• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Wireless Communications (2005)

by A Goldsmith
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 1,179
Next 10 →

A Tractable Approach to Coverage and Rate in Cellular Networks

by Jeffrey G. Andrews, Radha Krishna Ganti - IEEE Trans. Commun , 2011
"... ar ..."
Abstract - Cited by 214 (49 self) - Add to MetaCart
Abstract not found

An Overview of MIMO Communications: A Key to Gigabit Wireless

by A. J. Paulraj, D. Gore, R. U. Nabar, H. Bölcskei - Proc. IEEE , 2004
"... High data rate wireless communications, nearing 1 Gigabit/second (Gbps) transmission rates, is of interest in emerging Wireless Local Area Networks (WLANs) and home Audio/Visual (A/V) networks. Designing very high speed wireless links that offer good Quality-of-Service (QoS) and range capability in ..."
Abstract - Cited by 176 (0 self) - Add to MetaCart
High data rate wireless communications, nearing 1 Gigabit/second (Gbps) transmission rates, is of interest in emerging Wireless Local Area Networks (WLANs) and home Audio/Visual (A/V) networks. Designing very high speed wireless links that offer good Quality-of-Service (QoS) and range capability in Non-Line-of-Sight (NLOS) environments constitutes a significant research and engineering challenge. Ignoring fading in NLOS environments, we can, in principle, meet the 1Gbps data rate requirement with a single-transmit single-receive antenna wireless system if the product of bandwidth (measured in Hz) and spectral efficiency (measured in bps/Hz) is equal to 10 9. As we shall outline in this paper, a variety of cost, technology and regulatory constraints make such a brute force solution unattractive if not impossible. The use of multiple antennas at transmitter and receiver, popularly known as multiple-input multiple-output (MIMO) wireless is an emerging cost-effective technology that offers substantial leverages in making 1Gbps wireless links a reality. This paper provides an overview of MIMO wireless technology covering channel models, performance limits, coding, and transceiver design.
(Show Context)

Citation Context

...ss applications. Frequency-flat vs. frequency-selective fading. If the bandwidth-delay spread product of the channel satisfies, B × τmax ≥ 0.1, the channel is generally said to be frequency-selective =-=[19]-=-. Otherwise, the channel is said to be frequency-flat. The variation of the matrix-valued transfer function �H(f) = � ∞ 0 H(τ)e −j2πfτ dτ (7) November 4, 2003 DRAFT 9swill depend on the delay spread a...

Robust statistical methods for securing wireless localization in sensor networks

by Zang Li, Yanyong Zhang, Badri Nath - In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN , 2005
"... Abstract — Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attack ..."
Abstract - Cited by 132 (4 self) - Add to MetaCart
Abstract — Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to alter the underlying localization algorithms to be robust to intentionally corrupted measurements. In this paper, we develop robust statistical methods to make localization attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulationbased localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. Finally, we evaluate our robust localization schemes under different threat conditions. I.
(Show Context)

Citation Context

...empirical data and, after compensating for attenuation due to intervening walls, it was found that the signal strength varies with the distance in a trend similar to the generic exponential path loss =-=[25]-=-. In our simulation, we use the i=1 (ssi − ss′ i )2 to Probability 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 Euclidean − No Attack Euclidean − Attacked Median − No Attack Median − Attacked 0 0 5 10 15 20 ...

Power control by geometric programming

by Mung Chiang, Chee Wei Tan, Daniel P. Palomar, David Julian - IEEE Trans. on Wireless Commun , 2005
"... Abstract — In wireless cellular or ad hoc networks where Quality of Service (QoS) is interference-limited, a variety of power control problems can be formulated as nonlinear optimization with a system-wide objective, e.g., maximizing the total system throughput or the worst user throughput, subject ..."
Abstract - Cited by 130 (16 self) - Add to MetaCart
Abstract — In wireless cellular or ad hoc networks where Quality of Service (QoS) is interference-limited, a variety of power control problems can be formulated as nonlinear optimization with a system-wide objective, e.g., maximizing the total system throughput or the worst user throughput, subject to QoS constraints from individual users, e.g., on data rate, delay, and outage probability. We show that in the high Signal-to-Interference Ratios (SIR) regime, these nonlinear and apparently difficult, nonconvex optimization problems can be transformed into convex optimization problems in the form of geometric programming; hence they can be very efficiently solved for global optimality even with a large number of users. In the medium to low SIR regime, some of these constrained nonlinear optimization of power control cannot be turned into tractable convex formulations, but a heuristic can be used to compute in most cases the optimal solution by solving a series of geometric programs through the approach of successive convex approximation. While efficient and robust algorithms have been extensively studied for centralized solutions of geometric programs, distributed algorithms have not been explored before. We present a systematic method of distributed algorithms for power control that is geometric-programming-based. These techniques for power control, together with their implications to admission control and pricing in wireless networks, are illustrated through several numerical examples. Index Terms — Convex optimization, CDMA power control, Distributed algorithms. I.

Multiuser MIMO Achievable Rates with Downlink Training and Channel State Feedback

by Giuseppe Caire, et al.
"... We consider a MIMO fading broadcast channel and compute achievable ergodic rates when channel state information is acquired at the receivers via downlink training and it is provided to the transmitter by channel state feedback. Unquantized (analog) and quantized (digital) channel state feedback sche ..."
Abstract - Cited by 114 (8 self) - Add to MetaCart
We consider a MIMO fading broadcast channel and compute achievable ergodic rates when channel state information is acquired at the receivers via downlink training and it is provided to the transmitter by channel state feedback. Unquantized (analog) and quantized (digital) channel state feedback schemes are analyzed and compared under various assumptions. Digital feedback is shown to be potentially superior when the feedback channel uses per channel state coefficient is larger than 1. Also, we show that by proper design of the digital feedback link, errors in the feedback have a minor effect even if simple uncoded modulation is used on the feedback channel. We discuss first the case of an unfaded AWGN feedback channel with orthogonal access and then the case of fading MIMO multi-access (MIMO-MAC). We show that by exploiting the MIMO-MAC nature of the uplink channel, a much better scaling of the feedback channel resource with the number of base station antennas can be achieved. Finally, for the case of delayed feedback, we show that in the realistic case where the fading process has (normalized) maximum Doppler frequency shift 0 ≤ F < 1/2, a fraction 1 − 2F of the optimal multiplexing gain is achievable. The general conclusion of this work is that very significant downlink throughput is achievable with simple and efficient channel state feedback, provided that the feedback link is properly designed.

A mathematical theory of network interference and its applications,

by Fellow IEEE Moe Z Win , Student Member IEEE Pedro C Pinto , Lawrence A Shepp - Proc. IEEE 97 , 2009
"... A unifying framework is developed to characterize the aggregate interference in wireless networks, and several applications are presented. By Moe Z. Win, Fellow IEEE, Pedro C. Pinto, Student Member IEEE, and Lawrence A. Shepp ABSTRACT | In this paper, we introduce a mathematical framework for the c ..."
Abstract - Cited by 101 (13 self) - Add to MetaCart
A unifying framework is developed to characterize the aggregate interference in wireless networks, and several applications are presented. By Moe Z. Win, Fellow IEEE, Pedro C. Pinto, Student Member IEEE, and Lawrence A. Shepp ABSTRACT | In this paper, we introduce a mathematical framework for the characterization of network interference in wireless systems. We consider a network in which the interferers are scattered according to a spatial Poisson process and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We start by determining the statistical distribution of the aggregate network interference. We then investigate four applications of the proposed model: 1) interference in cognitive radio networks; 2) interference in wireless packet networks; 3) spectrum of the aggregate radio-frequency emission of wireless networks; and 4) coexistence between ultrawideband and narrowband systems. Our framework accounts for all the essential physical parameters that affect network interference, such as the wireless propagation effects, the transmission technology, the spatial density of interferers, and the transmitted power of the interferers.
(Show Context)

Citation Context

...ed at a distance R from a transmitter is given by Prx Ptx Q k Zk R2b (1) where Ptx is the average power measured 1 m away from the transmitter3; b is the amplitude loss exponent4; and fZkg are independent random variables (RVs), which account for propagation effects such as multipath fading and shadowing. The term 1=R2b accounts for the far-field path loss with distance R, where the amplitude loss exponent b is environment-dependent and can approximately range from 0.8 (e.g., hallways inside buildings) to 4 (e.g., dense urban environments), with b 1 corresponding to free-space propagation [48].5 The proposed model is general enough to account for various propagation scenarios, including the following. 1) Path loss only: Z1 1. 2) Path loss and Nakagami-m fading: Z1 2, where 2 Gðm; 1=mÞ.6 3) Path loss and log-normal shadowing: Z1 e2G, where G Nð0; 1Þ.7 The term e2G has a lognormal distribution, where is the shadowing coefficient.8 4) Path loss, Nakagami-m fading, and log-normal shadowing: Z1 2 with 2 Gðm; 1=mÞ, and Z2 e2G with G Nð0; 1Þ. For cases where the evolution of signals over time is of interest, we consider the waveform relationship between 2Time an...

Recent and Emerging Topics in Wireless Industrial Communications: A Selection

by Andreas Willig , 2007
"... In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systemsforwirelessindustrialcommunications.Wehaveselected topicsthathaveeitheremergedashottopicsintheindustrial communicationscommunityinthelastfewyears(likewireless sensornetworks),orwhi ..."
Abstract - Cited by 96 (1 self) - Add to MetaCart
In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systemsforwirelessindustrialcommunications.Wehaveselected topicsthathaveeitheremergedashottopicsintheindustrial communicationscommunityinthelastfewyears(likewireless sensornetworks),orwhichcouldbeworthwhileresearchtopicsin thenextfewyears(forexamplecooperativediversitytechniques for error control, cognitive radio/opportunistic spectrum access for mitigation of external interferences).

Predictable 802.11 packet delivery from wireless channel measurements

by Daniel Halperin , Wenjun Hu , Anmol Sheth , David Wetherall - Proc. of ACM SIGCOMM ’10 , 2010
"... ABSTRACT RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to find the best rate, transmit power or other parameter that is tuned to boost performance. We show that, for the fi ..."
Abstract - Cited by 93 (3 self) - Add to MetaCart
ABSTRACT RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to find the best rate, transmit power or other parameter that is tuned to boost performance. We show that, for the first time, wireless packet delivery can be accurately predicted for commodity 802.11 NICs from only the channel measurements that they provide. Our model uses 802.11n Channel State Information measurements as input to an OFDM receiver model we develop by using the concept of effective SNR. It is simple, easy to deploy, broadly useful, and accurate. It makes packet delivery predictions for 802.11a/g SISO rates and 802.11n MIMO rates, plus choices of transmit power and antennas. We report testbed experiments that show narrow transition regions (<2 dB for most links) similar to the near-ideal case of narrowband, frequency-flat channels. Unlike RSSI, this lets us predict the highest rate that will work for a link, trim transmit power, and more. We use trace-driven simulation to show that our rate prediction is as good as the best rate adaptation algorithms for 802.11a/g, even over dynamic channels, and extends this good performance to 802.11n.
(Show Context)

Citation Context

... 802.11n as a superset of 802.11a/g. Packet Delivery versus RSSI/SNR. Textbook analyses of modulation schemes give delivery probability for a single signal in terms of the signal-to-noise (SNR) ratio =-=[8]-=-, typically expressed on a log scale in decibels. This model holds for narrowband channels with additive white Gaussian noise. It predicts a sharp transition region of 1–2 dB over which a link changes...

A gametheoretic approach to energy-efficient power control in multicarrier CDMA systems

by Farhad Meshkati, Student Member, Mung Chiang, H. Vincent Poor, Stuart C. Schwartz, Life Fellow - IEEE Journal on Selected Areas in Communications (JSAC , 2006
"... Abstract—A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power control is modeled as a noncooperative game in which each user decides how much power to transmit over each carrier to maximize its own utility. The utility function co ..."
Abstract - Cited by 89 (8 self) - Add to MetaCart
Abstract—A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power control is modeled as a noncooperative game in which each user decides how much power to transmit over each carrier to maximize its own utility. The utility function considered here measures the number of reliable bits transmitted over all the carriers per joule of energy consumed and is particularly suitable for networks where energy efficiency is important. The multidimensional nature of users ’ strategies and the nonquasi-concavity of the utility function make the multicarrier problem much more challenging than the single-carrier or throughput-based-utility case. It is shown that, for all linear receivers including the matched filter, the decorrelator, and the minimum-mean-square-error detector, a user’s utility is maximized when the user transmits only on its “best ” carrier. This is the carrier that requires the least amount of power to achieve a particular target signal-to-interference-plus-noise ratio at the output of the receiver. The existence and uniqueness of Nash equilibrium for the proposed power control game are studied. In particular, conditions are given that must be satisfied by the channel gains for a Nash equilibrium to exist, and the distribution of the users among the carriers at equilibrium is characterized. In addition, an iterative and distributed algorithm for reaching the equilibrium (when it exists) is presented. It is shown that the proposed approach results in significant improvements in the total utility achieved at equilibrium compared with a single-carrier system and also to a multicarrier system in which each user maximizes its utility over each carrier independently. Index Terms—Energy efficiency, game theory, multicarrier code-division multiple-access (CDMA), multiuser detection, Nash equilibrium, power control, utility function. I.
(Show Context)

Citation Context

...cus on square M-QAM modulation, i.e., M ∈ {4, 16, 64, · · · } or equivalently b ∈ {2, 4, 6, · · · }, since there are exact expressions for the symbol error probability of square M-QAM modulation (see =-=[17]-=-). We can easily generalize our analysis to include odd values of b by using an approximate expression for the symbol error probability. We define the utility function of a user as the ratio of its th...

Cross-layer design for lifetime maximization in interference-limited wireless sensor networks

by Ritesh Madan, Shuguang Cui, Sanjay Lall, Andrea Goldsmith , 2006
"... We consider the joint optimal design of the physical, medium access control (MAC), and routing layers to maximize the lifetime of energy-constrained wireless sensor networks. The problem of computing lifetime-optimal routing flow, link schedule, and link transmission powers for all active time slots ..."
Abstract - Cited by 88 (6 self) - Add to MetaCart
We consider the joint optimal design of the physical, medium access control (MAC), and routing layers to maximize the lifetime of energy-constrained wireless sensor networks. The problem of computing lifetime-optimal routing flow, link schedule, and link transmission powers for all active time slots is formulated as a non-linear optimization problem. We first restrict the link schedules to the class of interference-free time division multiple access (TDMA) schedules. In this special case, we formulate the optimization problem as a mixed integerconvex program, which can be solved using standard techniques. Moreover, when the slots lengths are variable, the optimization problem is convex and can be solved efficiently and exactly using interior point methods. For general non-orthogonal link schedules, we propose an iterative algorithm that alternates between adaptive link scheduling and computation of optimal link rates and transmission powers for a fixed link schedule. The performance of this algorithm is compared to other design approaches for several network topologies. The results illustrate the advantages of load balancing, multihop routing, frequency reuse, and interference mitigation in increasing the lifetime of energy-constrained networks. We also briefly discuss computational approaches to extend this algorithm to large networks.
(Show Context)

Citation Context

...ij = k dm , where dij is the ij distance between the transmitter of link j and the receiver of link i, k is a constant that depends on system parameters such as the carrier frequency and antenna gain =-=[29]-=-, and m is the path loss exponent. For the computations that follow, we take m = 4, k = 1, N0 = 1, Ev = 50, ∀v ∈ V . Thus if a transmitter transmits at unit power to a receiver at a distance of 1m, th...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University