From Marconi to Wireless Internet: The Wireless (R)evolution Prof. Vijay K. Bhargava Professor and Head, Dept. of Electrical and Computer Engineering The.

Slides:



Advertisements
Similar presentations
EcoTherm Plus WGB-K 20 E 4,5 – 20 kW.
Advertisements

University Paderborn 07 January 2009 RG Knowledge Based Systems Prof. Dr. Hans Kleine Büning Reinforcement Learning.
1 A B C
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AP STUDY SESSION 2.
1
RWTÜV Fahrzeug Gmbh, Institute for Vehicle TechnologyTÜV Mitte Group 1 GRB Working Group Acceleration Pattern Results of pass-by noise measurements carried.
Reinforcement Learning
Slide 1Fig 26-CO, p.795. Slide 2Fig 26-1, p.796 Slide 3Fig 26-2, p.797.
Slide 1Fig 25-CO, p.762. Slide 2Fig 25-1, p.765 Slide 3Fig 25-2, p.765.
Sequential Logic Design
Copyright © 2013 Elsevier Inc. All rights reserved.
HANDBOOK ON GREEN INFORMATION AND COMMUNICATION SYSTEMS
STATISTICS INTERVAL ESTIMATION Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National Taiwan University.
Addition and Subtraction Equations
David Burdett May 11, 2004 Package Binding for WS CDL.
Iterative Equalization and Decoding
Create an Application Title 1Y - Youth Chapter 5.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
CHAPTER 18 The Ankle and Lower Leg
The 5S numbers game..
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
1 OFDM Synchronization Speaker:. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outline OFDM System Description Synchronization What is Synchronization?
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Media-Monitoring Final Report April - May 2010 News.
Break Time Remaining 10:00.
The basics for simulations
EE, NCKU Tien-Hao Chang (Darby Chang)
1 The Beauty of Mathematics in Communications R. C. T. Lee Dept. of Information Management & Dept. of Computer Science National Chi Nan University.
PP Test Review Sections 6-1 to 6-6
2013 Fox Park Adopt-A-Hydrant Fund Raising & Beautification Campaign Now is your chance to take part in an effort to beautify our neighborhood by painting.
Regression with Panel Data
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
1 Prediction of electrical energy by photovoltaic devices in urban situations By. R.C. Ott July 2011.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Biology 2 Plant Kingdom Identification Test Review.
Adding Up In Chunks.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
1 Termination and shape-shifting heaps Byron Cook Microsoft Research, Cambridge Joint work with Josh Berdine, Dino Distefano, and.
Artificial Intelligence
When you see… Find the zeros You think….
Before Between After.
12 October, 2014 St Joseph's College ADVANCED HIGHER REVISION 1 ADVANCED HIGHER MATHS REVISION AND FORMULAE UNIT 2.
Subtraction: Adding UP
: 3 00.
5 minutes.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Static Equilibrium; Elasticity and Fracture
Converting a Fraction to %
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Clock will move after 1 minute
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
16. Mean Square Estimation
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
9. Two Functions of Two Random Variables
A Data Warehouse Mining Tool Stephen Turner Chris Frala
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
From Marconi to Wireless Internet: The Wireless (R)evolution Prof. Vijay K. Bhargava Candidate for 2004 IEEE President-Elect University of Victoria Victoria,
Presentation transcript:

From Marconi to Wireless Internet: The Wireless (R)evolution Prof. Vijay K. Bhargava Professor and Head, Dept. of Electrical and Computer Engineering The University of British Columbia Vancouver, Canada Website:

2 Presentation Outline 1. Historical Overview 2. The Three Generations 3. Beyond 3G/Wireless Internet 4. Enabling Techniques (Innovations from IT Society) 5. Malaise Afflicting the Wireless Industry 6. Possible Recovery Scenario 7. Conclusions

3

4 Maxwell Hertz Popov Fessenden

5

6

7 Signal Hill, December 12, 2001

8 The Three Generations and Beyond (Overview) First Generation : Analog Cellular (Mainly Speech) Second Generation : Digital Cellular (Digital Speech and messaging) 2.5G, 2.75G, … Third Generation : IMT2000 (Integrated Audio and Video)

9 Beyond 3G The true Wireless Internet Internet connectivity anytime anywhere Wireless and mobile extensions to the Internet Wireless – Wireline BB Transparency

10 Claude Elwood Shannon Father of Information Theory Electrical engineer, mathematician, and native son of Gaylord. His creation of information theory, the mathematical theory of communication, in the 1940s and 1950s inspired the revolutionary advances in digital communications and information storage that have shaped the modern world. This statue was donated by the Information Theory Society of the Institute of Electrical and Electronics Engineers, whose members follow gratefully in his footsteps. Dedicated October 6, 2000 Eugene Daub, Sculptor

11 Enabling Techniques (Innovations from IT Society) Reed Solomon Codes Viterbi Algorithm Public Key Crytosystem Compression Algorithm, Huffman, Lempel-Ziv, Algebraic Coding Modem Design with Coded Modulation, Ungerböeck Turbo Decoding approaches Shannons capacity limit by less than 0.5dB Theory of CDMA and Multiuser Transmission Space-Time Coding for Mobiles

12 Cryptography Secret Key System Public Key System

13 Digital Signature

14 Source Coding for Voice and Video Variants of Predictive Coding For voice CELP, VCELP, RPE-LTP and other Variants H.261 and H.263 Standards support low bit rate (30-64 kbps) Video for mobile communication MPEG-4 (with Reed-Solomon Codes)

15 Turbo Codes Originally Turbo code encoder was built using a parallel concatenation of two (or more) relatively simple recursive systematic convolutional (RSC) codes with large interleaving Although the component codes are weak, the output turbo codeword is very powerful due to the Interleaver gain which produces a random-like codeword dkdk RSC1 RSC2 Interleaver dkdk d 1,k d 2,k Turbo Code Encoder

16 After m iterations Decoder 1 Decoder 2 rkrk r 1,k r 2,k Turbo code Decoder d Turbo Codes (Iterative Decoding) Soft Input/Soft Output MAP Decoder Use extrinsic information produced from past decoder as á priori information Gradually improvement of knowledge on transmitted information through iterations

17 Turbo Codes Turbo codes will be used in high data rate services in the next generation CDMA systems above 32 kbps There are already existing standards for ½ and 1/3 coding rate turbo code for 3GPP systems The same iterative decoding principle can be applied in various different areas Turbo equalization Turbo multiuser detection (for coded CDMA signals) Turbo decoding with estimation of parameters of an unknown time-varying channel

18 Multiuser Detection (MUD) Signals from all users are considered useful instead of only interference to each other MUD provides important performance gains over the conventional single-user receiver Performance of single-user conventional receivers are limited in fading channel due to the near-far effect which necessitates use of strict power control In certain cases multiuser receivers can even benefit from the diversity in powers of the received users and have better performances than in the case of equal received powers of users

19 Multiuser Detection (MUD) In the single user approach, each detector focuses on extracting the data of a single user Other users are considered as interference Simple h(t) 1 st Rake Receiver K th Rake Receiver Rx Multiuser Detector b1b1 bKbK oscillator In the multi-user detection approach, the common detector uses available information from all users to detect each user Complex oscillator Rx h(t) 1 st Rake Receiver K th Rake Receiver Detector b1b1 bKbK

20 Multiuser Detection (MUD) Benefits of using multiuser detection More efficient spectrum utilization (in some situations we can expect ten fold increase in spectrum efficiency) Reduced precision requirement for power control More efficient power utilization Main difficulties in implementing multiuser detection Existence of the other-cell multiple-access interference (MAI) Difficulty in implementing multiuser detection on the downlink (cost, size, weight are of much larger concern for mobile terminals)

21 Multiuser Detection (MUD) Some of the MUD algorithms are Maximum Likelihood (Optimal) Decoding (complexity increases exponentially with the number of users) Linear detectors (similar to the linear equalization techniques) decor relating detector MMSE detector MMSE detector can be implemented as an adaptive filter to reduce complexity Blind adaptive implementation of the MMSE detector Decision Feedback Detectors where past decisions are used to improve the current ones Conventional Decision Feedback or Successive Interference Cancellation Parallel Interference Cancellation Optimum Decision Feedback Receiver (has the spectral efficiency equal to the optimum detector)

22 Multiuser Detection (MUD) Implementation examples of multistage parallel interference cancellation multiuser detection: DSP implementation [Buehrer, Woerner, 1999] VLSI implementation [Aazhang et al., 2000] The parallel interference cancellation is prefered due to its performance complexity tradeoff However, MUD research is still in a phase that would not justify to make it a mandatory feature for 3G WCDMA standards Most probably, its practical implementation and standardization is going to be defered for 4G systems

23 Space-Time Codes Capacity of a multi-antenna systems far exceeds that of single-antenna system Multiple transmit/receive antennas provide diversity in the space domain (space diversity) Channel coding designed for wireless communication systems with multiple transmit/receive antennas provide both space and time diversity Space-time codes Two categories of space-time coding 1) space-time trellis codes 2) space-time block codes Decoding of space-time codes requires channel estimation

24 Space-Time Codes Information source Space-time encoder Receiver s(k ) c 1 (k) c N (k) r 1 (k) r N (k) s(k) Space-time coding system ,01,02,03,04,05,06,07 50,51,52,53,54,55,56,57 20,21,22,23,24,25,26,27 70,71,72,73,74,75,76,77 40,41,42,43,44,45,46,47 10,11,12,13,14,15,16,17 60,61,62,63,64,65,66,67 30,31,32,33,34,35,36,37 Input: Tx 1: Tx 2: Space-time trellis codes (8-PSK) with two transmit antennas Space-time block codes with two transmit antennas (Alamoutis scheme) Constellation Mapper s(k ) [c 1 c 2 ]

25 Space-Time Codes Bandwidth and power efficient – a codeword is transmitted simultaneously from different antennas with the same total transmit power Channel information is not necessary at the transmitter Differential scheme is available when channel information is not known at the receiver Can be concatenated with other codes such as Reed- Solomon, TCM, turbo code Can be applied in broadband channel – CDMA, OFDM Adopted in standards – IS-136, W-CDMA, CDMA2000 Tested in WLAN a. Increase in link layer throughput and improving TCP performance

26 The Malaise Afflicting The Communications Industry * A convergence of five key factors 1. Greed 2. Corporate Crime 3. Misguided Regulations 4. Too Much Debt 5. A Broken Business Model Why did we, the engineers, allow business manipulators and bureaucrats to drive the show ? *Peter A. Bernstein, IEEE Spectrum, January 2003

27 Possible Recovery Scenario Nothing lasts forever This too shall pass Survival of the fattest! Broadband: Alive and Well Mobile, and Loving it If Each is Good, Both are Better If You Build it, Killer Apps will Come *Steven M.Cherry, IEEE Spectrum, January 2003

28 Conclusions We have presented a historical overview of Wireless Communication Innovations from IT Society have been discussed Reliable high-speed mobile Internet Access will lead to innovative product and services It is dangerous to put limits on Wireless Communications

29 ISBN: © 2003

30

31 WHY ARE THESE MEN SMILING ?

32