scispace - formally typeset
Search or ask a question

Showing papers on "Data transmission published in 2006"


Journal ArticleDOI
TL;DR: This paper considers the problem of downlink transmit beamforming for wireless transmission and downstream precoding for digital subscriber wireline transmission, in the context of common information broadcasting or multicasting applications wherein channel state information (CSI) is available at the transmitter.
Abstract: This paper considers the problem of downlink transmit beamforming for wireless transmission and downstream precoding for digital subscriber wireline transmission, in the context of common information broadcasting or multicasting applications wherein channel state information (CSI) is available at the transmitter. Unlike the usual "blind" isotropic broadcasting scenario, the availability of CSI allows transmit optimization. A minimum transmission power criterion is adopted, subject to prescribed minimum received signal-to-noise ratios (SNRs) at each of the intended receivers. A related max-min SNR "fair" problem formulation is also considered subject to a transmitted power constraint. It is proven that both problems are NP-hard; however, suitable reformulation allows the successful application of semidefinite relaxation (SDR) techniques. SDR yields an approximate solution plus a bound on the optimum value of the associated cost/reward. SDR is motivated from a Lagrangian duality perspective, and its performance is assessed via pertinent simulations for the case of Rayleigh fading wireless channels. We find that SDR typically yields solutions that are within 3-4 dB of the optimum, which is often good enough in practice. In several scenarios, SDR generates exact solutions that meet the associated bound on the optimum value. This is illustrated using measured very-high-bit-rate Digital Subscriber line (VDSL) channel data, and far-field beamforming for a uniform linear transmit antenna array.

1,345 citations


Journal ArticleDOI
TL;DR: An achievable region which combines Gel'fand-Pinkser coding with an achievable region construction for the interference channel is developed, which resembles dirty-paper coding, a technique used in the computation of the capacity of the Gaussian multiple-input multiple-output (MIMO) broadcast channel.
Abstract: Cognitive radio promises a low-cost, highly flexible alternative to the classic single-frequency band, single-protocol wireless device. By sensing and adapting to its environment, such a device is able to fill voids in the wireless spectrum and can dramatically increase spectral efficiency. In this paper, the cognitive radio channel is defined as a two-sender, two-receiver interference channel in which sender 2 obtains the encoded message sender 1 plans to transmit. We consider two cases: in the genie-aided cognitive radio channel, sender 2 is noncausally presented the data to be transmitted by sender 1 while in the causal cognitive radio channel, the data is obtained causally. The cognitive radio at sender 2 may then choose to transmit simultaneously over the same channel, as opposed to waiting for an idle channel as is traditional for a cognitive radio. Our main result is the development of an achievable region which combines Gel'fand-Pinkser coding with an achievable region construction for the interference channel. In the additive Gaussian noise case, this resembles dirty-paper coding, a technique used in the computation of the capacity of the Gaussian multiple-input multiple-output (MIMO) broadcast channel. Numerical evaluation of the region in the Gaussian noise case is performed, and compared to an inner bound, the interference channel, and an outer bound, a modified Gaussian MIMO broadcast channel. Results are also extended to the case in which the message is causally obtained.

1,157 citations


Journal ArticleDOI
TL;DR: This paper shows that the configuration with spatially orthogonal signal transmission is equivalent to additional virtual sensors which extend the array aperture with virtual spatial tapering and provides higher performance in target detection, angular estimation accuracy, and angular resolution.
Abstract: In this paper, we propose a new space-time coding configuration for target detection and localization by radar or sonar systems. In common active array systems, the transmitted signal is usually coherent between the different elements of the array. This configuration does not allow array processing in the transmit mode. However, space-time coding of the transmitted signals allows to digitally steer the beam pattern in the transmit in addition to the received signal. The ability to steer the transmitted beam pattern, helps to avoid beam shape loss. We show that the configuration with spatially orthogonal signal transmission is equivalent to additional virtual sensors which extend the array aperture with virtual spatial tapering. These virtual sensors can be used to form narrower beams with lower sidelobes and, therefore, provide higher performance in target detection, angular estimation accuracy, and angular resolution. The generalized likelihood ratio test for target detection and the maximum likelihood and Cramer-Rao bound for target direction estimation are derived for an arbitrary signal coherence matrix. It is shown that the optimal performance is achieved for orthogonal transmitted signals. Target detection and localization performances are evaluated and studied theoretically and via simulations

990 citations


Proceedings ArticleDOI
16 May 2006
TL;DR: A medium access control (MAC) protocol suitable for an underwater acoustic network is proposed and analyzed, which uses time slotting and is thus called slotted FAMA, thus providing savings in energy.
Abstract: Long propagation delays and low bit rates of underwater acoustic networks make these systems fundamentally different from the packet radio networks. As a consequence, many of the network protocols designed for radio channels are either not applicable, or have extremely low efficiency over underwater acoustic channels. These facts necessitate a dedicated design of protocols for an underwater acoustic network. A medium access control (MAC) protocol suitable for an underwater acoustic network is proposed and analyzed. The protocol is based on a channel access discipline called floor acquisition multiple access (FAMA) which combines both carrier sensing (CS) and a dialogue between the source and receiver prior to data transmission. During the initial dialogue, control packets are exchanged between the source node and the intended destination node to avoid multiple transmissions at the same time. Special attention is paid to the networks that are not fully connected, in which nodes can be hidden from each other. The new protocol uses time slotting and is thus called slotted FAMA. Time slotting eliminates the need for excessively long control packets, thus providing savings in energy. Protocol performance in throughput and delay is assessed through simulation of a mobile ad hoc underwater network, showing the existence of optimal power level to be used for a given user density.

502 citations


Journal ArticleDOI
03 Jan 2006
TL;DR: The paper discusses the key technology elements-4K mode and in-depth interleavers, time slicing and additional forward error correction-in some detail and presents viewpoints relevant for DVB-H network design and system use in general.
Abstract: This paper gives a brief review of the new Digital Video Broadcasting-Handheld(DVB-H) standard. This is based on the earlier standard DVB-T, which is used for terrestrial digital TV broadcasting. The new extension brings features that make it possible to receive digital video broadcast type services in handheld, mobile terminals. The paper discusses the key technology elements-4K mode and in-depth interleavers, time slicing and additional forward error correction-in some detail. It also gives extensive range of performance results based on laboratory measurements and real field tests. Finally it presents viewpoints relevant for DVB-H network design and system use in general.

461 citations


Journal ArticleDOI
TL;DR: This work demonstrates that, with several typical compression algorithms, there is a actually a net energy increase when compression is applied before transmission, and suggestions are made to avoid it.
Abstract: Wireless transmission of a single bit can require over 1000 times more energy than a single computation. It can therefore be beneficial to perform additional computation to reduce the number of bits transmitted. If the energy required to compress data is less than the energy required to send it, there is a net energy savings and an increase in battery life for portable computers. This article presents a study of the energy savings possible by losslessly compressing data prior to transmission. A variety of algorithms were measured on a StrongARM SA-110 processor. This work demonstrates that, with several typical compression algorithms, there is a actually a net energy increase when compression is applied before transmission. Reasons for this increase are explained and suggestions are made to avoid it. One such energy-aware suggestion is asymmetric compression, the use of one compression algorithm on the transmit side and a different algorithm for the receive path. By choosing the lowest-energy compressor and decompressor on the test platform, overall energy to send and receive data can be reduced by 11p compared with a well-chosen symmetric pair, or up to 57p over the default symmetric zlib scheme.

402 citations


Journal ArticleDOI
TL;DR: The performance of digital communication systems over generalized-K (K/sub G/) fading channels is analyzed and evaluated and novel closed form expressions for the SNR statistics, the average Shannon's channel capacity and the bit error rate are derived.
Abstract: The performance of digital communication systems over generalized-K (K/sub G/) fading channels is analyzed and evaluated. Novel closed form expressions for the SNR statistics, the average Shannon's channel capacity and the bit error rate (BER) are derived. These expressions are used to study important performance criteria such as the outage performance, the average capacity and the BER for a great variety of modulation formats in K/sub G/ fading channels. The proposed mathematical analysis is accompanied with various performance evaluation results, which demonstrate the usefulness of the proposed approach.

379 citations


Proceedings ArticleDOI
11 Jun 2006
TL;DR: In this paper, the authors advocate exploiting channel descriptor information in packet data communication networks to gain transmission capacity, where the channel descriptor (or character of the channel) can be used to convey data.
Abstract: In this paper we advocate exploiting channel descriptor information in packet data communication networks to gain transmission capacity. Besides the normal data transmission also the channel descriptor (or character of the channel) can be used to convey data. This novel access technique is suitable for wired as well as for wireless networks. By the example of a wireless spread spectrum system with pseudo?noise spreading sequences, we can report that a gain of nearly an order of magnitude in terms of capacity can be achieved compared to the standard spread spectrum transmission for a given scenario. Our approach is not limited to spread spectrum technologies, but applies to all systems with the property that the number of channel descriptors is larger than the actual number of simultaneously usable resources.

362 citations


Journal ArticleDOI
TL;DR: In this article, a 120-GHz-band wireless link that uses millimeter-wave photonic techniques was developed, which achieved error-free transmission of OC-192 and 10-GbE signals over a distance of more than 200 m with a received power of below -30 dBm.
Abstract: A 120-GHz-band wireless link that uses millimeter-wave (MMW) photonic techniques was developed. The output power and noise characteristics of 120-GHz-band MMWs generated by converting a 125-GHz optical subcarrier signal were evaluated. It was then shown that the noise characteristics of the 125-GHz signal generated with these photonic technologies is sufficient for 10-Gb/s data transmission. We constructed a compact 120-GHz-band wireless link system, and evaluated its data transmission characteristics. This system achieved error-free transmission of OC-192 and 10-GbE signals over a distance of more than 200 m with a received power of below -30 dBm.

300 citations


Journal ArticleDOI
TL;DR: A novel MAC layer relay-enabled distributed coordination function (DCF) protocol, called rDCF, is proposed to further exploit the physical layer multirate capability of IEEE 802.11 and can significantly reduce the packet delay, improve the system throughput, and alleviate the impact of channel errors on fairness.
Abstract: It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have been proposed to achieve this goal. However, these solutions only consider how to exploit good channel quality for the direct link between the sender and the receiver. Since IEEE 802.11 supports multiple transmission rates in response to different channel conditions, data packets may be delivered faster through a relay node than through the direct link if the direct link has low quality and low rate. In this paper, we propose a novel MAC layer relay-enabled distributed coordination function (DCF) protocol, called rDCF, to further exploit the physical layer multirate capability. We design a protocol to assist the sender, the relay node, and the receiver to reach an agreement on which data rate to use and whether to transmit the data through a relay node. Considering various issues, such as, bandwidth utilization, channel errors, and security, we propose techniques to further improve the performance of rDCF. Simulation results show that rDCF can significantly reduce the packet delay, improve the system throughput, and alleviate the impact of channel errors on fairness

279 citations


Journal ArticleDOI
TL;DR: In this paper, a network of low-cost wireless sensors was installed in the Geumdang Bridge, Korea to monitor the bridge response to truck loading, and a signal conditioning circuit that amplifies and filters low-level accelerometer outputs is proposed.
Abstract: As researchers continue to explore wireless sensors for use in structural monitoring systems, validation of field performance must be done using actual civil structures. In this study, a network of low-cost wireless sensors was installed in the Geumdang Bridge, Korea to monitor the bridge response to truck loading. Such installations allow researchers to quantify the accuracy and robustness of wireless monitoring systems within the complex environment encountered in the field. In total, 14 wireless sensors were installed in the concrete box girder span of the Geumdang Bridge to record acceleration responses to forced vibrations introduced by a calibrated truck. In order to enhance the resolution of the capacitive accelerometers interfaced to the wireless sensors, a signal conditioning circuit that amplifies and filters low-level accelerometer outputs is proposed. The performance of the complete wireless monitoring system is compared to a commercial tethered monitoring system that was installed in parallel. The performance of the wireless monitoring system is shown to be comparable to that of the tethered counterpart. Computational resources (e.g. microcontrollers) coupled with each wireless sensor allow the sensor to estimate modal parameters of the bridge such as modal frequencies and operational displacement shapes. This form of distributed processing of measurement data by a network of wireless sensors represents a new data management paradigm associated with wireless structural monitoring. (Some figures in this article are in colour only in the electronic version)

Patent
Paul Benjamin1
21 Feb 2006
TL;DR: In this article, a system and method for predicting and preventing unauthorized intrusion in a computer configuration is presented, where a vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over a communication network as the vulnerability assessment components executes commands.
Abstract: The present invention provides a system and method for predicting and preventing unauthorized intrusion in a computer configuration. Preferably, the invention comprises a communication network to which at least two computing devices connect, wherein at least one of the computing devices is operable to receive data transmitted by the other computing device. The invention further comprises a database that is accessible over the network and operable to store information related to the network. A vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over the communication network as the vulnerability assessment component executes commands. Also, an intrusion detection component is included that is operable to provide a simulated copy of the network, to generate a first data transmission on the simulated copy of the network that represents a second data transmission on the communication network, and to compare the first data transmission with a second data transmission. The vulnerability assessment component preferably interfaces with the intrusion detection component to define rules associated with the first and second data transmissions, to store the rules in the database, and to retrieve the rules from the database in order to predict and prevent unauthorized intrusion in the computer configuration.

Proceedings ArticleDOI
01 Nov 2006
TL;DR: An analytical model is proposed to study the performance improvement of the MAC protocol by using the two frame aggregation techniques, namely A-MPDU and A-MSDU (MAC Service Data Unit Aggregation) and results show that the network throughput performance is significant improved when compared with both randomized and fixed frame aggregation algorithms.
Abstract: The IEEE 802.11a/b/g have been widely accepted as the de facto standards for wireless local area networks (WLANs). The recent IEEE 802.11n proposals aim at providing a physical layer transmission rate of up to 600 Mbps. However, to fully utilize this high data rate, the current IEEE 802.11 medium access control (MAC) needs to be enhanced. In this paper, we investigate the performance improvement of the MAC protocol by using the two frame aggregation techniques, namely A-MPDU (MAC Protocol Data Unit Aggregation) and A-MSDU (MAC Service Data Unit Aggregation). We first propose an analytical model to study the performance under uni-directional and bi-directional data transfer. Our proposed model incorporates packet loss either from collisions or channel errors. Comparison with simulation results show that the model is accurate in predicting the network throughput. We also propose an optimal frame size adaptation algorithm with A-MSDU under error-prone channels. Simulation results show that the network throughput performance is significant improved when compared with both randomized and fixed frame aggregation algorithms.

Patent
19 May 2006
TL;DR: In this article, a novel method for wireless power transmission that comprises a transmitter and a receiver is disclosed, where the receiver does not require an independent power source and is comprised of an optical feedback to the transmitter, and therefore does not need a separate communication channel to the transmitters.
Abstract: A novel method for wireless power transmission that comprises a transmitter and a receiver is disclosed. The receiver does not require an independent power source and is comprised of an optical feedback to the transmitter, and therefore does not require a separate communication channel to the transmitter. The transmitter uses the optical feedback to locate and track the receiver. The transmitter can optionally employ a macro adjusters and micro adjusters that direct the beam onto the receiver for optimal power transmission. The system also optionally has a tight loop beam detector to enhance safety of the system. Either the receiver and/or the transmitter may also encode data on the energy transmission, resulting in one-way or two-way data transmission.

Journal ArticleDOI
TL;DR: A novel fuzzy-logic (FL)-based decision-making algorithm for VHO is proposed, which is capable of combining the merits of both schemes to achieve excellent handover in terms of packet transfer delay for all the cases considered here.
Abstract: -Due to the complementary nature of radio and optical wireless (OW) both in capacity and coverage, the combined use of both for data transmission could have advantages over a single media. However, big technical challenges for vertical-handover (VHO) strategy arise for such an integrated system. According to different interruption types and traffic modes, two basic VHO schemes can be applied: immediate VHO (I-VHO) and dwell VHO (D-VHO). This paper proposes a novel fuzzy-logic (FL)-based decision-making algorithm for VHO, which is capable of combining the merits of both schemes to achieve excellent handover in terms of packet transfer delay for all the cases considered here. The strength of FL in handling uncertain and conflicting decision metrics is exploited. Since excessive transfer delay results in disrupted connection and corrupted service, the proposed FL-based VHO decision-making algorithm has the potential to provide a better quality of service (QoS) to users in future wireless broadband communications.

Patent
25 Jan 2006
TL;DR: In this article, a method and apparatus of using light-emitting elements for illumination as well as communication of data, wherein potential flicker due to sub-fusion frequency data correlations can be reduced compared to prior art techniques, while reducing redundancy in the data transmission.
Abstract: The present invention provides a method and apparatus of using light-emitting elements for illumination as well as communication of data, wherein potential flicker due to sub-fusion frequency data correlations can be reduced compared to prior art techniques, while reducing redundancy in the data transmission. The intensity of the illumination from the light-emitting elements is controlled by a dimming signal such as a pulse width modulation (PWM) signal or a pulse code modulation (PCM) signal, for example. An amplitude-modulated data signal is then superimposed on the dimming signal for communication of data. The dimming signal thus acts as a carrier signal for the data signal. A sensing means is then used to receive the data signal by detecting all or part of the illumination from the light-emitting elements. The data signal can subsequently be extracted from the detected illumination.

Patent
24 May 2006
TL;DR: In this paper, a power cost per unit data associated with successfully sending data from a wireless mobile device to a remote endpoint in a communications network is determined, compared to a first threshold.
Abstract: Methods, systems, and computer program products are disclosed for controlling data transmission based on power cost. A power cost per unit data associated with successfully sending data from a wireless mobile device to a remote endpoint in a communications network is determined. The determined power cost per unit data is compared to a first threshold. Transmission of data from the wireless mobile device to the remote endpoint is delayed based on a determination that the power cost per unit data exceeds the first threshold.

Patent
20 Dec 2006
TL;DR: In this article, a method and system for monitoring context information associated with a wireless communication entity for determining a potential occurrence of a network disruption for that wireless communications entity is presented, which is used to prevent or mitigate service disruptions.
Abstract: A method and system for monitoring context information associated with a wireless communication entity for determining a potential occurrence of a network disruption for that wireless communication entity. Upon determining a potential occurrence of a network disruption, causing an adjustment of bandwidth available for data transfer involving the wireless communication entity. The adjustment is used to prevent or mitigate service disruptions.

Journal ArticleDOI
TL;DR: A secure energy-efficient data aggregation protocol called ESPDA (Energy-Efficient Secure Pattern based Data Aggregation), which outperforms conventional data aggregation methods up to 50% in bandwidth efficiency.

Proceedings ArticleDOI
01 Apr 2006
TL;DR: A simple and effective DFT-MSN data delivery scheme, which consists of two key components for data transmission and queue management, respectively, which achieves the highest message delivery ratio with acceptable delay and transmission overhead.
Abstract: This paper focuses on the Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN) for pervasive information gathering. We develop simple and efficient data delivery schemes tailored for DFT-MSN, which has several unique characteristics such as sensor mobility, loose connectivity, fault tolerability, delay tolerability, and buffer limit. We first study two basic approaches, namely, direct transmission and flooding. We analyze their performance by using queuing theory and statistics. Based on the analytic results that show the tradeoff between data delivery delay/ratio and transmission overhead, we introduce an optimized flooding scheme that minimizes transmission overhead in flooding. Then, we propose a simple and effective DFT-MSN data delivery scheme, which consists of two key components for data transmission and queue management, respectively. The former makes decision on when and where to transmit data messages based on the delivery probability, which reflects the likelihood that a sensor can deliver data messages to the sink. The latter decides which messages to transmit or drop based on the fault tolerance, which indicates the importance of the messages. The system parameters are carefully tuned on the basis of thorough analyses to optimize network performance. Extensive simulations are carried out for performance evaluation. Our results show that the proposed DFT-MSN data delivery scheme achieves the highest message delivery ratio with acceptable delay and transmission overhead.

Journal ArticleDOI
TL;DR: In this paper, the average data throughput of a single transmitter sending data over a fading channel to a single user class was maximized by using a dynamic programming formulation that leads to an optimal transmission schedule, first where the present channel state was known just before transmission, and then to the case where the current channel state is unknown before transmission and observed after transmission and evolves according to a Markov process.
Abstract: We seek to maximize the average data throughput of a single transmitter sending data over a fading channel to a single user class. The transmitter has a fixed amount of energy and a limited amount of time to send data. Given that the channel state determines the throughput obtained per unit of energy expended, the goal is to obtain a policy for scheduling transmissions that maximizes the expected data throughput. We develop a dynamic programming formulation that leads to an optimal transmission schedule, first where the present channel state is known just before transmission, and then to the case where the current channel state is unknown before transmission, but observed after transmission and evolves according to a Markov process. We then extend our approach to the problem of minimizing the expected energy required to send a fixed amount of data over a fading channel given deadline constraints.

Patent
09 Jan 2006
TL;DR: In this paper, the frequency response of a forward link is estimated at a base station based on reverse link transmissions (e.g., pilots) from a terminal, and preconditions modulation symbols based on weights derived from the forward transfer function.
Abstract: Techniques to process data for transmission in a time division duplexed (TDD) communication system. In one aspect, the frequency response of a forward link is estimated at a base station based on reverse link transmissions (e.g., pilots) from a terminal. Prior to a data transmission on the forward link, the base station determines a reverse transfer function based on the pilots transmitted by the terminal, “calibrates” the reverse transfer function with a calibration function to derive an estimate of a forward transfer function, and preconditions modulation symbols based on weights derived from the forward transfer function. In another aspect, the terminal estimates the “quality” of the forward link and provides this information to the base station. The base station then uses the information to properly code and modulate data prior to transmission such that the transmitted data can be received by the terminal at the desired level of performance.

Patent
24 Jan 2006
TL;DR: In this article, a method and apparatus for providing EMC Class-B compliant RF transmission for a data monitoring and detection system having a sensor for detecting one or more glucose levels, a transmitter configured to transmit a respective signal corresponding to each of the detected glucose levels using a data transmission protocol including wireless data transmission protocols, to a receiver which is configured to receive the transmitted signals corresponding to the detected levels is provided.
Abstract: Method and apparatus for providing EMC Class-B compliant RF transmission for a data monitoring and detection system having a sensor for detecting one or more glucose levels, a transmitter configured to transmit a respective signal corresponding to each of the detected glucose levels using a data transmission protocol including wireless data transmission protocols, to a receiver which is configured to receive the transmitted signals corresponding to the detected glucose levels is provided. When placed in an EMC Class-B compliant mode the monitoring and detection system along with any associated patient treatment units would be allowed to operate in hospital environments and on commercial aircraft during flight.

Journal ArticleDOI
TL;DR: In this paper, the authors developed an analytic power-rate-distortion (P-R-D) model to characterize the inherent relationship between the power consumption of a video encoder and its ratedistortion performance, and studied the optimum power allocation between video encoding and wireless transmission and introduced a measure called achievable minimum distortion to quantify the distortion under total power constraint.
Abstract: Wireless video sensor networks (WVSNs) have been envisioned for a wide range of important applications, including battlefield intelligence, security monitoring, emergency response, and environmental tracking. Compared to traditional communication system, the WVSN operates under a set of unique resource constraints, including limitations with respect to energy supply, on-board computational capability, and transmission bandwidth. The objective of this paper is to study the resource utilization behavior of a wireless video sensor and analyze its performance under the resource constraints. More specifically, we develop an analytic power-rate-distortion (P-R-D) model to characterize the inherent relationship between the power consumption of a video encoder and its rate-distortion performance. Based on the P-R-D analysis and a simplified model for wireless transmission power, we study the optimum power allocation between video encoding and wireless transmission and introduce a measure called achievable minimum distortion to quantify the distortion under a total power constraint. We consider two scenarios in wireless video sensing, small-delay wireless video monitoring and large-delay wireless video surveillance, and analyze the performance limit of the wireless video sensor in each scenario. The analysis and results obtained in this paper provide an important guideline for practical wireless video sensor design.

Journal ArticleDOI
24 Apr 2006
TL;DR: A new architecture for wireless power and data telemetry that recovers power and a system clock from a weak incident RF signal, incorporating an on-chip ADC, and employing active telemetry for data transmission is presented.
Abstract: We present a new architecture for wireless power and data telemetry that recovers power and a system clock from a weak incident RF signal. A high-efficiency RF-DC converter generates a 3-VDC supply for the system from a -12.3-dBm incident RF signal, gathered by a commercial 50-/spl Omega/ antenna. A system clock is extracted from the same incident signal, by an injection-locked LC oscillator. Sub-harmonic injection-locking facilitates the separation of the incident and the transmit signal frequencies, without need for a PLL. The proposed architecture is used in a long-range telemetry device, incorporating an on-chip ADC, and employing active telemetry for data transmission. Data is transmitted through binary phase-shift-keying of a 900-MHz carrier. The prototype, implemented in 0.25-/spl mu/m CMOS, occupies less than 1 mm/sup 2/. A wireless operation range of more than 18 meters is indicated by anechoic chamber testing.

Patent
30 May 2006
TL;DR: In this article, a receiver estimates a fading channel of received data, selects a weight set relative to a maximum data transmission rate from at least one weight set with elements of a plurality of orthogonal weight vectors, and transmits feedback information including the selected weight set and channel-by-channel state information to a transmitter.
Abstract: An apparatus and method for transmitting/receiving data in a mobile communication system using multiple antennas are provided. A receiver estimates a fading channel of received data, selects a weight set relative to a maximum data transmission rate from at least one weight set with elements of a plurality of orthogonal weight vectors, and transmits feedback information including the selected weight set and channel-by-channel state information to a transmitter. The transmitter demultiplexes data to be transmitted on a basis of the feedback information into at least one sub-data stream, multiplies each sub-data stream by an associated weight, and transmits the data.

Patent
16 Mar 2006
TL;DR: In this article, the channel-to-resource mapping for each channel set is pseudo-random with respect to the remaining channel sets for each remaining channel set, and the scheduled terminals are assigned channels from the channel sets.
Abstract: A channel structure has at least two channel sets. Each channel set contains multiple channels and is associated with a specific mapping of the channels to the system resources available for data transmission. Each channel set may be defined based on a channel tree having a hierarchical structure. To achieve intra-cell interference diversity, the channel-to-resource mapping for each channel set is pseudo-random with respect to the mapping for each remaining channel set. In each scheduling interval, terminals are scheduled for transmission on the forward and/or reverse link. The scheduled terminals are assigned channels from the channel sets. Multiple terminals may use the same system resources and their overlapping transmissions may be separated in the spatial domain. For example, beamforming may be performed to send multiple overlapping transmissions on the forward link, and receiver spatial processing may be performed to separate out multiple overlapping transmissions received on the reverse link.

Journal ArticleDOI
TL;DR: It is shown that multiple estimates from different frequencies or times can enhance the performance significantly, which enables the adaptive OFDM system to tolerate larger errors in channel estimation or longer delay in CSI.
Abstract: Adaptive modulation has been shown to have significant benefits for high-speed wireless data transmission when orthogonal frequency division multiplexing (OFDM) is employed. However, accurate channel state information (CSI) is required at the transmitter to achieve the benefits. Imperfect CSI arises from noisy channel estimates, which may also be outdated due to a delay in getting the CSI to the transmitter. In this paper, we study adaptive OFDM with imperfect CSI for the uncoded variable bit rate case, where a target bit error rate is set. A loading algorithm based on the statistics of the real channel is proposed. Performance results in terms of the average spectral efficiency are provided for adaptive OFDM systems when there is noisy channel estimation or CSI delay. The use of multiple estimates is then proposed to improve the performance. It is shown that multiple estimates from different frequencies or times can enhance the performance significantly, which enables the system to tolerate larger errors in channel estimation or longer delay in CSI

Journal ArticleDOI
TL;DR: In this article, a review of ultra-high-speed data transmission in optical fibers based on optical time division multiplexing (OTDM) transmission technology is presented, where optical signal processing in the transmitter and receiver as well as the requirements on ultrahigh speed data transmission over a fiber link are discussed.
Abstract: This paper reviews ultrahigh-speed data transmission in optical fibers based on optical time division multiplexing (OTDM) transmission technology. Optical signal processing in the transmitter and receiver as well as the requirements on ultrahigh-speed data transmission over a fiber link are discussed. Finally, results of several OTDM-transmission experiments, including 160-Gb/s transmission over 4320 km, 1.28-Tb/s transmission over 240 km, and 2.56-Tb/s transmission over 160-km fiber link, are described

Proceedings ArticleDOI
25 Sep 2006
TL;DR: A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks which are characterized by long propagation delays.
Abstract: A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks which are characterized by long propagation delays. The protocol exploits the difference in the link lengths between the nodes instead of using waiting times proportional to the maximal link length. To do so, it relies on a receiver's ability to tolerate a certain level of interference. By minimizing the length of the hand-shake procedure preceeding the data transmission, the throughput efficiency is increased as compared to the previously proposed protocols, while collision avoidance minimizes the energy consumption.