Fig 1 - uploaded by Nico Surantha
Content may be subject to copyright.

Wireless technology evolution
Contexts in source publication
Context 1
... growth of wireless technology has been outstanding, especially in terms of throughput parameter. The GSM tech- nology (2G) can deliver up to 270 kbps [4], while the latest LTE advanced technology (4G) can deliver up to 100 Mbps [1]. The wireless local area network technology (WLAN) has also been evolving very fast from the emergence of IEEE 802.11a (first generation) that can deliver up to 2 Mbps until the emergence of IEEE 802.11ac (fifth generation) that can deliver up to 6.9 Gbps [3]. The evolution of mobile digital technology and WLAN technology are illustrated by Fig. ...
Context 2
... verification of PHY layer is carried out in order to evaluate packet transmission in certain transmission parame- ter as specified WLAN standard. The system parameters of transceiver refer to IEEE 802.11n. Several important system parameters that are employed in PHY verification are provided in Table II. In this SoC level verification, the PHY verification is emphasized on standard compliant functionality. This task only considers the processing of transmission and reception for main PHY parameters setting. The impact of HW impairments and real channel condition has been carried out in modeling level. Figure 10 shows the constellation of received signal before MIMO decoder for AWGN channel and TGn channel [3] for signal-to-noise (SNR) = 30 dB. It shows that in AWGN channel, the constellation of received signal is still very good due to the weak disruption from AWGN channel. On the other hand, in TGn channel E which is a multipath fading channel model for large office, the constellation is more destroyed, even though we can still very much recognize the shape of quadrature-amplitude-modulation 64 (QAM-64) constellation. However, it does not need to be worried, because the MIMO decoder function is to recover the destroyed received ...
Context 3
... expected mechanism of this protocol is shown by Fig. 12. The transmission protocol communication includes link setup, RTS/CTS frame exchange, data burst transmission, and BA request and BA. The link setup consists of several stages, which are : beacon transmission from AP, authentication re- quest from STA, authentication response from AP, association request from STA, association response from AP. Additionally, in this scenario we employ 3 bursts of data and implicit BA. Hence the BA request is sent from the AP to STA before STA reply the reception with BA frame. The simulation waveform in Fig. 11 confirms that the all mechanisms are successfully performed by both AP and ...
Context 4
... expected mechanism of this protocol is shown by Fig. 12. The transmission protocol communication includes link setup, RTS/CTS frame exchange, data burst transmission, and BA request and BA. The link setup consists of several stages, which are : beacon transmission from AP, authentication re- quest from STA, authentication response from AP, association request from STA, association response from AP. Additionally, in this scenario we employ 3 bursts of data and implicit BA. Hence the BA request is sent from the AP to STA before STA reply the reception with BA frame. The simulation waveform in Fig. 11 confirms that the all mechanisms are successfully performed by both AP and ...
Context 5
... verification of MAC layer incorporates the evaluation of various typical transmissions protocol, as defined in the 802.11 standard. The MAC verification is carried out by considering several main scenarios, i.e. broadcast frame transmission, management frame transmission, DCF single and multicast transmission, EDCA transmit opportunity (TXOP). Figure 11 shows an example of MAC simulation timing for overall stage of EDCA TXOP with Implicit block ACK (BA). EDCA is an extension of the basic DCF to support prioritized QOS. TXOP is bounded period where a permitted station can retain the access to the channel and transfer data within its. The Implicit block ACK frame is a packet which consists of 32 bytes that should be transmitted within a SIFS time after the end of AMPDU frame reception and block ACK ...
Context 6
... [1]. The wireless local area network technology (WLAN) has also been evolving very fast from the emergence of IEEE 802.11a (first generation) that can deliver up to 2 Mbps until the emergence of IEEE 802.11ac (fifth generation) that can deliver up to 6.9 Gbps [3]. The evolution of mobile digital technology and WLAN technology are illustrated by Fig. ...
Context 7
... impact of HW impairments and real channel condition has been carried out in modeling level. Figure 10 shows the constellation of received signal before MIMO decoder for AWGN channel and TGn channel [3] for signal-to-noise (SNR) = 30 dB. It shows that in AWGN channel, the constellation of received signal is still very good due to the weak disruption from AWGN channel. ...
Context 8
... MAC verification is carried out by considering several main scenarios, i.e. broadcast frame transmission, management frame transmission, DCF single and multicast transmission, EDCA transmit opportunity (TXOP). Figure 11 shows an example of MAC simulation timing for overall stage of EDCA TXOP with Implicit block ACK (BA). EDCA is an extension of the basic DCF to support prioritized QOS. ...
Context 9
... expected mechanism of this protocol is shown by Fig. 12. The transmission protocol communication includes link setup, RTS/CTS frame exchange, data burst transmission, and BA request and BA. The link setup consists of several stages, which are : beacon transmission from AP, authentication re- quest from STA, authentication response from AP, association request from STA, association response ...
Context 10
... transmission from AP, authentication re- quest from STA, authentication response from AP, association request from STA, association response from AP. Additionally, in this scenario we employ 3 bursts of data and implicit BA. Hence the BA request is sent from the AP to STA before STA reply the reception with BA frame. The simulation waveform in Fig. 11 confirms that the all mechanisms are successfully performed by both AP and ...
Similar publications
The convolutional neural networks (CNNs) are a computation and memory demanding class of deep neural networks. The field-programmable gate arrays (FPGAs) are often used to accelerate the networks deployed in embedded platforms due to the high computational complexity of CNNs. In most cases, the CNNs are trained with existing deep learning framework...
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware vulnerabilities at design time, but it requires many high-resolution power traces and increases the power simulation cost of the design. By downsampling and averaging these high-resolution traces, we show that the power simulation cost can be considerably reduced with...
Citations
... From the 1G to 5G, it takes over 50 years for Mobile wireless technology evaluating [13]. Fig.2 shows the progress of the mobile communication technology and the changing of the related applications because the wavelength shortens, and the transmission speed becomes faster. ...
... Fig.2 shows the progress of the mobile communication technology and the changing of the related applications because the wavelength shortens, and the transmission speed becomes faster. 1G only has approximately 2.4 and 9.6Kbps, indicating that it is an analogue communication system capable of carrying only voice calls [13]. 2G~5G are digital communications, with 2G transmitting at approximately 100 times the bandwidth of 1G and 270Kbps transmitting speed. ...
5G network has begun to step into people’s horizons. The character of high transmitting speed and low latency can enable some applications to do better in their fields. This article focuses on the new application of the UAV (unmanned aerial vehicles) based on the 5G network. Live streaming is a new entertaining way that is popular worldwide. In this article, the theoretical analysis of the 5G network and VR shows the development of mobile communication technology, the essential features of 5G network, which demonstrate the advantage of 5G, and the Internet requirement of VR. To reduce network bandwidth demand, a different view information transmission can distribute the transmission data of the side angle of view into the in front version. A Popularity Balance Method(PB) for UAVs in the same area layer) method based on the division of the entire search area into multiple area layers to change the pattern of message delivery to the area layer closer to the destination node. Advanced wireless systems (AWS) can make safe, effective operations. Suggestions about using Content Delivery Network (CDN) to solve the live stream problems are also given.
... From the 1970s, mobile communication systems upgraded progressively. The core technologies and network bandwidth [11][12][13] keep refreshed to the next-generation about every 10 years. Though the IEEE 802.11 (WiFi) standard arose in 1997, which was later than that of the mobile network, the update of wireless network standards and apparatus iterated faster. ...
... However, 802.11n/ac is 5 GHz, which leads to a higher transmission speed. The multiplied rate of transmission commits to reaching the requirement of real-time interactions among the CPS devices [5,11,14]. ...
This chapter presents the historical evolution and a prospective vision of the Cyber-Physical Systems (CPS), with a specific focus on Intelligent Transportation Systems (ITS). Transportation Cyber-Physical Systems (TCPS) enhance transportation systems’ efficiency and reliability by enhancing feedback-based interactions between the cyber and physical systems. In addition to an introduction to CPS and TCPS, this chapter illustrates the architecture and advanced technologies to achieve traffic intelligence. Next, we discuss the technical challenges and highlights feasible solutions. Finally, we demonstrate the significant roles of CPS in ITS and conclude the chapter.
... Mobile wireless technologies have been developed for decades, from the first generation (1G) in the late 1970s, to 5G in the 2020s [80]. Each wireless generation has evolved every decade. ...
... Each wireless generation has evolved every decade. Fig. 4(a) shows the development process and the data rates from 1G to 5G [80]. It can be seen that the 1G data rate is only between 2.4 and 9.6 Kbps, which belongs to the analog communication, and which can only carry voice calls [80]. ...
... Fig. 4(a) shows the development process and the data rates from 1G to 5G [80]. It can be seen that the 1G data rate is only between 2.4 and 9.6 Kbps, which belongs to the analog communication, and which can only carry voice calls [80]. After that, the next generations (2G ∼ 5G) all belong to digital communication, with 2G transfer speed clocking in at around 100 times that of 1G, and capable of delivering up to 270 Kbps. ...
As Information and Communication Technologies are evolving rapidly and at an exponential pace‚ businesses are forced to cope with the latest trends in innovation and to respond to emerging needs and opportunities. The constant digitization and process automation (digi-talization) of supply chains call for the consideration of innovative services to sustain value chain efficiency and effectiveness. Given the approaching technological developments‚ the new network upgrades embodied in 5G networks raises several high expectations along the value chain. This paper recognizes the critical role of 5G telecommunications to support several value chain activities and create value propositions that would not be possible with existing network generations. To this end‚ Porter's value chain model is applied and comprehensively discussed to highlight the potential areas that could be facilitated by 5G telecommunications.