SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


                      Design and Implementation of Distributed
Space-Frequency to Achieve Cooperative Diversity in Wireless
                                            Relay Networks
                                                     K.S.Srikanth
                         Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                            E-mail: srikanth.dsd@gmail.com
Abstract
Recently, there has been much interest in modulation techniques that can help in achieving transmit
diversity motivated by the increased capacity of multiple-input multiple- output (MIMO) channel. To
achieve transmit diversity the transmitter needs to be equipped with multiple antennas. The antennas should
be well separated to have uncorrelated fading among the different antennas. This results in higher diversity
orders and higher coding gains. However, achieving transmit diversity for mobile units requires cooperative
diversity. In this context, the space-time codes (STC) for spread spectrum CDMA systems have received
great interest in recent times. The schemes presented in this paper ensure that the limitations of
conventional correlation receivers are overcome. The effect of the space-time code distribution on the
space-time code that achieves full diversity with maximum coding gain over MIMO channels is studied in
this paper. In most of the analogous works surveyed so far, it is observed, that, there has been very little
focus on the study of systems that exhibit diversity of all the three forms namely: source coding diversity,
channel coding diversity and user cooperation diversity. However, in this paper, all these three forms of
diversity are uniformly considered and the proposed schemes are studied for their robustness and
performance. It is shown, that, the proposed space-time coded communication scheme is both bandwidth
and power efficient. To analyze the proposed scheme fully, communication over fading channels is
considered. The maximum-likelihood decision metric is used to decode the original information in the
presence of channel estimation errors. A study of the performance of the proposed STC system in the
presence of slowly changing Rayleigh channels is also presented.
Keywords: Multipath fading, Communication systems, Distributed Space-time codes, Wireless relay
networks, Signal Processing, Multinode Cooperative communication, multiple sensor detection systems
1. Introduction
Cooperative diversity can provide a new dimension over which higher diversity orders can be achieved. In
this research work, the design of efficient schemes and protocols that can facilitate several terminals to
cooperate via forwarding each other’s data is proposed. The proposed schemes can increase the system
reliability by achieving spatial cooperative diversity. The focus of this research work is to identify and
devise schemes that can help to tackle the problem of how to achieve and where to exploit diversity in
cooperative networks.
          A spread-spectrum scheme typically consists of the following signal transmission and reception
stages.
1. A pseudo-random code that is different for each channel and each successive connection.
2. The information data which modulates the pseudo-random code (i.e. the data is “spread”).
3. The resulting signal that modulates a carrier.
4. The modulated carrier is amplified and broadcast.
5. The carrier is received and amplified.
6. The received signal is mixed with a local carrier to recover the spread digital signal.
Page | 1
www.iiste.org
Network and Complex Systems                                                                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

7. The receiver acquires the received code and phase locks its own code to it.
8. The received signal is correlated with the generated code, extracting the information data.
         The design of Distributed Space Time Code (DSTC) can mitigate the relay nodes synchronization
errors. However, most of the previous works on cooperative transmission assume perfect synchronization
between the relay nodes. This implies that the relays' timings, carrier frequencies, and propagation delays
are identical. But, perfect synchronization is difficult to achieve among randomly located relay nodes.
The process of acquiring the timing information of the transmitted spread spectrum signal is essential to the
implementation of any form of spread spectrum technique. In figures 1 and 2, the importance of phase
synchronization between the transmitted signal (assuming no noise case) and the locally generated carrier
(PN code) is illustrated. The de-spreader output for case (i) equals the data input, whereas, for case (ii) the
de-spreader output is another random sequence. This is due to the reason that, perfect phase
synchronization is achieved only in case (i).
          Rapid growth in mobile computing and other wireless multimedia services is inspiring many
research and development activities on high-speed wireless communication systems. Main challenges in
this area include the development of efficient coding and modulation signal processing techniques to
improve the quality and spectral efficiency of wireless systems. The recently emerged space-time coding
and signal processing techniques for wireless communication systems employing multiple transmit and
receive antennas offer a powerful paradigm for meeting these challenges. This chapter provides an
overview on the recent use of space-time coding and signal processing techniques for multiple-input
multiple-output (MIMO) communication systems. A review of the information theoretic results on the
capacities of wireless systems employing multiple transmit and receive antennas is presented. Coding and
signal processing techniques for wireless systems employing multiple transmit and receive antennas are
also briefly touched upon.
          The proposed work considers the antenna array used by the space-time code to comprise of
antennas of several geographically separated base stations (i.e. multiple antennas) and hence is more
practical. In the first phase of this paper, the performance of an existing DS-CDMA scheme is studied in the
presence of channel noise and interference. In the second phase, a block-coded Space-time coding scheme
is designed and using a maximum likelihood decision metric at the receiver the decoding is achieved. Block
space-time-codes are considered to reduce algorithmic complexity. A slow fading Rayleigh channel noise is
considered in the simulation study. A major beneficiary of this paper could be in the field of wireless sensor
networks. The concepts presented shall assist in using some of the relay nodes instead of some of the sensor
nodes that are less-informative to the fusion center. These relay nodes can relay the information for the
other more informative sensor nodes. Allowing some relay nodes to forward the measurements of the
more-informative sensors will increase the reliability of these measurements at the expense of sending
fewer measurements to the fusion center. This will create a tradeoff between the number of
measurements sent to the fusion center and the reliability of the more-informative measurements.
2. Two Antenna System
      If two transmit antennas are spread out geographically, the Rayleigh fading becomes uncorrelated
spatially because there is enough separation between the transmit antennas. Furthermore, it can be assumed
that the fading is temporally quasi-static in the sense that, there is no correlation between two consecutive
channel gains.
     Since the mobile station has different distances from each transmit antenna on the downlink, the mean
received signal power at the mobile station is not the same for all paths. One can normalize the distance
between the mobile station and the nearest base station to unity such that all the other distances are greater
than unity.
     Consider the simple case where there are two base stations as shown in figure 3. The normalized
distances are found using



Page | 2
www.iiste.org
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


                                             d1
                                   d 1, n=
                                             dr

                                              d2
                                    d 2, n=
                                              dr
where dr is the reference distance, which is the distance from the mobile station to the closest base station,
and d1,n and d2,n are the normalized distances. Suppose d1 < d2 and thus dr = d1, so we can normalize d1,n to
be 1 and d2,n is d2/dr. The received signal power is inversely proportional to the distance, so the mean
SNR at each receiver becomes
                    1 = (ES / N0) (d1,n)-n
                    2 = ( ES/ N0) (d2,n)-n
where n is the path loss exponent. For free space, n = 2, and for perfect ground reflection, n = 4. However,
field tests have shown that the path loss exponent is in practice in the range 2 ï‚Ł n ï‚Ł 4. Thus, n=3 was
chosen in this work during simulation. This can be extended to a typical edge-excited cellular system with
3 transmit antennas located on the edges of the cell.
     If the transmit antennas are placed in the same location, then the fading is highly correlated spatially,
and the simulated system performance is not satisfactory even with block STC.
3. Two-Branch Transmit Diversity With One Receiver
shows the base-band representation of the new two-branch transmit diversity scheme. The scheme uses two
transmit antennas and one receive antenna and may be defined by the following three functions:
    The encoding and transmission sequence of information symbols at the transmitter;
    The combining scheme at the receiver;
    The decision rule for maximum likelihood detection.
            At a given symbol period, two signals are simultaneously transmitted from the two antennas.
The signal transmitted from the antenna zero is denoted by s0 and from antenna one by s1. During the next
symbol period signal (-s1*) is transmitted from antenna zero, and signal s0* is transmitted from antenna one
where * is the complex conjugate operation.
                   The encoding is done in space and time (space-time coding). The encoding, however,
can also be done in space and frequency. Instead of two adjacent symbol periods, two adjacent carriers
may be used (space-frequency coding).
               The channel at time t can be modeled by a complex multiplicative distortion h 0(t) for
transmit antenna zero and h1(t) for transmit antenna one. Assuming that fading is constant across two
consecutive symbols, the values of hi(t) can be written as,
                    h0(t) = h0(t + T) = h0 = ïĄ0ej0
                    h1(t) = h1(t + T) = h1= ïĄ1ej1
where T is the symbol duration. The received signals can then be expressed as
                 r0 = r(t)     =      h0s0 + h1s1 + n0
                  r1 = r(t+T) = *h0s1* + h1s0 + n1
where r0 and r1 are the received signals at time t and t + T and n0 and n1 are complex random variables
representing receiver noise and interference.
4.The Combining Scheme
The combiner shown in figure 4 builds the following two combined signals that are sent to the maximum
likelihood detector:
Page | 3
www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




It is important to note that this combining scheme is different from MRRC. the combiner output is
expressed as




4.1 The Maximum Likelihood Decision Rule
       These combined signals are then sent to the maximum likelihood detector which, for each of the
signals s0 and s1, uses the decision rule for BPSK signals.


The combined signals are equivalent to that obtained from two-branch MRRC. The only difference is the
presence of phase rotations on the noise components which do not degrade the effective SNR. Therefore,
the resulting diversity order from the new two-branch transmit diversity scheme with one receiver is equal
to that of two-branch MRRC.
5. The Proposed Algorithm
Maximum likelihood decoding of any space-time block can be achieved using only linear processing at the
receiver. The maximum likelihood decision amounts to minimizing the decision metric



     over all possible values of s1 and s2. Note that due to the quasi-static nature of the channel, the path
gains are constant over two transmissions. The minimizing values are the receiver estimates of s1 and s2,
respectively. When the above metric is expanded and the terms that are independent of the code words are
deleted then the above minimization is equivalent to minimizing.




The above metric decomposes into two parts, one of which




is only a function of s2. Thus the minimization is equivalent to minimizing these two parts separately. This
in turn is equivalent to minimizing the decision matrix




Page | 4
www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


for detecting s1 and the decision metric




for detecting s2.
This is a simple decoding scheme and there is no performance sacrifice for achieving it.
6. DS-CDMA Implementation
         The proposed DS-CDMA scheme is shown in figure 5. The user data from the cell network is
modulated using a pseudo-random code. In order to protect signal, the code used is pseudo-random. It
appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous
detection. This pseudo-random code is called pseudo-noise (PN). The digital data is directly coded at a
much higher frequency. The authenticated receiver knows how to generate the same code, and correlates
the received signal with that code to extract the data.
         The Monte- Carlo simulation model used to study the performance of the proposed scheme is
shown in figure 6. Different strengths of interference (represented as A in the plot) are considered and the
probability of error is obtained for varying values of signal to noise ratio.
The performance curves Monte-Carlo simulation model used for the            simulation study of the proposed
scheme are shown in figure 7.
7. Space-Time Codes For Cooperative Diversity
         Space-time coding of CDMA signals offer increased bandwidth and bit rate [10]. A linear block
code is employed in this work. The generator matrix (for the block codes) chosen for the two user data is
                    genmat1= [1 0 0 1 1 0;0 1 0 0 1 1;0 0 1 1 0 1]    and
                    genmat2= [1 0 0 0 1 1;0 1 0 1 0 1;0 0 1 1 1 0].
The results obtained by using the proposed algorithms are discussed in this section. Figure 8 to 12 show the
transmitted two user data, received data with noise, the demodulated and de-spread data for the case of two
transmit antenna and one receive antenna. Similarly figure 8 and 9 shows the probability of detection
of error obtained versus signal to noise ratio for a two-sensor network over wireless fading
channels.
The performance curve i.e. Probability of error Vs SNR plot is shown in figure 13. The curve shows a
significant improvement with very less Probability of error even at low SNRs .
8. Conclusion
          The primary objective of present day’s mobile technologies is to enhance the data rate on
multi-path fading channels. A convincing solution introduced in this research work to achieve this is the use
of multiple antennas in transmission. This thesis report new design schemes for transmitters and receivers
of coded modulations over multiple antenna channels. The objective is to achieve near Shannon capacity
performance over ergodic channels and near outage probability performance over block fading channels.
Iterative joint detection and decoding are applied in the aim of achieving near maximum likelihood
performance. Whenever the wireless channel does not experience a large amount of coupled delay and
angle spread the algorithms proposed in this work can assist in producing a good improvement in
performance with less complex topology. It has been shown in this thesis that coding across both spatial
and temporal domains together achieves a diversity order equal to the product of the number of transmit
and receive antennas.
         The proposed work is the development of architecture for secure communication in mobile
wireless networks. The problem of deploying relay nodes in sensor networks is well
considered in this work.  A system consisting of a set of sensor nodes communicating
Page | 5
www.iiste.org
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

to a fusion center, where decisions are made, is considered. As some sensor nodes provide
"less-informative" measurements to the fusion center, effective means of assigning the system
resources allocated for these sensors to relay nodes to forward the measurements of the
other "more-informative" sensor nodes is considered in this thesis. This introduces a new tradeoff in
the system design between the number of measurements sent to the fusion center and
the reliability of the more-informative measurements, which is enhanced by deploying more
relay nodes in the network.
          The approach divides the network into clusters and implements a decentralized certification
authority. Decentralization is achieved using threshold cryptography and a network secret that is
distributed over a number of nodes. While this basic idea has been proposed earlier partially, its
application on clustered network is a novelty of the work. The work address issues of authorization,
access control and a multilevel security model and helps to adapt to the complexity of mobile end systems.
It also effectively counteracts the denial of service (DoS) threats and hence, can prolong the life time and
improve robustness of wireless sensor network. To check the validity of algorithms proposed in this thesis,
different test inputs are given and the results are analyzed. The algorithm was validated with uniform
distribution of nodes and also random distributions like Gaussian, Poisson, Rayleigh and Exponential.
Studies related to energy spent in transmission and reception to discover the given topology using the
proposed algorithm is done along with throughput fluctuations. Results obtained show that the schemes
proposed in this work, result in significant dependability improvement for a wireless sensor network.
     The proposed work shall enable a wireless sensor network to consume extremely low power, operate
in high volumetric densities and be dispensable. It is ideally suited to most of the applications that share
similar features such as difficult to access because of geographical location where the network has been
deployed, the large scale of deployment, high mobility and prone to failure. It also ensures that the
wireless sensor network be autonomous and operate unattended, be adaptive to the environment and choose
an optimal number of communicating sensing nodes since too many sensors can generate bottlenecks in the
communication infrastructure when they all compete for bandwidth.
References
H.V. Poor, "Signal Processing         for   Wideband    Communications,"     IEEE     Information   Society
News-letter, June 1992.
C.K.Weber et al., " Performance Considerations of CDMA Systems," IEEE Trans. on Vehicular Technology,
Feb. 1981, pp3-9.
E. Telatar, Capacity of multi-antenna Gaussian channels," European Transactions on Telecommunications,
vol. 10, no. 6, pp. 585{595, Nov./Dec. 1999.
G. J. Foschini and M. Gans, On the limits of wireless communication in a fading environment
when using multiple antennas," Wireless Personal Communication, vol. 6, pp. 311{335, Mar. 1998.
A.Naquib et al, IEEE Transactions on Communication systems, 1998
William et al, IEEE Transactions on Systems, Man and Cybernetics, 1991.
J. Foschini et al,   IEEE Transactions on Communication systems and Engineering, 2003.
V.Tarokh et al, IEEE Transactions on Communication systems, 1998.
W. Su, A. K. Sadek, and K. J. R. Liu, Cooperative communications in wireless networks:
Performance analysis and optimum power allocation," Wireless Personal Communications, vol. 44,
no. 2, pp. 181{217, Jan. 2008.
A. K. Sadek, W. Su, and K. J. R. Liu, Multi-node cooperative communications in wireless
networks," IEEE Trans. Signal Processing, vol. 55, pp.341-355, Jan 2007.




Page | 6
www.iiste.org
Network and Complex Systems                                                                                               www.iiste.org
          ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
          Vol 1, No.1, 2011
                             Data
                                                                                            Data

                                                                                          PN carrier
                        PN carrier


                 Spreader output                                                     Spreader
                                                                                    output
                    Local PN carrier                                             Local PN carrier

                        De-spreader
                          output                                                                                            T
                                                                                  De-spreader
                                                                                  output



              Fig 1 : Phase synchronization is perfect                            Fig 2 : Phase error due to one bit offset
           s                                            s*
tx        - *                                           s tx                                                        s
           0                                            1
antenna 0 s                                             0                                                           0
                                                            antenna 1
          1    h0        =                     h1       =                                     h0 =                              h1 =
               ïĄ0ej0                          ïĄ1ej1                                         ïĄ0e     j
                                                                                                                                ïĄ1ej
                                        rx                                                    0                                 1
                                        antenna 1
     n                                    interferen
     n
     0                                    ce        &
     1                                                                       n                                                                           n
                                    h     noise combi                                       interf                                  interf
         chann                      h
                                    0           ~ ner       ~           r0
                                                                             0
                                                                                 =          erenc                                   erenc           r1   1=
         h el       h               1
                                                s           s
                                                                        s0h0 +               e&                                     e       &       s0h1 +
         0 estima 1
               Maximum         likelihood detector
                                             0              1                        cha                                                     cha
                                                                                            noise h                                 noise
           tor                                                          n0
                                                                                  nne
                                                                                              h       *                 ~
                                                                                                                        s
                                                                                                                                h   *  h
                                                                                                                                             nne
                                                                                                                                                    n1
                                                                                                  0        0                    1       1
                                                                                      l                            0
                                                                                                               Maximu                           l
                                                                                     esti                          m                         esti
                                                                                     ma                        likelihood                    ma
          Fig 3 The new two-branch transmit                                      Two-branch MRRCV The Proposed Algorithm
                                                                                   tor                           tor
                                                                                                               detector
          diversity scheme with one receiver




          Page | 7
          www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

              NOKIA




                      USER 1          MODULATOR
             CELL 1                                                   WIRELESS TX:

                                        PN seq
                                                                                  433.2 MHZ
                                                        INTERLEAVER   MODULATOR


              NOKIA
                                                                        CARRIER

                      USER 2          MODULATOR

            CELL 2

                                        PN 2




                                          SECURE CDMA TX:




                                                           DEMOD      USER 1
ANTENNNA
                                                              PN I

           WIRELESS
                                  DEINTERLEAVER
              RX:

                                                              PN 2

                                                           DEMOD      USER 2




                                          SECURE CDMA RX:

Fig 5 :     Proposed real-time implementation of the CDMA Tx: and Rx




Fig 6 : Monte-Carlo simulation model used for the
           simulation study of the proposed scheme


   0.5
  0.45                                         A = 12
   0.4
  0.35
   0.3                                                  A=7
                               A= 3
   P (e)




  0.25
   0.2
  0.15                 A= 0
   0.1
  0.05
     0
           0 1 2 3 4 5 6 7 8 9 10 11 12
                      SNR (in dB)


Fig7 : Performance graph for the Proposed CDMA
OBSERVATION PLOTS
Page | 8
www.iiste.org
Network and Complex Systems                                                                www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




Fig 8 BPSK modulated data of user 1 generated
                by antenna 1




Fig 9   BPSK modulated data of user 2
        generated by antenna 2




Fig 10 Space-time coded received signal with noise (obtained with 2 transmit and 1 receive antenna)




Page | 9
www.iiste.org
Network and Complex Systems                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




Fig 11    Demodulated data 1




Fig 12 demodulated data2




   Fig 13. Performance graph for the proposed
          Scheme




Page | 10
www.iiste.org

Weitere Àhnliche Inhalte

Mehr von Alexander Decker

A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceAlexander Decker
 

Mehr von Alexander Decker (20)

A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among science
 

KĂŒrzlich hochgeladen

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

KĂŒrzlich hochgeladen (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Design and implementation of distributed space frequency to achieve cooperative diversity in wireless relay networks

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Design and Implementation of Distributed Space-Frequency to Achieve Cooperative Diversity in Wireless Relay Networks K.S.Srikanth Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: srikanth.dsd@gmail.com Abstract Recently, there has been much interest in modulation techniques that can help in achieving transmit diversity motivated by the increased capacity of multiple-input multiple- output (MIMO) channel. To achieve transmit diversity the transmitter needs to be equipped with multiple antennas. The antennas should be well separated to have uncorrelated fading among the different antennas. This results in higher diversity orders and higher coding gains. However, achieving transmit diversity for mobile units requires cooperative diversity. In this context, the space-time codes (STC) for spread spectrum CDMA systems have received great interest in recent times. The schemes presented in this paper ensure that the limitations of conventional correlation receivers are overcome. The effect of the space-time code distribution on the space-time code that achieves full diversity with maximum coding gain over MIMO channels is studied in this paper. In most of the analogous works surveyed so far, it is observed, that, there has been very little focus on the study of systems that exhibit diversity of all the three forms namely: source coding diversity, channel coding diversity and user cooperation diversity. However, in this paper, all these three forms of diversity are uniformly considered and the proposed schemes are studied for their robustness and performance. It is shown, that, the proposed space-time coded communication scheme is both bandwidth and power efficient. To analyze the proposed scheme fully, communication over fading channels is considered. The maximum-likelihood decision metric is used to decode the original information in the presence of channel estimation errors. A study of the performance of the proposed STC system in the presence of slowly changing Rayleigh channels is also presented. Keywords: Multipath fading, Communication systems, Distributed Space-time codes, Wireless relay networks, Signal Processing, Multinode Cooperative communication, multiple sensor detection systems 1. Introduction Cooperative diversity can provide a new dimension over which higher diversity orders can be achieved. In this research work, the design of efficient schemes and protocols that can facilitate several terminals to cooperate via forwarding each other’s data is proposed. The proposed schemes can increase the system reliability by achieving spatial cooperative diversity. The focus of this research work is to identify and devise schemes that can help to tackle the problem of how to achieve and where to exploit diversity in cooperative networks. A spread-spectrum scheme typically consists of the following signal transmission and reception stages. 1. A pseudo-random code that is different for each channel and each successive connection. 2. The information data which modulates the pseudo-random code (i.e. the data is “spread”). 3. The resulting signal that modulates a carrier. 4. The modulated carrier is amplified and broadcast. 5. The carrier is received and amplified. 6. The received signal is mixed with a local carrier to recover the spread digital signal. Page | 1 www.iiste.org
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 7. The receiver acquires the received code and phase locks its own code to it. 8. The received signal is correlated with the generated code, extracting the information data. The design of Distributed Space Time Code (DSTC) can mitigate the relay nodes synchronization errors. However, most of the previous works on cooperative transmission assume perfect synchronization between the relay nodes. This implies that the relays' timings, carrier frequencies, and propagation delays are identical. But, perfect synchronization is difficult to achieve among randomly located relay nodes. The process of acquiring the timing information of the transmitted spread spectrum signal is essential to the implementation of any form of spread spectrum technique. In figures 1 and 2, the importance of phase synchronization between the transmitted signal (assuming no noise case) and the locally generated carrier (PN code) is illustrated. The de-spreader output for case (i) equals the data input, whereas, for case (ii) the de-spreader output is another random sequence. This is due to the reason that, perfect phase synchronization is achieved only in case (i). Rapid growth in mobile computing and other wireless multimedia services is inspiring many research and development activities on high-speed wireless communication systems. Main challenges in this area include the development of efficient coding and modulation signal processing techniques to improve the quality and spectral efficiency of wireless systems. The recently emerged space-time coding and signal processing techniques for wireless communication systems employing multiple transmit and receive antennas offer a powerful paradigm for meeting these challenges. This chapter provides an overview on the recent use of space-time coding and signal processing techniques for multiple-input multiple-output (MIMO) communication systems. A review of the information theoretic results on the capacities of wireless systems employing multiple transmit and receive antennas is presented. Coding and signal processing techniques for wireless systems employing multiple transmit and receive antennas are also briefly touched upon. The proposed work considers the antenna array used by the space-time code to comprise of antennas of several geographically separated base stations (i.e. multiple antennas) and hence is more practical. In the first phase of this paper, the performance of an existing DS-CDMA scheme is studied in the presence of channel noise and interference. In the second phase, a block-coded Space-time coding scheme is designed and using a maximum likelihood decision metric at the receiver the decoding is achieved. Block space-time-codes are considered to reduce algorithmic complexity. A slow fading Rayleigh channel noise is considered in the simulation study. A major beneficiary of this paper could be in the field of wireless sensor networks. The concepts presented shall assist in using some of the relay nodes instead of some of the sensor nodes that are less-informative to the fusion center. These relay nodes can relay the information for the other more informative sensor nodes. Allowing some relay nodes to forward the measurements of the more-informative sensors will increase the reliability of these measurements at the expense of sending fewer measurements to the fusion center. This will create a tradeoff between the number of measurements sent to the fusion center and the reliability of the more-informative measurements. 2. Two Antenna System If two transmit antennas are spread out geographically, the Rayleigh fading becomes uncorrelated spatially because there is enough separation between the transmit antennas. Furthermore, it can be assumed that the fading is temporally quasi-static in the sense that, there is no correlation between two consecutive channel gains. Since the mobile station has different distances from each transmit antenna on the downlink, the mean received signal power at the mobile station is not the same for all paths. One can normalize the distance between the mobile station and the nearest base station to unity such that all the other distances are greater than unity. Consider the simple case where there are two base stations as shown in figure 3. The normalized distances are found using Page | 2 www.iiste.org
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 d1 d 1, n= dr d2 d 2, n= dr where dr is the reference distance, which is the distance from the mobile station to the closest base station, and d1,n and d2,n are the normalized distances. Suppose d1 < d2 and thus dr = d1, so we can normalize d1,n to be 1 and d2,n is d2/dr. The received signal power is inversely proportional to the distance, so the mean SNR at each receiver becomes 1 = (ES / N0) (d1,n)-n 2 = ( ES/ N0) (d2,n)-n where n is the path loss exponent. For free space, n = 2, and for perfect ground reflection, n = 4. However, field tests have shown that the path loss exponent is in practice in the range 2 ï‚Ł n ï‚Ł 4. Thus, n=3 was chosen in this work during simulation. This can be extended to a typical edge-excited cellular system with 3 transmit antennas located on the edges of the cell. If the transmit antennas are placed in the same location, then the fading is highly correlated spatially, and the simulated system performance is not satisfactory even with block STC. 3. Two-Branch Transmit Diversity With One Receiver shows the base-band representation of the new two-branch transmit diversity scheme. The scheme uses two transmit antennas and one receive antenna and may be defined by the following three functions: The encoding and transmission sequence of information symbols at the transmitter; The combining scheme at the receiver; The decision rule for maximum likelihood detection. At a given symbol period, two signals are simultaneously transmitted from the two antennas. The signal transmitted from the antenna zero is denoted by s0 and from antenna one by s1. During the next symbol period signal (-s1*) is transmitted from antenna zero, and signal s0* is transmitted from antenna one where * is the complex conjugate operation. The encoding is done in space and time (space-time coding). The encoding, however, can also be done in space and frequency. Instead of two adjacent symbol periods, two adjacent carriers may be used (space-frequency coding). The channel at time t can be modeled by a complex multiplicative distortion h 0(t) for transmit antenna zero and h1(t) for transmit antenna one. Assuming that fading is constant across two consecutive symbols, the values of hi(t) can be written as, h0(t) = h0(t + T) = h0 = ïĄ0ej0 h1(t) = h1(t + T) = h1= ïĄ1ej1 where T is the symbol duration. The received signals can then be expressed as r0 = r(t) = h0s0 + h1s1 + n0 r1 = r(t+T) = *h0s1* + h1s0 + n1 where r0 and r1 are the received signals at time t and t + T and n0 and n1 are complex random variables representing receiver noise and interference. 4.The Combining Scheme The combiner shown in figure 4 builds the following two combined signals that are sent to the maximum likelihood detector: Page | 3 www.iiste.org
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 It is important to note that this combining scheme is different from MRRC. the combiner output is expressed as 4.1 The Maximum Likelihood Decision Rule These combined signals are then sent to the maximum likelihood detector which, for each of the signals s0 and s1, uses the decision rule for BPSK signals. The combined signals are equivalent to that obtained from two-branch MRRC. The only difference is the presence of phase rotations on the noise components which do not degrade the effective SNR. Therefore, the resulting diversity order from the new two-branch transmit diversity scheme with one receiver is equal to that of two-branch MRRC. 5. The Proposed Algorithm Maximum likelihood decoding of any space-time block can be achieved using only linear processing at the receiver. The maximum likelihood decision amounts to minimizing the decision metric over all possible values of s1 and s2. Note that due to the quasi-static nature of the channel, the path gains are constant over two transmissions. The minimizing values are the receiver estimates of s1 and s2, respectively. When the above metric is expanded and the terms that are independent of the code words are deleted then the above minimization is equivalent to minimizing. The above metric decomposes into two parts, one of which is only a function of s2. Thus the minimization is equivalent to minimizing these two parts separately. This in turn is equivalent to minimizing the decision matrix Page | 4 www.iiste.org
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 for detecting s1 and the decision metric for detecting s2. This is a simple decoding scheme and there is no performance sacrifice for achieving it. 6. DS-CDMA Implementation The proposed DS-CDMA scheme is shown in figure 5. The user data from the cell network is modulated using a pseudo-random code. In order to protect signal, the code used is pseudo-random. It appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous detection. This pseudo-random code is called pseudo-noise (PN). The digital data is directly coded at a much higher frequency. The authenticated receiver knows how to generate the same code, and correlates the received signal with that code to extract the data. The Monte- Carlo simulation model used to study the performance of the proposed scheme is shown in figure 6. Different strengths of interference (represented as A in the plot) are considered and the probability of error is obtained for varying values of signal to noise ratio. The performance curves Monte-Carlo simulation model used for the simulation study of the proposed scheme are shown in figure 7. 7. Space-Time Codes For Cooperative Diversity Space-time coding of CDMA signals offer increased bandwidth and bit rate [10]. A linear block code is employed in this work. The generator matrix (for the block codes) chosen for the two user data is genmat1= [1 0 0 1 1 0;0 1 0 0 1 1;0 0 1 1 0 1] and genmat2= [1 0 0 0 1 1;0 1 0 1 0 1;0 0 1 1 1 0]. The results obtained by using the proposed algorithms are discussed in this section. Figure 8 to 12 show the transmitted two user data, received data with noise, the demodulated and de-spread data for the case of two transmit antenna and one receive antenna. Similarly figure 8 and 9 shows the probability of detection of error obtained versus signal to noise ratio for a two-sensor network over wireless fading channels. The performance curve i.e. Probability of error Vs SNR plot is shown in figure 13. The curve shows a significant improvement with very less Probability of error even at low SNRs . 8. Conclusion The primary objective of present day’s mobile technologies is to enhance the data rate on multi-path fading channels. A convincing solution introduced in this research work to achieve this is the use of multiple antennas in transmission. This thesis report new design schemes for transmitters and receivers of coded modulations over multiple antenna channels. The objective is to achieve near Shannon capacity performance over ergodic channels and near outage probability performance over block fading channels. Iterative joint detection and decoding are applied in the aim of achieving near maximum likelihood performance. Whenever the wireless channel does not experience a large amount of coupled delay and angle spread the algorithms proposed in this work can assist in producing a good improvement in performance with less complex topology. It has been shown in this thesis that coding across both spatial and temporal domains together achieves a diversity order equal to the product of the number of transmit and receive antennas. The proposed work is the development of architecture for secure communication in mobile wireless networks. The problem of deploying relay nodes in sensor networks is well considered in this work. A system consisting of a set of sensor nodes communicating Page | 5 www.iiste.org
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 to a fusion center, where decisions are made, is considered. As some sensor nodes provide "less-informative" measurements to the fusion center, effective means of assigning the system resources allocated for these sensors to relay nodes to forward the measurements of the other "more-informative" sensor nodes is considered in this thesis. This introduces a new tradeoff in the system design between the number of measurements sent to the fusion center and the reliability of the more-informative measurements, which is enhanced by deploying more relay nodes in the network. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on clustered network is a novelty of the work. The work address issues of authorization, access control and a multilevel security model and helps to adapt to the complexity of mobile end systems. It also effectively counteracts the denial of service (DoS) threats and hence, can prolong the life time and improve robustness of wireless sensor network. To check the validity of algorithms proposed in this thesis, different test inputs are given and the results are analyzed. The algorithm was validated with uniform distribution of nodes and also random distributions like Gaussian, Poisson, Rayleigh and Exponential. Studies related to energy spent in transmission and reception to discover the given topology using the proposed algorithm is done along with throughput fluctuations. Results obtained show that the schemes proposed in this work, result in significant dependability improvement for a wireless sensor network. The proposed work shall enable a wireless sensor network to consume extremely low power, operate in high volumetric densities and be dispensable. It is ideally suited to most of the applications that share similar features such as difficult to access because of geographical location where the network has been deployed, the large scale of deployment, high mobility and prone to failure. It also ensures that the wireless sensor network be autonomous and operate unattended, be adaptive to the environment and choose an optimal number of communicating sensing nodes since too many sensors can generate bottlenecks in the communication infrastructure when they all compete for bandwidth. References H.V. Poor, "Signal Processing for Wideband Communications," IEEE Information Society News-letter, June 1992. C.K.Weber et al., " Performance Considerations of CDMA Systems," IEEE Trans. on Vehicular Technology, Feb. 1981, pp3-9. E. Telatar, Capacity of multi-antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585{595, Nov./Dec. 1999. G. J. Foschini and M. Gans, On the limits of wireless communication in a fading environment when using multiple antennas," Wireless Personal Communication, vol. 6, pp. 311{335, Mar. 1998. A.Naquib et al, IEEE Transactions on Communication systems, 1998 William et al, IEEE Transactions on Systems, Man and Cybernetics, 1991. J. Foschini et al, IEEE Transactions on Communication systems and Engineering, 2003. V.Tarokh et al, IEEE Transactions on Communication systems, 1998. W. Su, A. K. Sadek, and K. J. R. Liu, Cooperative communications in wireless networks: Performance analysis and optimum power allocation," Wireless Personal Communications, vol. 44, no. 2, pp. 181{217, Jan. 2008. A. K. Sadek, W. Su, and K. J. R. Liu, Multi-node cooperative communications in wireless networks," IEEE Trans. Signal Processing, vol. 55, pp.341-355, Jan 2007. Page | 6 www.iiste.org
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Data Data PN carrier PN carrier Spreader output Spreader output Local PN carrier Local PN carrier De-spreader output T De-spreader output Fig 1 : Phase synchronization is perfect Fig 2 : Phase error due to one bit offset s s* tx - * s tx s 0 1 antenna 0 s 0 0 antenna 1 1 h0 = h1 = h0 = h1 = ïĄ0ej0 ïĄ1ej1 ïĄ0e j ïĄ1ej rx 0 1 antenna 1 n interferen n 0 ce & 1 n n h noise combi interf interf chann h 0 ~ ner ~ r0 0 = erenc erenc r1 1= h el h 1 s s s0h0 + e& e & s0h1 + 0 estima 1 Maximum likelihood detector 0 1 cha cha noise h noise tor n0 nne h * ~ s h * h nne n1 0 0 1 1 l 0 Maximu l esti m esti ma likelihood ma Fig 3 The new two-branch transmit Two-branch MRRCV The Proposed Algorithm tor tor detector diversity scheme with one receiver Page | 7 www.iiste.org
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 NOKIA USER 1 MODULATOR CELL 1 WIRELESS TX: PN seq 433.2 MHZ INTERLEAVER MODULATOR NOKIA CARRIER USER 2 MODULATOR CELL 2 PN 2 SECURE CDMA TX: DEMOD USER 1 ANTENNNA PN I WIRELESS DEINTERLEAVER RX: PN 2 DEMOD USER 2 SECURE CDMA RX: Fig 5 : Proposed real-time implementation of the CDMA Tx: and Rx Fig 6 : Monte-Carlo simulation model used for the simulation study of the proposed scheme 0.5 0.45 A = 12 0.4 0.35 0.3 A=7 A= 3 P (e) 0.25 0.2 0.15 A= 0 0.1 0.05 0 0 1 2 3 4 5 6 7 8 9 10 11 12 SNR (in dB) Fig7 : Performance graph for the Proposed CDMA OBSERVATION PLOTS Page | 8 www.iiste.org
  • 9. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Fig 8 BPSK modulated data of user 1 generated by antenna 1 Fig 9 BPSK modulated data of user 2 generated by antenna 2 Fig 10 Space-time coded received signal with noise (obtained with 2 transmit and 1 receive antenna) Page | 9 www.iiste.org
  • 10. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Fig 11 Demodulated data 1 Fig 12 demodulated data2 Fig 13. Performance graph for the proposed Scheme Page | 10 www.iiste.org