Free Essay

Beamforming

In:

Submitted By flclri
Words 2509
Pages 11
%写英文摘要
| | |
|Getting Started | |

One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. In the Wireshark labs you’ll be doing in this course, you’ll be running various network applications in different scenarios using your own computer (or you can borrow a friends; let me know if you don’t have access to a computer where you can install/run Wireshark). You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing.

In this first Wireshark lab, you’ll get acquainted with Wireshark, and make some simple packet captures and observations.

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A packet sniffer itself is passive. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. Similarly, received packets are never explicitly addressed to the packet sniffer. Instead, a packet sniffer receives a copy of packets that are sent/received from/by application and protocols executing on your machine.

Figure 1 shows the structure of a packet sniffer. At the right of Figure 1 are the protocols (in this case, Internet protocols) and applications (such as a web browser or ftp client) that normally run on your computer. The packet sniffer, shown within the dashed rectangle in Figure 1 is an addition to the usual software in your computer, and consists of two parts. The packet capture library receives a copy of every link-layer frame that is sent from or received by your computer. Messages exchanged by higher layer protocols such as HTTP, FTP, TCP, UDP, DNS, or IP all are eventually encapsulated in link-layer frames that are transmitted over physical media such as an Ethernet cable. In Figure 1, the assumed physical media is an Ethernet, and so all upper-layer protocols are eventually encapsulated within an Ethernet frame. Capturing all link-layer frames thus gives you all messages sent/received from/by all protocols and applications executing in your computer.

[pic]

The second component of a packet sniffer is the packet analyzer, which displays the contents of all fields within a protocol message. In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the text.
We will be using the Wireshark packet sniffer [http://www.wireshark.org/] for these labs, allowing us to display the contents of messages being sent/received from/by protocols at different levels of the protocol stack. (Technically speaking, Wireshark is a packet analyzer that uses a packet capture library in your computer). Wireshark is a free network protocol analyzer that runs on Windows, Linux/Unix, and Mac computers. It’s an ideal packet analyzer for our labs – it is stable, has a large user base and well-documented support that includes a user-guide (http://www.wireshark.org/docs/wsug_html_chunked/), man pages (http://www.wireshark.org/docs/man-pages/), and a detailed FAQ (http://www.wireshark.org/faq.html), rich functionality that includes the capability to analyze hundreds of protocols, and a well-designed user interface. It operates in computers using Ethernet, serial (PPP and SLIP), 802.11 wireless LANs, and many other link-layer technologies (if the OS on which it's running allows Wireshark to do so).

Getting Wireshark

In order to run Wireshark, you will need to have access to a computer that supports both Wireshark and the libpcap or WinPCap packet capture library. The libpcap software will be installed for you, if it is not installed within your operating system, when you install Wireshark. See http://www.wireshark.org/download.html for a list of supported operating systems and download sites

Download and install the Wireshark software: • Go to http://www.wireshark.org/download.html and download and install the Wireshark binary for your computer.
The Wireshark FAQ has a number of helpful hints and interesting tidbits of information, particularly if you have trouble installing or running Wireshark.

Running Wireshark

When you run the Wireshark program, you’ll get a startup screen, as shown below:

[pic]
Figure 2: Initial Wireshark Screen

Take a look at the upper left hand side of the screen – you’ll see an “Interface list”. This is the list of network interfaces on your computer. Once you choose an interface, Wireshark will capture all packets on that interface. In the example above, there is an Ethernet interface (Gigabit network Connection) and a wireless interface (“Microsoft”).

If you click on one of these interfaces to start packet capture (i.e., for Wireshark to begin capturing all packets being sent to/from that interface), a screen like the one below will be displayed, showing information about the packets being captured. Once you start packet capture, you can stop it by using the Capture pull down menu and selecting Stop.

[pic]
The Wireshark interface has five major components: • The command menus are standard pulldown menus located at the top of the window. Of interest to us now are the File and Capture menus. The File menu allows you to save captured packet data or open a file containing previously captured packet data, and exit the Wireshark application. The Capture menu allows you to begin packet capture. • The packet-listing window displays a one-line summary for each packet captured, including the packet number (assigned by Wireshark; this is not a packet number contained in any protocol’s header), the time at which the packet was captured, the packet’s source and destination addresses, the protocol type, and protocol-specific information contained in the packet. The packet listing can be sorted according to any of these categories by clicking on a column name. The protocol type field lists the highest-level protocol that sent or received this packet, i.e., the protocol that is the source or ultimate sink for this packet. • The packet-header details window provides details about the packet selected (highlighted) in the packet-listing window. (To select a packet in the packet-listing window, place the cursor over the packet’s one-line summary in the packet-listing window and click with the left mouse button.). These details include information about the Ethernet frame (assuming the packet was sent/received over an Ethernet interface) and IP datagram that contains this packet. The amount of Ethernet and IP-layer detail displayed can be expanded or minimized by clicking on the plus minus boxes to the left of the Ethernet frame or IP datagram line in the packet details window. If the packet has been carried over TCP or UDP, TCP or UDP details will also be displayed, which can similarly be expanded or minimized. Finally, details about the highest-level protocol that sent or received this packet are also provided. • The packet-contents window displays the entire contents of the captured frame, in both ASCII and hexadecimal format. • Towards the top of the Wireshark graphical user interface, is the packet display filter field, into which a protocol name or other information can be entered in order to filter the information displayed in the packet-listing window (and hence the packet-header and packet-contents windows). In the example below, we’ll use the packet-display filter field to have Wireshark hide (not display) packets except those that correspond to HTTP messages. %翻译

Taking Wireshark for a Test Run

The best way to learn about any new piece of software is to try it out! We’ll assume that your computer is connected to the Internet via a wired Ethernet interface. Indeed, I recommend that you do this first lab on a computer that has a wired Ethernet connection, rather than just a wireless connection. Do the following

1. Start up your favorite web browser, which will display your selected homepage.

2. Start up the Wireshark software. You will initially see a window similar to that shown in Figure 2. Wireshark has not yet begun capturing packets.

3. To begin packet capture, select the Capture pull down menu and select Interfaces. This will cause the “Wireshark: Capture Interfaces” window to be displayed, as shown in Figure 4.

[pic] Figure 4: Wireshark Capture Interface Window

4. You’ll see a list of the interfaces on your computer as well as a count of the packets that have been observed on that interface so far. Click on Start for the interface on which you want to begin packet capture (in the case, the Gigabit network Connection). Packet capture will now begin - Wireshark is now capturing all packets being sent/received from/by your computer!

5. Once you begin packet capture, a window similar to that shown in Figure 3 will appear. This window shows the packets being captured. By selecting Capture pulldown menu and selecting Stop, you can stop packet capture. But don’t stop packet capture yet. Let’s capture some interesting packets first. To do so, we’ll need to generate some network traffic. Let’s do so using a web browser, which will use the HTTP protocol that we will study in detail in class to download content from a website.

6. While Wireshark is running, enter the URL: http://gaia.cs.umass.edu/wireshark-labs/INTRO-wireshark-file1.html and have that page displayed in your browser. In order to display this page, your browser will contact the HTTP server at gaia.cs.umass.edu and exchange HTTP messages with the server in order to download this page, as discussed in section 2.2 of the text. The Ethernet frames containing these HTTP messages (as well as all other frames passing through your Ethernet adapter) will be captured by Wireshark.

7. After your browser has displayed the INTRO-wireshark-file1.html page (it is a simple one line of congratulations), stop Wireshark packet capture by selecting stop in the Wireshark capture window. The main Wireshark window should now look similar to Figure 3. You now have live packet data that contains all protocol messages exchanged between your computer and other network entities! The HTTP message exchanges with the gaia.cs.umass.edu web server should appear somewhere in the listing of packets captured. But there will be many other types of packets displayed as well (see, e.g., the many different protocol types shown in the Protocol column in Figure 3). Even though the only action you took was to download a web page, there were evidently many other protocols running on your computer that are unseen by the user. We’ll learn much more about these protocols as we progress through the text! For now, you should just be aware that there is often much more going on than “meet’s the eye”!

8. Type in “http” (without the quotes, and in lower case – all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window. Then select Apply (to the right of where you entered “http”). This will cause only HTTP message to be displayed in the packet-listing window.

9. Find the HTTP GET message that was sent from your computer to the gaia.cs.umass.edu HTTP server. (Look for an HTTP GET message in the “listing of captured packets” portion of the Wireshark window (see Figure 3) that shows “GET” followed by the gaia.cs.umass.edu URL that you entered. When you select the HTTP GET message, the Ethernet frame, IP datagram, TCP segment, and HTTP message header information will be displayed in the packet-header window[1]. By clicking on ‘+’ and ‘-‘ right-pointing and down-pointing arrowheads to the left side of the packet details window, minimize the amount of Frame, Ethernet, Internet Protocol, and Transmission Control Protocol information displayed. Maximize the amount information displayed about the HTTP protocol. Your Wireshark display should now look roughly as shown in Figure 5. (Note, in particular, the minimized amount of protocol information for all protocols except HTTP, and the maximized amount of protocol information for HTTP in the packet-header window).

10. Exit Wireshark

Congratulations! You’ve now completed the first lab.

[pic]
Figure 5: Wireshark window after step 9
What to hand in

The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation:

1. List 3 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 above. 2. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet-listing window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu, then select Time Display Format, then select Time-of-day.) 3. What is the Internet address of the gaia.cs.umass.edu (also known as www-net.cs.umass.edu)? What is the Internet address of your computer? 4. Print the two HTTP messages (GET and OK) referred to in question 2 above. To do so, select Print from the Wireshark File command menu, and select the “Selected Packet Only” and “Print as displayed” radial buttons, and then click OK.

-----------------------
[1] Recall that the HTTP GET message that is sent to the gaia.cs.umass.edu web server is contained within a TCP segment, which is contained (encapsulated) in an IP datagram, which is encapsulated in an Ethernet frame. If this process of encapsulation isn’t quite clear yet, review section 1.5 in the text

Similar Documents

Premium Essay

Star Trek Research Paper

...Many rely on thin strips of materials like ribbon microphones which have a thin strip of conductive foil which moves within a magnetic field to generate a voltage. Condenser microphones also have a thin plastic diaphragm which is coated with vaporized metal; making them very fragile. Whereas because MEMS microphones are so small and are usually encased in metal - it makes them fairly durable. When strength, quality, cost and manufacturability is considered; the MEMS microphone comes out on top. Because they are so small and so cheap but still high quality, many manufacturers design their smart speakers with an array of MEMS microphones - instead of just one. This allows for beamforming like in Apple’s HomePod. The University of Waterloo has tested arrays of MEMS microphones and found them to be a definite low-cost alternative to condenser microphones for array...

Words: 1375 - Pages: 6

Free Essay

Analysis of Physical Parameters Influencing Beam Pattern of Uniform Linear Array of Antennas

...ANALYSIS OF THE PHYSICAL PARAMETERS INFLUENCING BEAM PATTERN OF A UNIFORM LINEAR ARRAY OF ANTENNAS Final Year Project Report Presented by SAJID UR REHMAN CIIT/SP08-BET-090/ISB USMAN ULLAH ASIF CIIT/SP08-BET-121/ISB In Partial Fulfillment Of the Requirement for the Degree of Bachelor of Science in Electrical (Telecommunication) Engineering DEPARTMENT OF ELECTRICAL ENGINEERING COMSATS INSTITUTE OF INFORMATION Technology, ISLAMABAD JAN 2012 Declaration We, hereby declare that this project neither as a whole nor as a part there of has been copied out from any source. It is further declared that we have developed this project and the accompanied report entirely on the basis of our personal efforts made under the sincere guidance of our supervisor. No portion of the work presented in this report has been submitted in the support of any other degree or qualification of this or any other University or Institute of learning, if found we shall stand responsible. Signature:______________ Sajid Ur Rehman Signature:______________ UsmanUllah Asif COMSATS INSTITUTE OF INFORMATION Technology, ISLAMABAD JAN 2012 ANALYSIS OF THE PHYSICAL PARAMETERS INFLUENCING BEAM PATTERN OF A UNIFORM LINEAR ARRAY OF ANTENNAS An Undergraduate Final Year Project Report submitted to the Department of ELECTRICAL ENGINEERING As a Partial Fulfillment...

Words: 6048 - Pages: 25

Premium Essay

Smith

...Fix computers es. With speeds up to AC900 Mbps (N300 +AC565), wireless-AC provides gigabit Wi-Fi speeds that allow content to download faster. Wireless-AC makes it possible for you to stream shows on your HDTV while family members download music or other files–without interruption due to a slow network connection. The AC900 includes a USB 3.0 port and four gigabit ports to let you connect multiple devices, allowing you to quickly print, share, and store content across your network. The Linksys AC900 Smart Wi-Fi router features beamforming, an innovative technology that optimizes the wireless signal strength between your connected devices and Linksys router. Beamforming enables the router to identify and connect directly with other devices, rather than simply sending out wireless signals in a general direction. The result is faster network speeds, better wireless range, and reduced interference from other devices. It also helps extend the battery life of connected devices and reduce their power consumption because data is transferred more quickly. Manage Your Home Network Remotely with Linksys Smart Wi-Fi With Linksys Smart Wi-Fi, you can access and control your home network from wherever you are using your smartphone, tablet, or computer. For example, you can set parental controls to restrict Internet access during certain times of the day and create unique, secure Wi-Fi passwords for your guests. You can also monitor activity on your home network, add new devices...

Words: 448 - Pages: 2

Free Essay

Mimo

...• BLISS, FORSYTHE, AND CHAN MIMO Wireless Communication MIMO Wireless Communication Daniel W. Bliss, Keith W. Forsythe, and Amanda M. Chan ■ Wireless communication using multiple-input multiple-output (MIMO) systems enables increased spectral efficiency for a given total transmit power. Increased capacity is achieved by introducing additional spatial channels that are exploited by using space-time coding. In this article, we survey the environmental factors that affect MIMO capacity. These factors include channel complexity, external interference, and channel estimation error. We discuss examples of space-time codes, including space-time low-density parity-check codes and spacetime turbo codes, and we investigate receiver approaches, including multichannel multiuser detection (MCMUD). The ‘multichannel’ term indicates that the receiver incorporates multiple antennas by using space-time-frequency adaptive processing. The article reports the experimental performance of these codes and receivers. M - multiple-output (MIMO) systems are a natural extension of developments in antenna array communication. While the advantages of multiple receive antennas, such as gain and spatial diversity, have been known and exploited for some time [1, 2, 3], the use of transmit diversity has only been investigated recently [4, 5]. The advantages of MIMO communication, which exploits the physical channel between many transmit and receive antennas, are currently receiving significant...

Words: 16967 - Pages: 68

Free Essay

744 Commerce Control List

...The Commerce Control List Part 774—page 1 Table of Contents § 774.1 INTRODUCTION ......................... 1  §774.2 [RESERVED] ................................. 2  SUPPLEMENT NO. 1 TO PART 774 – THE COMMERCE CONTROL LIST........ 1  SUPPLEMENT NO. 2 TO PART 774 – GENERAL TECHNOLOGY AND SOFTWARE NOTES ................................. 1  SUPPLEMENT NO. 3 TO PART 774 – STATEMENTS OF UNDERSTANDING . 1  SUPPLEMENT NO. 4 TO PART 774 – COMMERCE CONTROL LIST ORDER OF REVIEW ............................................... 1  SUPPLEMENT NO. 5 TO PART 774 ITEMS CLASSIFIED UNDER ECCNS 0A521, 0B521, 0C521, 0D521 AND 0E521 ..................................................................... 1  SUPPLEMENT NO. 6 TO PART 774 – SENSITIVE LIST ....................................... 1  SUPPLEMENT NO. 7 TO PART 774 – VERY SENSITIVE LIST ........................... 1  § 774.1 INTRODUCTION (a) Scope of the control list. In this part, references to the EAR are references to 15 CFR chapter VII, subchapter C. The Bureau of Industry and Security (BIS) maintains the Commerce Control List (CCL) that includes “items” -- i.e., “commodities,” “software,” and “technology” -- subject to the authority of BIS. The CCL does not include items exclusively controlled for export by another department or agency of the U.S. Government, though in instances where other agencies administer controls over related items, entries in the CCL Export Administration Regulations may...

Words: 7650 - Pages: 31

Free Essay

Week2Itm130

...CHAPTER 4 1. Why is a focus on information systems insufficient in networking? Because the network professionals often has to focus on the broader business system in which the information system is embedded. 2. Compare trends in network demand and network budgets. The network demand is likely to grow rapidly in the future, just as it has always done in the past. The network budgets are growing very slow 3. What are QoS metrics? (Do not just spell out the acronym.) QoS metrics stands for quality-of-service metrics that is metrics that is quantitative measures of network performance. For instance, companies use QoS metric to quantify their quality of service so that they can set targets and determine if they have met those taargets 4. a. In what units is transmission speed normally measured? Speed measured in factor of 1,000 not 1024 b. Is speed normally measured in bits per second or bytes per second? Bits per second c. Give the names and abbreviations for speeds in increasing factors of 1,000. Kbps: kilobits per second- 1,000 bps Mbps: megabits per second- 1,000 kbps Gbps: gigabits per second- 1,000 Mbps Tbps: terabits per second- 1,000 Gbps d. What is 55,000,000,000 bps with a metric prefix? 55Gbps e. Write out 100 kbps in bits per second (without a metric prefix). 100, 000 bps f. Write the following speeds properly: 0.067 Mbps, 23,000 kbps, and 48.62Gbps...

Words: 5126 - Pages: 21

Free Essay

Software Implementation Paper

...Internal Hardware upgrade to meet IT solution IFSM 310 SECTION Winston Compton 16 April 2016 Background As a Senior IT Specialist & Systems Analyst, some of my responsibilities are to interpret customer demands through provided business requirements and provide service needed with the right specifications. Also Develop design specifications for major components of an IT solution. Finally, as a senior member I need to be able to coordinate with other entities to provide individual components of IT developmental efforts. As a senior member of Upton, Martin Ulysses, & Clapper (UMUC) financial analysis firm specializing in conducting independent economics and market assessment for banks, insurance companies, mortgage lender, and government regulatory agencies, I have been tasked to refreshed 35 personal computer desktops. The Senior Manager of Revolving Debt Analysis has laid out for me the attributes for the new PCs. The new PCs will need to be able to run complex calculations based on statistical models that uses large amounts of data. Purpose of This Report The UMUC financial analysis firm is a medium sized firm utilized by many clients for market assessments, insurance queries, mortgage lenders, and other government regulatory agencies. In order to meet demands the firm is in dire need of an upgrade. The purpose of this report will identify the new components required to upgrade the 35 desktops to be able to perform the required IT solution attribute...

Words: 1552 - Pages: 7

Premium Essay

Capture

...AN INTRODUCTION TO LTE LTE, LTE-ADVANCED, SAE AND 4G MOBILE COMMUNICATIONS Christopher Cox Director, Chris Cox Communications Ltd, UK A John Wiley & Sons, Ltd., Publication This edition first published 2012 © 2012 John Wiley & Sons Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor...

Words: 124044 - Pages: 497

Free Essay

Lte Complete Tutorial

...(Prepared from website Radio-Electronics.com with thanks http://www.radio-electronics.com/) 3G LTE Tutorial - 3GPP Long Term Evolution - developed by 3GPP, LTE, Long Term Evolution is the successor to 3G UMTS and HSPA providing much higher data download speeds and setting the foundations for 4G LTE Advanced.. LTE, Long Term Evolution, the successor to UMTS and HSPA is now being deployed and is the way forwards for high speed cellular services. In its first forms it is a 3G or as some would call it a 3.99G technology, but with further additions the technology can be migrated to a full 4G standard and here it is known as LTE Advanced. There has been a rapid increase in the use of data carried by cellular services, and this increase will only become larger in what has been termed the "data explosion". To cater for this and the increased demands for increased data transmission speeds and lower latency, further development of cellular technology have been required. The UMTS cellular technology upgrade has been dubbed LTE - Long Term Evolution. The idea is that 3G LTE will enable much higher speeds to be achieved along with much lower packet latency (a growing requirement for many services these days), and that 3GPP LTE will enable cellular communications services to move forward to meet the needs for cellular technology to 2017 and well beyond. Many operators have not yet upgraded their basic 3G networks, and 3GPP LTE is seen as the next logical step for many operators...

Words: 18462 - Pages: 74

Premium Essay

802.11ac Migration Guide

...Aruba Migration Guide 802.11AC MIGRATION GUIDE 802.11ac Aruba Migration Guide Table of Contents Introduction 802.11AC basics Why 802.11ac? 802.11ac technology overview Backward compatibility RF spectrum Multistation MAC throughput > 1 Gbps 256 QAM Wider channels More spatial streams Downlink multi-user MIMO Pros of 802.11ac Cons of 802.11ac Strategy and planning for 802.11ac migration Site planning basics Planning process Minimum requirements and actions to implement 802.11ac Aruba recommendations for 802.11ac migration General Capacity RF planning Installation Wireless RF coverage considerations and questionnaire Summary 3 3 3 4 4 4 5 5 5 5 6 6 6 6 6 6 7 8 8 8 8 8 9 10 Aruba Networks, Inc. 2 802.11ac Aruba Migration Guide Introduction Wi-Fi has become such an amazingly successful technology because it has continuously advanced while remaining backwards compatible. The current state-of-the-art Wi-Fi is known as Wi-Fi CERTIFIED n or 802.11n. 802.11n has become popular because it improves performance. As 802.11n has become a standard interface on PCs, tablets and smartphones, the applications used by these devices have continued to progress. Mobile technology has encountered the next frontier – video. Whether delivering YouTube to smartphones or moving HDTV signals around the office or home, video has become a significant driver of network traffic, chiefly because it requires one or two orders of magnitude more bandwidth than other IP services. Now...

Words: 3787 - Pages: 16

Premium Essay

Celular Networks Small Cells

...using Mobile data offloading as a more efficient use of radio spectrum. Small cells are a vital element to 3G data off-loading, and many mobile network operators see small cells as vital to managing LTE Advanced spectrum more efficiently compared to using just macrocells. Small cells can be used to provide in-building and outdoor wireless service. Mobile operators use small cells to extend their service coverage and/or increase network capacity. With small cells, mobile operators can offload traffic as much as 80% during peak times. Small cells cover Femtocells, Picocells, and Microcells. Small cell networks can also be realized by means of distributed radio technology consisting of centralized baseband units and remote radio heads. Beamforming technology (focusing a radio signal on a very specific area) can be utilized to further enhance or focus small cell coverage. A common factor in all these approaches to small cells is that they are centrally managed by mobile network operators. Small cells provide a small radio footprint, which can range from 10 meters within urban and in-building locations to 2 km for a rural location. Picocells and microcells can also have a range of a few hundred meters to a few kilometers, but they differ from femtocells in that they do not always have self-organizing and self-management capabilities. Small cells are available for a wide range of air interfaces including GSM, CDMA2000, TD-SCDMA, W-CDMA, LTE and WiMax. In 3GPP terminology, a Home...

Words: 4350 - Pages: 18

Premium Essay

Green Radio: Radio Techniques to Enable Energy Efficient Wireless Networks

...ENERGY EFFICIENCY IN COMMUNICATION A Summary of Green Radio: Radio Techniques to Enable Energy Efficient Wireless Networks Adeel Akhtar, MSIT (Cont.), School of Electrical Engineering and Computer Science Salman Fayyaz Khan, MSIT (Cont.), School of Electrical Engineering and Computer Science Syeda Tahira Bano, MSIT (Cont.), School of Electrical Engineering and Computer Science ABSTRACT This draft contains the overview of project “Green Radio”, to make the wireless communication efficient in terms of energy consumptions. Concurrent document describes the technical background of the project, some initiatives before publish this article and the current state of the art developments in this project. It includes also some research directions to which significant energy consumption can be achieved. INTRODUCTION There is an urge on environmental grounds to decrease the energy requirements of radio access networks as there is a vast increase in the number of mobile subscribers, the progress to higher-datarate mobile broadband, and the significant addition of information technology to the overall energy loss of the world. In the Information Technology Industry mobile phone communication contributes to a major proportion of the total energy consumed. The main reasons for the Mobile VCE Green Radio Program are to reduce to expenditure costs and carbon emissions for wireless cellular network. The Green Radio program aims to achieve a hundred times reduction in power consumption...

Words: 4184 - Pages: 17

Free Essay

Hyper Geomatric

...A LINEAR-TIME ALGORITHM FOR EVALUATING SERIES OF SCHUR FUNCTIONS CY CHAN, VESSELIN DRENSKY, ALAN EDELMAN, AND PLAMEN KOEV Abstract. We present a new algorithm for computing all Schur functions sλ(x1, x2, . . . , xn) for all partitions λ of integers not exceeding N in time O(n2K ), where K ≡ #{λ| |λ| ≤ N} N N is the number of those partitions. In particular, this algorithm has optimal complexity for evaluating truncated series of Schur functions such as the hypergeometric function of a matrix argument. 1. Introduction We present a new highly efficient algorithm for computing the finite truncation (for k ≤ N) of the hypergeometric function of a matrix argument X in the complex case: X XN 1 (a1)κ · · · (ap)κ (1) pFq(a , . . . , a1 p; b , . . . , b1 q; X) ≡ · · sκ(x , x , . . . , x1 2 n), Hκ (b1)κ · · · (bq)κ k=0 κ`k where Y (2) (a)κ ≡ (a − i + j) (i,j)∈κ ...

Words: 4950 - Pages: 20

Free Essay

Wimax

...“Heaven’s Light is Our Guide” [pic] DEPARTMENT OF Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology, Bangladesh RADIO RESOURCE MANAGEMENT IN WiMAX Author Md.Masud Hasan Roll No.054005 Department of Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology Supervised by Md.Delwar Hossain Head Department of Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology ACKNOWLEDGEMENT All praises to ALLAH, the cherisher and the sustainer of the universe, the most gracious and the most merciful, who bestowed me with health and abilities to complete this thesis successfully. This thesis means to me far more than a honours degree requirement as my knowledge was significantly enhanced during the course of its research and implementation. I am especially thankful to the Faculty and Staff of Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangladesh, that have always been a source of motivation for me and supported me tremendously...

Words: 15898 - Pages: 64

Free Essay

Melp Final

...Style Guidelines for Final Year Project ReportsReal Time Implementation of Mixed Excitation Linear Predictive Vocoder Final Year Project Final Report A 4th Year StudentUmer Hamid 06-0063 Faraz Hussain 07-0597 Supervisor: Ms. Durdana Habib Real time optimized Implementation of the Mixed Excitation Linear Predictive Vocoder on the TMS320C6416 DSP [pic] Electrical Engineering Department National University of Computer and Emerging Sciences Islamabad Session 2009-2010 Abstract The purpose of our project is real-time implementation and optimization of a 2.4 Kbps mixed excitation linear prediction (MELP) speech-coding algorithm on a Texas instrument TMS320C64xx digital signal processor. The main emphases of the project is on efficient coding and optimization strategies in computationally intensive modules by exploiting fast L1/L2 memory architecture, 8-parallel data paths, enhanced direct memory access module and instruction set features of TMS320C6000 architecture. The implementation would be based on generic TMS320C6000 DSP series; the optimization techniques aimed are applicable to all types of DSP platforms. Lastly the enhanced DSP/BIOS features were used to implement a real time data handling technique to port the MELP vocoder for real time applications. Contents 1 Introduction 6 1.1 THE MELP SPEECH PRODUCTION MODEL 6 2 Development Process 29 2.1 DSP Architecture...

Words: 9574 - Pages: 39