1 / 22

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ Group PPM method to 802.15TG6 ] Date Submitted: [6 March 2009]

aurora
Download Presentation

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Group PPM methodto 802.15TG6] Date Submitted: [6 March2009] Source: [Jae Ho Hwang1, Jae Moung Kim1, Sung Jeen Jang1,Jong Seok Park1,Cheolhyo Lee2, Hyung Soo Lee2, You Jin Kim2, Jae Hwan Kim2] Company [Inha Univ1., ETRI2] Address [#253, Younghyun-Dong, Nam-Gu, Incheon 402-751 South Korea1, ETRI, 161 Gajeong-dong, Yuseong-gu, Deajeon, 305-700, South Korea2] Voice: [+82-32-860-87871, +82-42-821-68622], FAX: [+82-32-865-04801, +82-42-823-55862] E-mail:[hoho3676@naver.com1, jaekim@inha.ac.kr1, student21c@naver.com1, karmy0811@naver.com1, lee7@etri.re.kr2, hsulee@etri.re.kr2, youjin@etri.re.kr2, kimj@etri.re.kr2, jyk@etri.re.kr2, pjs@etri.re.kr2] Re: [Contribution to IEEE 802.15.6 Meeting, January 2009] Abstract: [We propose a new modulation scheme; Group PPM. Group PPM represents a new alternative to IR-UWB radio architecture and can meet the BAN. This algorithm increases entropy and can increase data-rate. Furthermore, error check, retransmission and security methods security are represented using the extra symbols that result from the symbol-grouping scheme.] Purpose: [To be considered in IEEE 802.15.6] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. 1

  2. Contents • WBAN Requirements • Introduction to GPPM method • Application of GPPM method • Throughput increase : • Data-rate • Scalable data rate : 10kbps ~ 10Mbps • Error check & Error correcting • Security : Scrambled mapping code

  3. WBAN Requirement • PHY data-rate (Scalability) • Scalability for data rate • 10Kbps(low data) ~10Mbps(raw data) • Low Power Consumption • Human Safety (Low RF emission power) • Security and Encryption • Privacy protection, Human safety, Financial Implications • Coexistence • (BAN & BAN, BAN & Other)

  4. Group PPM 4 • Backward Compatibility • Compatibility with IEEE 802.15.4a PPM mechanism • Scalable data rate • Easy to convert data rate • Error Correcting & Checking • with extra symbol • Security and Encryption • with scrambled mapping code

  5. Motivation of Group PPM • Conventional PPM symbols • Proposed PPM symbols PPM has 4 case of stream Entropy is 2 - Transmits 2 bits in binary systems Group PPM has 6 case of stream when grouping2 symbols Increases Entropy to 2.634, Extra symbol

  6. Group PPM & Entropy • Calculate the Entropy and the number of cases both conventional PPM and group PPM • Increased Entropy values Entropy is increased Entropy is increased, increasing integer value

  7. GPPM Application (1-1) • Increasing Throughput • Extra Symbols are used for data transmission • Increased data-rate without modifying frame structure • Example • GPPM method (3 symbol grouping ) • Data-rate increased by 33% • 4 bits  3 symbols • 7.72Mbps  10.29Mbps

  8. Group PPM Symbol (3 Grouping) • Conventional PPM symbol • Proposed PPM extra symbol Usual Data 8 symbol Extra Data 8 symbol Remain 4 symbol

  9. Modulation Method (3 Grouping) • Modulation equation • Mapping table

  10. Example of GPPM • Transmit data = 01001011 • 1st Group = 0100, 2nd Group = 1011 • GPPM mapping data • 1st Code = [4 3 1], 2nd Code = [5 4 0]

  11. Example of GPPM (cont.) • GPPM mapping data • 1st Code = [4 3 1], 2nd Code = [5 4 0] • Symbol Code • 1st Symbol = [0 1 0 1 1 0] • 2nd Symbol = [0 1 0 1 1 0] 0 1 0 1 1 0 1 0 0 0 1 1

  12. Group PPM Algorithm Block Diagram • Tx block diagram Rx block diagram

  13. Group PPM Algorithm Performance • 10Mbps Mode Performance @ WBAN channel • BER performance PER performance 13

  14. GPPM Application (1-2) • Forward Error Correcting (FEC) • Extra bitsare used as redundancy for Channel coding algorithm • Error Check • Extra symbols are used as error check symbol • If error check symbol are received, data streams have bit error

  15. Group PPM Symbol (3 Grouping) • Conventional PPM Symbol • Extra Symbol of GPPM method Usual Data 8 symbol Extra Data 8 symbol (redundancy coding bit)

  16. Error Correcting Code • GPPM data rate • 3Group  3/4 rate • 4Group  2/3 rate • Convolution code • k = 2, n = 3, R = 2/3 • Punched Linear Block Code • R=1/2 : {A1 B1 A2 B2 A3 B3 A4 B4 A5 B5 A6 B6 …} • R=3/4 : {A1 B1 A2 B3 A4 B4 A5 B6 …} • R=2/3 : {A1 B1 A2 A3 B3 A4 A5 B5 A6 …}

  17. Error Check and Retransmission • The receiver has the ability to check errors by using extra symbols. • If an extra symbol is received then the receiving symbols contain an error, indicating that retransmission will be necessary.

  18. GPPM Application (1-3) • Security & Encryption • Mapping tables of GPPM method are scrambled arbitrarily • GPPM PHY structure contains encryption ability

  19. Ex 1) Conventional PPM • Code set of PPM • Example • The estimation of sequence could be just two case. Tsym N hop Guard Interval Symbol 1 Symbol 2 Symbol 3 Symbol 4 Symbol 5 0 1 0 0 1 codeset1 codeset2 1 0 1 1 0

  20. Ex 2) Encryption of GPPM • Through the scrambling code,we can achieve encryption Code 2 Code 1

  21. Ex 2) Encryption of GPPM (cont.) • Tx data : 00011100 • Tx symbol by code #1 : • Rx decoding data by code #1 : 00011100 • Can find out correct data. • Rx decoding data by code #2 : 11111110 • Cannot estimate the original data. 0 0 0 1 0 1 0 1 0 1 1 1

  22. Advantage of GPPM • Simplicity : • IR-UWB scheme, low power • Scalability : • Easy to convert data rate • 10Kbps ~ 10Mbps • Compatibility : • Compatible with IEEE 802.15.4a PPM mechanism • Security (Data encryption ) : • Scrambled mapping code

More Related