Modified EESM Link Adaptation Method with Multiple Constellation for Future Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
Wireless communication systems require high spectral efficiency and throughput in order to be money-spinning. Link adaptation schemes are known to be the best solution to achieve this aspiration. In customary link adaptation scheme for OFDM, a look-up table is maintained at the system level and best Modulation and Coding Scheme (MCS) is chosen based on the link generalization information from the link level simulator. One of the well known link generalization method is Exponential Effective SNR Mapping (EESM), where the received SNR vectors at the receiver are being abstracted to a single metric, SNReff that represents the link quality. One Channel State Information (CSI) representing the whole group of sub-carriers over a time varying fading channel may lead to be better or worse for few sub-carriers in the group and reduces the Bit Error Rate. Hence multiple feedbacks and multiple constellations may within one group of sub-carriers may improve the performance and utilization of the channel. Modified EESM approach is proposed in the paper with multiple feedbacks and constellations to improve the BER performance. Improvement in the throughput performance and reduction in feedback overhead has been shown as performance metrics.
Authors and Affiliations
Sandanalakshmi R, Kadhiravan D
Intuitionistic Fuzzy Sets: New Approach and Applications
This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
The Safety Framework in Network Security utilizing Cryptographic Systems
Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement f...
Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes
The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing endto-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged...
Technique to the Data Alignment for Accomplishing Accurate Annotation In Web Databases
Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsin...