You are on page 1of 10

Engineering Project Summary (29)

http://www.chineseowl.idv.tw














Our working group has
become increasingly intrigued with how to resolve power supply
problems in small wireless communication devices such as a
mobile phone, notebook computer and PDA.
Multi-input multi-output (MIMO) schemes
attempt to increase the data rate in wireless communications. If
N antennas are used in MIMO systems, the data rate of MIMO
systems can be N times that of conventional systems, i.e. single-
input single-output (SISO) systems, subsequently increasing the
data rate significantly. Despite the higher data rate of MIMO
systems, its performance is markedly lower than that of SISO
systems since MIMO systems can maintain many channels; in
addition, recognizing data of each antenna is extremely difficult.
MIMO systems thus adopt an advanced channel coding scheme
called low-density parity-check (LDPC) code.
(cont)
However, although capable of significantly upgrading
system performance, LDPC codes are limited owing to their complex
encoding process. In LDPC codes, an extremely large generator
matrix G must be multiplied for encoding. (NOTE : Add 3-4 more
sentences that describe characteristics of the problem or statistics that
reflect its severity) For instance, while the
dimension of G approximates to 2000 by 2000 in the IEEE 802.11n
standard, multiplying G expends a considerable amount of time.
However, only six registers are necessary to complete encoding for
conventional channel coding, i.e. convolutional codes, explaining why
LDPC and conventional codes significantly differ in encoding
complexity. For instance, an extremely complex encoding process
requires a significant amount of power for the system to complete all
encoding tasks. However, for a small wireless communication device
such as a mobile phone, notebook computer and PDA, power is a
highly valuable resource since the battery power supply is crucial.
Moreover, an efficient encoding process for LDPC codes is problematic
for MIMO systems.
(cont)
Therefore, we developed a novel LDPC structure called a
repeat-accumulate (RA) code, as originally proposed in 2002. RA codes can
provide the system with an extremely low error rate of data, yet an efficient
encoding process. Its encoding resembles the encode of convolutional codes,
explaining the low complexity. Of priority concern is how to design an RA code
such that the system performance can approach the system capacity, as
mentioned by the renowned communications researcher Shannon in 1948.
An extrinsic information transfer (EXIT) chart was
simulated in MIMO channel to become the design baseline of MIMO systems.
The MIMO system capacity was then determined by some formulas, as
provided by Channon, to derive an appropriate value of the signal-to-noise
ration (SNR). Additionally, based on this appropriate SNR, a curve fitting was
derived to match the EXIT chart. Moreover, a probability density function of
variable nodes and check nodes in the RA code was determined by the
above curve and, finally, the design of RA codes can be completed.
Furthermore, confirmation was made that the RA code determined via the
above methods performs well in MIMO systems.
(cont)
According to our results, applying the adequately
designed RA code can ensure that the MIMO system achieves an extremely
low data error rate and, simultaneously, maintains the advantage of a high data
rate. Based on the simulation results, the MIMO system with RA codes can
perform equivalent to the SISO system. Hence, the low performance problem
in MIMO systems is averted by adopting the well-designed RA code.
While cable-free wireless communication
devices require batteries, their power supply is limited, accentuating the
importance of the power resources. For wireless devices to perform efficiently,
a battery can supply the system for an extended period. Hence, the encoding
process must be simplified when applying LDPC to MIMO systems. The
proposed RA code, one class of LDPC, is feasible for use in a MIMO system
device, the encoding process can become efficient and a significant amount of
power is saved. Hence, small wireless communication devices can operate for
extended periods without using battery chargers.

Our recent project examined the
current trend in applications designed for fixed network environments
that are unaware of the movements of mobile devices.
Among the numerous advantages of proxies
include controlling access, conserving network bandwidth, reducing
communication delay and alleviating loads of original server. Therefore,
various proxies appear in the Internet based on application
requirements, e.g., a HTTP proxy for the Internet, a FTP proxy for file
transmission, and a SOCKS proxy for firewall traversal. Meanwhile,
most applications can communicate through a proxy.
However, the mobile computing paradigm negatively impacts certain
applications. Referred to as mobility-unaware applications, applications
designed for fixed network environments are unaware of the
movements of mobile devices. When roaming, such applications
access the Internet through the configured proxies probably far from
the visited network rather than through nearby proxies. Such behavior
barely achieves advantages of the proxy.
(cont)
Additionally, communication may incur interferences, e.g.,
becoming congested, incurring a long delay, encountering a
firewalls obstacle, or becoming intercepted. For instance, in
addition to the difficulty of manually changing the proxy
configurations of applications during handoff, using a Proxy
Auto-Config file (pac file) neither satisfies non-HTTP
applications nor enables users to roam freely. Despite the
many proposals to obtain the address of the nearby proxy,
applications must still detect the movements, acquire the
address of the nearby proxy and utilize the nearby proxy.
While creating mobility-aware applications hinders developer,
modifying applications may be infeasible owing to a lack of
source codes. Providing applications is an effective means
of communicating through a nearby proxy without modifying
applications.
(cont)
Therefore, we developed the Tapster
as the transparent proxy redirector for mobile computing.
The Tapster was implemented in a
Windows XP environment. Experiments were then
performed to demonstrate the effectiveness of the (NOTE:
Add 1-2 more sentences to describe the methodology)
Simulation results indicated that the
Tapster can quietly redirect the requests of applications to
the nearby proxy without application awareness,
configuration and modifications. The applications function as
if they were staying at the home network and interacting with
the configured proxy.
Importantly, the Tapster can support various proxies, not just
the HTTP proxy (NOTE: Elaborate more on the theoretical
and practical contributions of the Tapster in your research
field and industry).
Further details can be found at
http://www.chineseowl.idv.tw

You might also like