scispace - formally typeset
Search or ask a question
Author

Rapeepat Ratasuk

Other affiliations: Nokia Networks, Google
Bio: Rapeepat Ratasuk is an academic researcher from Motorola. The author has contributed to research in topics: Telecommunications link & User equipment. The author has an hindex of 31, co-authored 127 publications receiving 3589 citations. Previous affiliations of Rapeepat Ratasuk include Nokia Networks & Google.


Papers
More filters
Journal ArticleDOI
TL;DR: An overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed, which includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, and heterogeneous networks with emphasis on Type 1 and Type 2 relays.
Abstract: LTE Release 8 is one of the primary broadband technologies based on OFDM, which is currently being commercialized. LTE Release 8, which is mainly deployed in a macro/microcell layout, provides improved system capacity and coverage, high peak data rates, low latency, reduced operating costs, multi-antenna support, flexible bandwidth operation and seamless integration with existing systems. LTE-Advanced (also known as LTE Release 10) significantly enhances the existing LTE Release 8 and supports much higher peak rates, higher throughput and coverage, and lower latencies, resulting in a better user experience. Additionally, LTE Release 10 will support heterogeneous deployments where low-power nodes comprising picocells, femtocells, relays, remote radio heads, and so on are placed in a macrocell layout. The LTE-Advanced features enable one to meet or exceed IMT-Advanced requirements. It may also be noted that LTE Release 9 provides some minor enhancement to LTE Release 8 with respect to the air interface, and includes features like dual-layer beamforming and time-difference- of-arrival-based location techniques. In this article an overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed. This includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, uplink spatial multiplexing including extension to four-layer MIMO, and heterogeneous networks with emphasis on Type 1 and Type 2 relays. Finally, the performance of LTEAdvanced using IMT-A scenarios is presented and compared against IMT-A targets for full buffer and bursty traffic model.

1,044 citations

Proceedings ArticleDOI
16 May 2010
TL;DR: This paper provides an overview of carrier aggregation and discusses major technical issues including aggregation structure, scenarios, implementation, control signalling design and coexistence with legacy LTE systems.
Abstract: UMTS LTE system can support flexible bandwidth configuration up to 20 MHz. Currently, system enhancements are being considered to provide substantial improvements to LTE and allow it to meet or exceed IMT-Advanced requirements. One key enhancement feature is bandwidth extension via carrier aggregation to support deployment bandwidth up to 100 MHz. This will allow peak target data rates in excess of 1 Gbps in the downlink and 500 Mbps in the uplink to be achieved. Carrier aggregation is attractive because it allows operators to deploy a system with larger bandwidth by aggregating several smaller contiguous or non-contiguous carriers while providing backward compatibility to legacy users. For instance, an 80MHz system can be constructed using contiguous or non-contiguous 4×20MHz component carriers. Legacy users can then access the system using one of the component carriers. This paper provides an overview of carrier aggregation and discusses major technical issues including aggregation structure, scenarios, implementation, control signalling design and coexistence with legacy LTE systems.

248 citations

Journal ArticleDOI
TL;DR: This paper proposes a tractable baseline multicast D2D model, and uses it to analyze important multicast metrics like the coverage probability, mean number of covered receivers and throughput, and examines how the multicast performance would be affected by certain factors like dynamics and network assistance.
Abstract: Multicast device-to-device (D2D) transmission is important for applications like local file transfer in commercial networks and is also a required feature in public safety networks. In this paper we propose a tractable baseline multicast D2D model, and use it to analyze important multicast metrics like the coverage probability, mean number of covered receivers and throughput. In addition, we examine how the multicast performance would be affected by certain factors like mobility and network assistance. Take the mean number of covered receivers as an example. We find that simple repetitive transmissions help but the gain quickly diminishes as the repetition time increases. Meanwhile, mobility and network assistance (i.e. allowing the network to relay the multicast signals) can help cover more receivers. We also explore how to optimize multicasting, e.g. by choosing the optimal multicast rate and the optimal number of retransmission times.

118 citations

Patent
30 Mar 2007
TL;DR: In this article, a communication system provides downlink acknowledgments corresponding to uplink transmission using hybrid automatic repeat request to multiple users in an Orthogonal Frequency Division Multiplexing communication system, wherein a frequency bandwidth comprises multiple frequency sub-carriers, by spreading each acknowledgment of multiple acknowledgments with a selected spreading sequence of multiple spreading sequences to produce multiple spread acknowledgments, wherein each acknowledgment is intended for a different user of the multiple users, and distributing the multiple spread acknowledgment across the multiple subcarriers.
Abstract: A communication system provides downlink acknowledgments corresponding to uplink transmission using hybrid automatic repeat request to multiple users in an Orthogonal Frequency Division Multiplexing communication system, wherein a frequency bandwidth comprises multiple frequency sub-carriers, by spreading each acknowledgment of multiple acknowledgments with a selected spreading sequence of multiple spreading sequences to produce multiple spread acknowledgments, wherein each acknowledgment is intended for a different user of the multiple users, and distributing the multiple spread acknowledgments across the multiple frequency sub-carriers.

104 citations

Patent
21 Jun 2012
TL;DR: In this article, power control for LTE transmissions in unlicensed bands is discussed, where a first device (such as a LTE UE or LTE eNB) determines a scheduled transmission window for a LTE transmission in an unlicensed band.
Abstract: Methods of power control for LTE transmissions in unlicensed bands are described. One method includes determining, at a first device (such as a LTE UE or LTE eNB), a scheduled transmission window for a LTE transmission in an unlicensed band. The transmission window indicates a time for sending the transmission in the unlicensed band. Prior to the scheduled transmission window, the method also includes determining whether a WiFi transmitter is transmitting a signal in the unlicensed band. The method also includes, in response to determining that the transmitter is transmitting in the unlicensed band, determining an adjusted transmission power for the transmission and sending the transmission (such as from an LTE UE to an LTE eNB or from an LTE eNB to an LTE UE) in the transmission window at the adjusted transmission power. Apparatus and computer readable media are also described.

104 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.

6,131 citations

Journal ArticleDOI
TL;DR: This paper considers transmit precoding and receiver combining in mmWave systems with large antenna arrays and develops algorithms that accurately approximate optimal unconstrained precoders and combiners such that they can be implemented in low-cost RF hardware.
Abstract: Millimeter wave (mmWave) signals experience orders-of-magnitude more pathloss than the microwave signals currently used in most wireless applications and all cellular systems. MmWave systems must therefore leverage large antenna arrays, made possible by the decrease in wavelength, to combat pathloss with beamforming gain. Beamforming with multiple data streams, known as precoding, can be used to further improve mmWave spectral efficiency. Both beamforming and precoding are done digitally at baseband in traditional multi-antenna systems. The high cost and power consumption of mixed-signal devices in mmWave systems, however, make analog processing in the RF domain more attractive. This hardware limitation restricts the feasible set of precoders and combiners that can be applied by practical mmWave transceivers. In this paper, we consider transmit precoding and receiver combining in mmWave systems with large antenna arrays. We exploit the spatial structure of mmWave channels to formulate the precoding/combining problem as a sparse reconstruction problem. Using the principle of basis pursuit, we develop algorithms that accurately approximate optimal unconstrained precoders and combiners such that they can be implemented in low-cost RF hardware. We present numerical results on the performance of the proposed algorithms and show that they allow mmWave systems to approach their unconstrained performance limits, even when transceiver hardware constraints are considered.

3,146 citations

Journal ArticleDOI
TL;DR: A general framework to evaluate the coverage and rate performance in mmWave cellular networks is proposed, and the results show that dense mmWave networks can achieve comparable coverage and much higher data rates than conventional UHF cellular systems, despite the presence of blockages.
Abstract: Millimeter wave (mmWave) holds promise as a carrier frequency for fifth generation cellular networks. Because mmWave signals are sensitive to blockage, prior models for cellular networks operated in the ultra high frequency (UHF) band do not apply to analyze mmWave cellular networks directly. Leveraging concepts from stochastic geometry, this paper proposes a general framework to evaluate the coverage and rate performance in mmWave cellular networks. Using a distance-dependent line-of-site (LOS) probability function, the locations of the LOS and non-LOS base stations are modeled as two independent non-homogeneous Poisson point processes, to which different path loss laws are applied. Based on the proposed framework, expressions for the signal-to-noise-and-interference ratio (SINR) and rate coverage probability are derived. The mmWave coverage and rate performance are examined as a function of the antenna geometry and base station density. The case of dense networks is further analyzed by applying a simplified system model, in which the LOS region of a user is approximated as a fixed LOS ball. The results show that dense mmWave networks can achieve comparable coverage and much higher data rates than conventional UHF cellular systems, despite the presence of blockages. The results suggest that the cell size to achieve the optimal SINR scales with the average size of the area that is LOS to a user.

1,342 citations

Journal ArticleDOI
TL;DR: An overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed, which includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, and heterogeneous networks with emphasis on Type 1 and Type 2 relays.
Abstract: LTE Release 8 is one of the primary broadband technologies based on OFDM, which is currently being commercialized. LTE Release 8, which is mainly deployed in a macro/microcell layout, provides improved system capacity and coverage, high peak data rates, low latency, reduced operating costs, multi-antenna support, flexible bandwidth operation and seamless integration with existing systems. LTE-Advanced (also known as LTE Release 10) significantly enhances the existing LTE Release 8 and supports much higher peak rates, higher throughput and coverage, and lower latencies, resulting in a better user experience. Additionally, LTE Release 10 will support heterogeneous deployments where low-power nodes comprising picocells, femtocells, relays, remote radio heads, and so on are placed in a macrocell layout. The LTE-Advanced features enable one to meet or exceed IMT-Advanced requirements. It may also be noted that LTE Release 9 provides some minor enhancement to LTE Release 8 with respect to the air interface, and includes features like dual-layer beamforming and time-difference- of-arrival-based location techniques. In this article an overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed. This includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, uplink spatial multiplexing including extension to four-layer MIMO, and heterogeneous networks with emphasis on Type 1 and Type 2 relays. Finally, the performance of LTEAdvanced using IMT-A scenarios is presented and compared against IMT-A targets for full buffer and bursty traffic model.

1,044 citations

Journal ArticleDOI
10 May 2016
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

948 citations