Modified EESM Link Adaptation Method with Multiple Constellation for Future Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
Wireless communication systems require high spectral efficiency and throughput in order to be money-spinning. Link adaptation schemes are known to be the best solution to achieve this aspiration. In customary link adaptation scheme for OFDM, a look-up table is maintained at the system level and best Modulation and Coding Scheme (MCS) is chosen based on the link generalization information from the link level simulator. One of the well known link generalization method is Exponential Effective SNR Mapping (EESM), where the received SNR vectors at the receiver are being abstracted to a single metric, SNReff that represents the link quality. One Channel State Information (CSI) representing the whole group of sub-carriers over a time varying fading channel may lead to be better or worse for few sub-carriers in the group and reduces the Bit Error Rate. Hence multiple feedbacks and multiple constellations may within one group of sub-carriers may improve the performance and utilization of the channel. Modified EESM approach is proposed in the paper with multiple feedbacks and constellations to improve the BER performance. Improvement in the throughput performance and reduction in feedback overhead has been shown as performance metrics.
Authors and Affiliations
Sandanalakshmi R, Kadhiravan D
Design of Co-Processor for NIOS-II Processor Based Poly phase Image Scalar
In this paper, we present an hardware accelerating coprocessor for a Polyphase image scaler. First the image scaling algorithm will be ported onto the SOC having Altera NIOSII processor which will be a pure software...
Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform
Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...
Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...
Greedy Algorithm for Hub Selection in Interactive Network Applications
Many multiple users interaction in network applications such as teleconferencing, network gaming and online trading are gaining popularity but these applications require that the delay difference in between multiple...
Analysis of Four Stage Encryption
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...