST
h21
h22 g2
197. Permutation Coding for Parallel Channel
The channel is parallel but the fading at the different sub-channels are
correlated.
Nevertheless it is shown that the permutation codes can achieve the
optimal diversity-multiplexing tradeoff of the parallel channel.
⊕ ⊗ ♣ ♠
⊕ ⊗
♣ ♠ ¶
¶
198. Conclusion
Diversity-multiplexing tradeoff is a unified way to look at space-time
code design for MIMO channels.
It puts diversity and multiplexing on an equal footing.
It provides a framework to compare existing schemes as well as
stimulates the design of new schemes.
200. Cellular Systems
• So far we have focused on point-to-point
communication.
• In a cellular system, additional issues come into
forefront:
– Multiple access
– Inter-cell interference management
201. Some History
• Cellular concept (Bell Labs, early 70’s)
• AMPS (analog, early 80’s)
• GSM (digital, narrowband, late 80’s)
• IS-95 (digital, wideband, early 90’s)
• 3G/4G systems
202. Four Systems
• Narrowband (GSM)
• Wideband CDMA (IS-95)
• Wideband OFDM (Flash OFDM)
• Opportunistic Communication (1x EV-DO)
203. Narrowband (GSM)
• The total bandwidth is divided into many narrowband
channels. (200 kHz in GSM)
• Users are given time slots in a narrowband channel (8
users)
• Multiple access is orthogonal: users within the cell never
interfere with each other.
• Interference between users on the same channel in
different cells is minimized by reusing the same channel
only in cells far apart.
• Users operate at high SINR regime
• The price to pay is in reducing the overall available
degrees of freedom.
205. Wideband System: IS-95
• Universal frequency reuse: all the users in all cells
share the same bandwidth (1.25 MHz)
• Main advantages:
– Maximizes the degrees of freedom usage
– Allows interference averaging across many users.
– Soft capacity limit
– Allows soft handoff
– Simplify frequency planning
• Challenges
– Very tight power control to solve the near-far problem.
– More sophisticated coding/signal processing to extract the
information of each user in a very low SINR environment.
206. Design Goals
• 1) make the interference look as much like a white
Gaussian noise as possible:
– Spread each user’s signal using a pseudonoise noise sequence
– Tight power control for managing interference within the cell
– Averaging interference from outside the cell as well as
fluctuating voice activities of users.
• 2) apply point-to-point design for each link
– Extract all possible diversity in the channel
207. Point-to-Point Link Design
• Very low SINR per chip: can be less than -15 dB.
• Diversity is very important at such low SINR.
• Use very low-rate convolution codes
• Time diversity is obtained by interleaving across different
coherence time.
• Frequency diversity is obtained by Rake combining of
the multipaths.
• Transmit diversity in 3G CDMA systems
208. Power Control
• Maintain equal received power for all users in the cell
• Tough problem since the dynamic range is very wide.
Users’ attenuation can differ by many 10’s of dB
• Consists of both open-loop and closed loop
• Open loop sets a reference point
• Closed loop is needed since IS-95 is FDD (frequency-
division duplex)
• Consists of 1-bit up-down feedback at 800 Hz.
• Not cheap: consumes about 10% of capacity for voice.
211. Uplink vs Downlink
• Can make downlink signals for different users orthogonal
at the transmitter. Still because of multipaths, they are
not orthogonal at the receiver.
• Less interference averaging: interference come from a
few high-power base stations as opposed to many low-
power mobiles.
212. Problem with CDMA
• In-cell interference reduces capacity.
• More importantly, power control is expensive,
particularly for data applications where users are very
bursty and have low duty cycle.
• In-cell interference is not an inhererent property of
systems with universal frequency reuse.
• We can keep users in the cell orthogonal.
213. Wideband System: OFDM
• We have seen OFDM as a point-to-point modulation
scheme, converting the frequency-selective channel intlo
a parallel channel.
• It can also be used as a multiple access technique.
• By assigning different time/frequency slots to users, they
can be kept orthogonal, no matter what the multipath
channels are.
• The key property of sinusoids is that they are
eigenfunctions of all linear time-invariant channels.
214. In-cell Orthogonality
• The basic unit of resource is a virtual channel: a hopping
sequence.
• Each hopping sequence spans all the sub-carriers to get
full frequency-diversity.
• Coding is performed across the symbols in a hopping
sequence.
• Hopping sequences of different virtual channels in a cell
are orthogonal.
• Each user is assigned a number of virtual channels
depending on their data rate requirement.
216. Out-of-Cell Interference Averaging
• The hopping patterns of virtual channels in adjacent cells
are designed such that any pair has minimal overlap.
• This ensures that a virtual channel sees interference
from many users instead of a single strong user.
• This is a form of interference diversity.
217. Example: Flash OFDM
• Bandwidth = 1.25 Mz
• # of data sub-carriers = 113
• OFDM symbol = 128 samples = 100 µ s
• Cyclic prefix = 16 samples = 11 µ s delay spread
218. States of Users
• Users are divided into 3 states:
– Active: users that are currently assigned virtual channels (<30)
– Hold: users that are not sending data but maintain
synchronization (<130)
– Inactive (<1000)
• Users in hold state can be moved into active states very
quickly.
• Because of the orthogonality property, tight power
control is not crucial and this enables quick access for
these users
• Important for certain applications (requests for http
transfers, acknowledgements, etc.)
221. Qualcomm HDR’s DownLink
HDR (1xEV-DO): a wireless data system operating on IS-95 band (1.25
MHz)
User 1
Fixed Transmit
Power Measure Channel
Request Rate
Data
Base Station User 2
• HDR downlink operates on a time-division basis.
• Scheduler decides which user to serve in each time-slot.
222. Downlink Multiuser Fading Channel
Mobile
User 1
Fading Channel
User 2
Base Station
User K
What is the sum capacity with channel state feedback?
223. Information Theoretic Capacity of Downlink
(Tse 97)
2.5
2
Total spectal efficieny in bps/Hz
Rayleigh Fading
1.5
1
0.5
0
2 4 6 8 10 12 14 16
Number of Users
Each user undergoes independent Rayleigh fading with average received
signal-to-noise ratio SNR = 0dB.
224. To Fade or Not to Fade?
2.5
Total Spectral Efficieny in bps/Hz 2
Rayleigh Fading
1.5
AWGN Channel
1
0.5
0
2 4 6 8 10 12 14 16
Number of Users
Sum Capacity of fading channel much larger than non-faded channel!
225. Multiuser Diversity
symmetric channels
1500
1000
requested rate (kbps)
500
0
0 200 400 600 800 1000 1200 1400 1600 1800 2000
time slots
• In a large system with users fading independently, there is likely to
be a user with a very good channel at any time.
• Long term total throughput can be maximized by always serving
the user with the strongest channel.
effective SNR at time t = max |hk (t)|2 .
1≤k≤K
226. Multiuser Diversity
symmetric channels
1500
1000
requested rate (kbps)
500
0
0 200 400 600 800 1000 1200 1400 1600 1800 2000
time slots
• In a large system with users fading independently, there is likely to
be a user with a very good channel at any time.
• Long term total throughput can be maximized by always serving
the user with the strongest channel.
effective SNR at time t = max |hk (t)|2 .
1≤k≤K
227. Multiuser Diversity
• Diversity in wireless systems arises from independent signal paths.
• Traditional forms of diversity includes time, frequency and
antennas.
• Multiuser diversity arises from independent fading channels across
different users.
• Fundamental difference: Traditional diversity modes pertain to
point-to-point links, while multiuser diversity provides
network-wide benefit.
228. Multiuser Diversity
• Diversity in wireless systems arises from independent signal paths.
• Traditional forms of diversity includes time, frequency and
antennas.
• Multiuser diversity arises from independent fading channels across
different users.
• Fundamental difference: Traditional diversity modes pertain to
point-to-point links, while multiuser diversity provides
network-wide benefit.
229. Fairness and Delay
asymmetric channels
2500
2000
requested rate (kbps)
1500
tc
1000
500
0
1000 1500 2000 2500
time slots
Challenge is to exploit multiuser diversity while sharing the benefits
fairly and timely to users with asymmetric channel statistics.
230. Hitting the Peaks
asymmetric channels
2500
2000
requested rate (kbps) 1500
tc
1000
500
0
1000 1500 2000 2500
time slots
• Want to serve each user when it is near its peak within a latency
time-scale tc .
• In a large system, at any time there is likely to be a user whose
channel is near its peak.
231. Hitting the Peaks
asymmetric channels
2500
2000
requested rate (kbps) 1500
tc
1000
500
0
1000 1500 2000 2500
time slots
• Want to serve each user when it is near its peak within a latency
time-scale tc .
• In a large system, at any time there is likely to be a user whose
channel is near its peak.
232. Proportional Fair Scheduler
At time slot t, given
1) users’ average throughputs T1 (t), T2 (t), . . . , TK (t) in a past window.
2) current requested rates R1 (t), R2 (t), . . . , RK (t)
transmit to the user k∗ with the largest
Rk (t)
.
Tk (t)
Average throughputs Tk (t) can be updated by an exponential filter with
time constant tc .
233. Throughput of HDR Scheduler: Symmetric Users
1100
1000
900
800 mobile environment
total throughput (kbps)
700
600 fixed environment
500
400
round robin
300
200 latency
time−scale tc = 1.6sec
100
average SNR = 0dB
0
2 4 6 8 10 12 14 16
number of users
Mobile environment: 3 km/hr, Rayleigh fading
Fixed environment: 2Hz Rician fading with Efixed /Escattered = 5.
234. Channel Dynamics
mobile environment fixed environment
1400 1400
1200 1200
requested rate of a user (kbps)
requested rate of a user (kbps)
1000 1000
800 800
600 600
1.6 sec 1.6 sec
400 400
200 200
0 0
0 1000 2000 3000 0 1000 2000 3000
time slots time slots
Channel varies faster and has more dynamic range in mobile
environments.
236. Inducing Randomness
• Scheduling algorithm exploits the nature-given channel fluctuations
by hitting the peaks.
• If there are not enough fluctuations, why not purposely induce
them?
238. Slow Fading Environment: Before
220
User 2
200
180
Supportable Rate
160
140
120
User 1
100
80
0 500 1000 1500 2000 2500 3000
Time Slots
239. After
350
300
User 2
250
Supportable Rate
200
150
100
50
0 User 1
−50
0 500 1000 1500 2000 2500 3000
Time Slots
240. Opportunistic Beamforming: Slow Fading
1.5
Coherent BF
1.4
Opp. BF
Average Throughput in bps/Hz
1.3
1.2
1.1
1
0.9
0.8
0 5 10 15 20 25 30 35
Number of Users
• Consider first a slow fading environment when channels of the
users are fixed (but random).
• Dumb antennas can approach the performance of true
beamforming when there are many users in the systems.
241. Opportunistic versus True Beamforming
• If the gains h1k and h2k are known at the transmitter, then true
beamforming can be performed:
| h1k |2
α =
| h1k |2 + | h2k |2
θ = ∠h1k − ∠h2k
• Dumb antennas randomly sweep out a beam and opportunistically
sends data to the user closest to the beam.
• Opportunistic beamforming can approach the performance of true
beamforming when there are many users in the systems, but with
much less feedback and channel measurements.
242. Opportunistic versus True Beamforming
• If the gains h1k and h2k are known at the transmitter, then true
beamforming can be performed:
| h1k |2
α =
| h1k |2 + | h2k |2
θ = ∠h1k − ∠h2k
• Dumb antennas randomly sweep out a beam and opportunistically
sends data to the user closest to the beam.
• Opportunistic beamforming can approach the performance of true
beamforming when there are many users in the systems, but with
much less feedback and channel measurements.
243. Opportunistic Beamforming: Fast Fading
2
1.8 1 antenna, Ricean
1.6
1.4
1.2
Density
1
0.8
Rayleigh
0.6
0.4
0.2
2 antenna, Ricean
0
0 0.5 1 1.5 2 2.5 3
Channel Amplitude
Improves performance in fast fading Rician environments by spreading
the fading distribution.
244. Overall Performance Improvement
1100
1000 mobile
900
800 fixed but with opp. beamforming
700
total throughput (kbps)
600
fixed
500
400
300
latency time−scale t = 1.6s
c
200
average SNR = 0 dB
100
0
2 4 6 8 10 12 14 16
number of users
Mobile environment: 3 km/hr, Rayleigh fading
Fixed environment: 2Hz Rician fading with Efixed /Escattered = 5.
245. Comparison to Space Time Codes
• Space time codes: intelligent use of transmit diversity to improve
reliability of point-to-point links.
• In contrast, opportunistic beamforming requires no special
multi-antenna encoder or decoder nor MIMO channel estimation.
• In fact the mobiles are completely oblivious to the existence of
multiple transmit antennas.
• Antennas are truly dumb, but yet can surpass performance of
space time codes.
246. Cellular System: Opportunistic Nulling
• In a cellular systems, users are scheduled when their channel is
strong and the interference from adjacent base-stations is weak.
• Multiuser diversity allows interference avoidance.
• Dumb antennas provides opportunistic nulling for users in other
cells.
• Particularly important in interference-limited systems with no soft
handoff.
247. Cellular System: Opportunistic Nulling
• In a cellular systems, users are scheduled when their channel is
strong and the interference from adjacent base-stations is weak.
• Multiuser diversity allows interference avoidance.
• Dumb antennas provides opportunistic nulling for users in other
cells.
• Particularly important in interference-limited systems with no soft
handoff.
248. Cellular System: Opportunistic Nulling
• In a cellular systems, users are scheduled when their channel is
strong and the interference from adjacent base-stations is weak.
• Multiuser diversity allows interference avoidance.
• Dumb antennas provides opportunistic nulling for users in other
cells.
• Particularly important in interference-limited systems with no soft
handoff.
249. Traditional CDMA Downlink Design
• orthogonalize users (via spreading codes)
• Makes individual point-to-point links reliable by averaging:
• interleaving
• multipath combining,
• soft handoff
• transmit/receive antenna diversity
• Important for voice with very tight latency requirements.
250. Traditional CDMA Downlink Design
• orthogonalize users (via spreading codes)
• Makes individual point-to-point links reliable by averaging:
• interleaving
• multipath combining,
• soft handoff
• transmit/receive antenna diversity
• Important for voice with very tight latency requirements.
251. Traditional CDMA Downlink Design
• orthogonalize users (via spreading codes)
• Makes individual point-to-point links reliable by averaging:
• interleaving
• multipath combining,
• soft handoff
• transmit/receive antenna diversity
• Important for voice with very tight latency requirements.
252. Downlink Design: Modern View
• Shifts from the point-to-point view to a multiuser network view.
• Wants large and fast fluctuations of both channel and interference
so that we can ride the peaks.
• Exploits more relaxed latency requirements of data as well as MAC
layer packet scheduling mechanisms.
253. Downlink Design: Modern View
• Shifts from the point-to-point view to a multiuser network view.
• Wants large and fast fluctuations of both channel and interference
so that we can ride the peaks.
• Exploits more relaxed latency requirements of data as well as MAC
layer packet scheduling mechanisms.
254. Downlink Design: Modern View
• Shifts from the point-to-point view to a multiuser network view.
• Wants large and fast fluctuations of both channel and interference
so that we can ride the peaks.
• Exploits more relaxed latency requirements of data as well as MAC
layer packet scheduling mechanisms.