• Digital signal processing principles, algorithms, and applicati

    Digital signal processing principles, algorithms, and applicati

    0
    16
    93.55MB
    2024-04-15
    5
  • 802.11be draft 4.0 wifi7standard

    802.11be draft 4.0 wifi7standard

    0
    130
    9.75MB
    2023-12-10
    5
  • Fundamentals of Wireless Communication - 2005 1

    Fundamentals of Wireless Communication - 2005 1

    0
    6
    3.09MB
    2023-12-06
    5
  • 下一代无线局域网802.11n中文版

    介绍802.11n spec 原理,形成过程,实现细节和关键特性,对mimo,ofdma等关键特性深入讲解

    0
    535
    24.71MB
    2019-03-07
    46
  • Device Provisioning Protocol v1.0

    Table of contents 1 INTRODUCTION .......................................................................................................................................................... 8 1.1 Scope ............................................................................................................................................................ 8 1.2 References.................................................................................................................................................... 8 1.3 Definitions and acronyms............................................................................................................................ 10 1.3.1 Shall/should/may/might word usage .............................................................................................. 10 1.3.2 Conventions ................................................................................................................................... 10 1.3.3 Abbreviations and acronyms.......................................................................................................... 11 1.3.4 Definitions ...................................................................................................................................... 12 1.3.5 Symbols ......................................................................................................................................... 13 1.4 Architecture ................................................................................................................................................. 14 1.5 Device roles ................................................................................................................................................ 14 1.5.1 Authentication roles........................................................................................................................ 14 1.5.2 Configurator delegation.................................................................................................................. 15 1.6 Security considerations............................................................................................................................... 15 1.6.1 Overview ........................................................................................................................................ 15 1.6.2 Threat profile .................................................................................................................................. 15 1.6.3 Trust model .................................................................................................................................... 18 2 DPP PROTOCOL USAGE.......................................................................................................................................... 20 2.1 Overview ..................................................................................................................................................... 20 2.2 Infrastructure setup and connectivity .......................................................................................................... 20 2.2.1 AP configuration............................................................................................................................. 20 2.2.2 STA configuration........................................................................................................................... 20 2.2.3 Infrastructure connectivity .............................................................................................................. 20 2.2.4 Message flows for infrastructure connectivity ................................................................................ 20 2.3 Wi-Fi Direct ................................................................................................................................................. 23 2.3.1 Establishing a P2P group using DPP............................................................................................. 24 2.3.2 P2P Group operation ..................................................................................................................... 26 3 SECURITY.................................................................................................................................................................. 27 3.1 Properties.................................................................................................................................................... 27 3.2 Public key cryptography.............................................................................................................................. 27 3.2.1 Supported public key cryptosystem ............................................................................................... 27 3.2.2 Notation.......................................................................................................................................... 27 3.2.3 Cryptographic suites ...................................................................................................................... 28 3.2.4 Point representation....................................................................................................................... 28 4 DATA STRUCTURES................................................................................................................................................. 29 4.1 Public keys .................................................................................................................................................. 29 4.2 Connectors.................................................................................................................................................. 29 4.3 DPP Configuration object............................................................................................................................ 30 4.3.1 Wi-Fi Technology ........................................................................................................................... 30 4.3.2 DPP Discovery ............................................................................................................................... 30 4.3.3 DPP Credential .............................................................................................................................. 30 5 BOOTSTRAPPING OF TRUST.................................................................................................................................. 32 5.1 Overview ..................................................................................................................................................... 32 5.2 Bootstrapping information ........................................................................................................................... 32 5.2.1 Bootstrapping information format................................................................................................... 32 5.3 Scanning a QR code................................................................................................................................... 33 5.4 NFC............................................................................................................................................................. 34 5.4.1 Overview ........................................................................................................................................ 34 5.4.2 NFC Connection Handover............................................................................................................ 35 5.4.3 DPP bootstrapping via NFC URI record ........................................................................................ 37 5.5 Bluetooth ..................................................................................................................................................... 38 5.5.1 Overview ........................................................................................................................................ 38 5.5.2 Responder procedures .................................................................................................................. 40 5.5.3 Initiator procedures ........................................................................................................................ 40 Device Provisioning Protocol Specification v1.0 © 2018 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 4 of 124 5.6 PKEX: Proof of knowledge of a shared code, key, phrase, or word...........................................................41 5.6.1 PKEX preliminaries ........................................................................................................................ 41 5.6.2 PKEX exchange phase .................................................................................................................. 42 5.6.3 PKEX commit-reveal phase ........................................................................................................... 43 6 DPP AUTHENTICATION............................................................................................................................................ 45 6.1 Overview ..................................................................................................................................................... 45 6.2 DPP Authentication protocol ....................................................................................................................... 45 6.2.1 DPP capabilities negotiation .......................................................................................................... 46 6.2.2 DPP authentication request ........................................................................................................... 47 6.2.3 DPP authentication response ........................................................................................................ 47 6.2.4 DPP authentication confirm ........................................................................................................... 49 6.3 DPP Configuration protocol ........................................................................................................................ 50 6.3.1 Overview ........................................................................................................................................ 50 6.3.2 DPP configuration request ............................................................................................................. 50 6.3.3 DPP configuration response .......................................................................................................... 51 6.3.4 DPP Configuration Attributes object .............................................................................................. 51 6.3.5 Connector....................................................................................................................................... 52 6.3.6 DPP Configuration object............................................................................................................... 53 6.4 Network introduction protocol ..................................................................................................................... 55 6.4.1 Introduction .................................................................................................................................... 55 6.4.2 Connector group comparison......................................................................................................... 56 6.5 Network access protocols ........................................................................................................................... 56 7 STATE MACHINES .................................................................................................................................................... 57 7.1 Initiator state machine................................................................................................................................. 57 7.1.1 States ............................................................................................................................................. 57 7.1.2 Events and output .......................................................................................................................... 57 7.1.3 Variables ........................................................................................................................................ 57 7.1.4 Parent process behavior ................................................................................................................ 57 7.1.5 State machine behavior ................................................................................................................. 57 7.2 Responder state machine ........................................................................................................................... 59 7.2.1 States ............................................................................................................................................. 59 7.2.2 Events and output .......................................................................................................................... 59 7.2.3 Variables ........................................................................................................................................ 59 7.2.4 State machine behavior ................................................................................................................. 60 7.3 Configurator state machine......................................................................................................................... 62 7.3.1 States ............................................................................................................................................. 62 7.3.2 Events and output .......................................................................................................................... 62 7.3.3 Variables ........................................................................................................................................ 62 7.3.4 Parent process behavior ................................................................................................................ 62 7.3.5 State machine behavior ................................................................................................................. 62 7.4 Enrollee state machine................................................................................................................................ 64 7.4.1 States ............................................................................................................................................. 64 7.4.2 Events and output .......................................................................................................................... 64 7.4.3 Variables ........................................................................................................................................ 64 7.4.4 State machine behavior ................................................................................................................. 64 7.5 Detailed protocol description....................................................................................................................... 66 7.5.1 DPP bootstrapping......................................................................................................................... 66 7.5.2 DPP authentication exchange........................................................................................................ 66 7.5.3 DPP configuration exchange ......................................................................................................... 68 7.5.4 DPP network introduction exchange.............................................................................................. 69 7.5.5 Network access.............................................................................................................................. 70 8 DPP ATTRIBUTE, FRAME, AND ELEMENT FORMATS .......................................................................................... 71 8.1 DPP attributes ............................................................................................................................................. 71 8.1.1 DPP attribute body field definitions................................................................................................ 72 8.2 DPP frames................................................................................................................................................. 74 8.2.1 DPP Public Action frames.............................................................................................................. 74 8.2.2 DPP Generic Advertisement Service (GAS) frames...................................................................... 78 Device Provisioning Protocol Specification v1.0 © 2018 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 5 of 124 8.3 DPP status and error codes........................................................................................................................ 81 8.4 Network Introduction protocol elements...................................................................................................... 82 8.4.1 Overview ........................................................................................................................................ 82 8.4.2 Network Introduction protocol AKM suite....................................................................................... 82 9 DPP CONFIGURATION BACKUP AND RESTORE.................................................................................................. 83 9.1 Overview ..................................................................................................................................................... 83 9.2 DPP AsymmetricKeyPackage..................................................................................................................... 83 9.3 DPPEnvelopedData .................................................................................................................................... 84 9.3.1 DPPAsymmetricKeyPackage encryption....................................................................................... 86 9.3.2 DPPEnvelopedData decryption ..................................................................................................... 86 9.4 DPP configuration backup .......................................................................................................................... 86 9.5 DPP configuration restore........................................................................................................................... 86 9.6 Enabling multiple Configurators in DPP...................................................................................................... 87 APPENDIX A (INFORMATIVE) TEST VECTORS ............................................................................................................ 88 A.1 Test vectors for DPP Authentication using P-256 for mutual authentication..............................................88 A.2 Test vectors for DPP Authentication using P-256 for Responder-only authentication ...............................91 A.3 Test vectors for DPP Authentication using P-384 for mutual authentication..............................................94 A.4 Test vectors for DPP Authentication using P-521 for mutual authentication..............................................98 A.5 Test vectors for DPP Authentication using Brainpool P-256r1 for mutual authentication ........................103 A.6 Test vectors for DPP Authentication using Brainpool P-384r1 using mutual authentication....................106 A.7 A.7 Test vectors for DPP Authentication using Brainpool P-512r1 for mutual authentication ..................110 APPENDIX B ROLE-SPECIFIC ELEMENTS FOR PKEX............................................................................................... 115 B.1 Role-specific elements for NIST p256 ...................................................................................................... 115 B.2 Role-specific elements for NIST p384 ...................................................................................................... 115 B.3 Role-specific elements for NIST p521 ...................................................................................................... 116 B.4 Role-specific elements for Brainpool p256r1 ............................................................................................ 117 B.5 Role-specific elements for Brainpool p384r1 ............................................................................................ 117 B.6 Role-specific elements for Brainpool p512r1 ............................................................................................ 118 APPENDIX C PKEX TEST VECTOR FOR NIST P256................................................................................................... 119 C.1 Initial state of Initiator and Responder ...................................................................................................... 119 C.2 Initiator generates PKEX Exchange Request frame................................................................................. 119 C.3 Responder processes PKEX Exchange Request frame........................................................................... 120 C.4 Responder generates PKEX Exchange Response frame ........................................................................ 120 C.5 Initiator processess PKEX Exchange Response frame............................................................................ 121 C.6 Initiator generates PKEX Commit/Reveal request.................................................................................... 121 C.7 Responder processes PKEX Commit/Reveal Request frame.................................................................. 122 C.8 Responder generates PKEX Commit/Reveal Response frame................................................................ 123 C.9 Initiator processes PKEX Commit/Reveal Response frame..................................................................... 124

    5
    239
    1.1MB
    2018-12-05
    9
  • MIMO-OFDM Wireless Communications with MATLAB

    Contents Preface xiii Limits of Liability and Disclaimer of Warranty of Software xv 1 The Wireless Channel: Propagation and Fading 1 1.1 Large-Scale Fading 4 1.1.1 General Path Loss Model 4 1.1.2 Okumura/Hata Model 8 1.1.3 IEEE 802.16d Model 10 1.2 Small-Scale Fading 15 1.2.1 Parameters for Small-Scale Fading 15 1.2.2 Time-Dispersive vs. Frequency-Dispersive Fading 16 1.2.3 Statistical Characterization and Generation of Fading Channel 19 2 SISO Channel Models 25 2.1 Indoor Channel Models 25 2.1.1 General Indoor Channel Models 26 2.1.2 IEEE 802.11 Channel Model 28 2.1.3 Saleh-Valenzuela (S-V) Channel Model 30 2.1.4 UWB Channel Model 35 2.2 Outdoor Channel Models 40 2.2.1 FWGN Model 41 2.2.2 Jakes Model 50 2.2.3 Ray-Based Channel Model 54 2.2.4 Frequency-Selective Fading Channel Model 61 2.2.5 SUI Channel Model 65 3 MIMO Channel Models 71 3.1 Statistical MIMO Model 71 3.1.1 Spatial Correlation 73 3.1.2 PAS Model 76 3.2 I-METRA MIMO Channel Model 84 3.2.1 Statistical Model of Correlated MIMO Fading Channel 84 3.2.2 Generation of Correlated MIMO Channel Coefficients 88 3.2.3 I-METRA MIMO Channel Model 90 3.2.4 3GPP MIMO Channel Model 94 3.3 SCM MIMO Channel Model 97 3.3.1 SCM Link-Level Channel Parameters 98 3.3.2 SCM Link-Level Channel Modeling 102 3.3.3 Spatial Correlation of Ray-Based Channel Model 105 4 Introduction to OFDM 111 4.1 Single-Carrier vs. Multi-Carrier Transmission 111 4.1.1 Single-Carrier Transmission 111 4.1.2 Multi-Carrier Transmission 115 4.1.3 Single-Carrier vs. Multi-Carrier Transmission 120 4.2 Basic Principle of OFDM 121 4.2.1 OFDM Modulation and Demodulation 121 4.2.2 OFDM Guard Interval 126 4.2.3 OFDM Guard Band 132 4.2.4 BER of OFDM Scheme 136 4.2.5 Water-Filling Algorithm for Frequency-Domain Link Adaptation 139 4.3 Coded OFDM 142 4.4 OFDMA: Multiple Access Extensions of OFDM 143 4.4.1 Resource Allocation – Subchannel Allocation Types 145 4.4.2 Resource Allocation – Subchannelization 146 4.5 Duplexing 150 5 Synchronization for OFDM 153 5.1 Effect of STO 153 5.2 Effect of CFO 156 5.2.1 Effect of Integer Carrier Frequency Offset (IFO) 159 5.2.2 Effect of Fractional Carrier Frequency Offset (FFO) 160 5.3 Estimation Techniques for STO 162 5.3.1 Time-Domain Estimation Techniques for STO 162 5.3.2 Frequency-Domain Estimation Techniques for STO 168 5.4 Estimation Techniques for CFO 170 5.4.1 Time-Domain Estimation Techniques for CFO 170 5.4.2 Frequency-Domain Estimation Techniques for CFO 173 5.5 Effect of Sampling Clock Offset 177 5.5.1 Effect of Phase Offset in Sampling Clocks 177 5.5.2 Effect of Frequency Offset in Sampling Clocks 178 5.6 Compensation for Sampling Clock Offset 178 5.7 Synchronization in Cellular Systems 180 5.7.1 Downlink Synchronization 180 5.7.2 Uplink Synchronization 183 6 Channel Estimation 187 6.1 Pilot Structure 187 6.1.1 Block Type 187 6.1.2 Comb Type 188 6.1.3 Lattice Type 189 6.2 Training Symbol-Based Channel Estimation 190 6.2.1 LS Channel Estimation 190 6.2.2 MMSE Channel Estimation 191 6.3 DFT-Based Channel Estimation 195 6.4 Decision-Directed Channel Estimation 199 6.5 Advanced Channel Estimation Techniques 199 6.5.1 Channel Estimation Using a Superimposed Signal 199 6.5.2 Channel Estimation in Fast Time-Varying Channels 201 6.5.3 EM Algorithm-Based Channel Estimation 204 6.5.4 Blind Channel Estimation 206 7 PAPR Reduction 209 7.1 Introduction to PAPR 209 7.1.1 Definition of PAPR 210 7.1.2 Distribution of OFDM Signal 216 7.1.3 PAPR and Oversampling 218 7.1.4 Clipping and SQNR 222 7.2 PAPR Reduction Techniques 224 7.2.1 Clipping and Filtering 224 7.2.2 PAPR Reduction Code 231 7.2.3 Selective Mapping 233 7.2.4 Partial Transmit Sequence 234 7.2.5 Tone Reservation 238 7.2.6 Tone Injection 239 7.2.7 DFT Spreading 241 8 Inter-Cell Interference Mitigation Techniques 251 8.1 Inter-Cell Interference Coordination Technique 251 8.1.1 Fractional Frequency Reuse 251 8.1.2 Soft Frequency Reuse 254 8.1.3 Flexible Fractional Frequency Reuse 255 8.1.4 Dynamic Channel Allocation 256 8.2 Inter-Cell Interference Randomization Technique 257 8.2.1 Cell-Specific Scrambling 257 8.2.2 Cell-Specific Interleaving 258 8.2.3 Frequency-Hopping OFDMA 258 8.2.4 Random Subcarrier Allocation 260 8.3 Inter-Cell Interference Cancellation Technique 260 8.3.1 Interference Rejection Combining Technique 260 8.3.2 IDMA Multiuser Detection 262 9 MIMO: Channel Capacity 263 9.1 Useful Matrix Theory 263 9.2 Deterministic MIMO Channel Capacity 265 9.2.1 Channel Capacity when CSI is Known to the Transmitter Side 266 9.2.2 Channel Capacity when CSI is Not Available at the Transmitter Side 270 9.2.3 Channel Capacity of SIMO and MISO Channels 271 9.3 Channel Capacity of Random MIMO Channels 272 10 Antenna Diversity and Space-Time Coding Techniques 281 10.1 Antenna Diversity 281 10.1.1 Receive Diversity 283 10.1.2 Transmit Diversity 287 10.2 Space-Time Coding (STC): Overview 287 10.2.1 System Model 287 10.2.2 Pairwise Error Probability 289 10.2.3 Space-Time Code Design 292 10.3 Space-Time Block Code (STBC) 294 10.3.1 Alamouti Space-Time Code 294 10.3.2 Generalization of Space-Time Block Coding 298 10.3.3 Decoding for Space-Time Block Codes 302 10.3.4 Space-Time Trellis Code 307 11 Signal Detection for Spatially Multiplexed MIMO Systems 319 11.1 Linear Signal Detection 319 11.1.1 ZF Signal Detection 320 11.1.2 MMSE Signal Detection 321 11.2 OSIC Signal Detection 322 11.3 ML Signal Detection 327 11.4 Sphere Decoding Method 329 11.5 QRM-MLD Method 339 11.6 Lattice Reduction-Aided Detection 344 11.6.1 Lenstra-Lenstra-Lovasz (LLL) Algorithm 345 11.6.2 Application of Lattice Reduction 349 11.7 Soft Decision for MIMO Systems 352 11.7.1 Log-Likelihood-Ratio (LLR) for SISO Systems 353 11.7.2 LLR for Linear Detector-Based MIMO System 358 11.7.3 LLR for MIMO System with a Candidate Vector Set 361 11.7.4 LLR for MIMO System Using a Limited Candidate Vector Set 364 Appendix 11.A Derivation of Equation (11.23) 370 12 Exploiting Channel State Information at the Transmitter Side 373 12.1 Channel Estimation on the Transmitter Side 373 12.1.1 Using Channel Reciprocity 374 12.1.2 CSI Feedback 374 12.2 Precoded OSTBC 375 12.3 Precoded Spatial-Multiplexing System 381 12.4 Antenna Selection Techniques 383 12.4.1 Optimum Antenna Selection Technique 384 12.4.2 Complexity-Reduced Antenna Selection 386 12.4.3 Antenna Selection for OSTBC 390 13 Multi-User MIMO 395 13.1 Mathematical Model for Multi-User MIMO System 396 13.2 Channel Capacity of Multi-User MIMO System 397 13.2.1 Capacity of MAC 398 13.2.2 Capacity of BC 399 13.3 Transmission Methods for Broadcast Channel 401 13.3.1 Channel Inversion 401 13.3.2 Block Diagonalization 404 13.3.3 Dirty Paper Coding (DPC) 408 13.3.4 Tomlinson-Harashima Precoding 412 References 419 Index 431

    4
    467
    4.81MB
    2018-11-13
    50
  • Wi-Fi:802.11 物理层和发射机测量概述

    本入门手册从整体上概括介绍了每项802.11 标准、其 物理层特点以及测试要求

    0
    70
    1.8MB
    2018-11-13
    9
  • High-Accuracy Indoor Geolocation using Collaborative Time of Arrival (CToA)

    Collaborative time of arrival (CToA) is the next generation, indoor geolocation method, which is designed for enabling scalability of the existing IEEE802.11/Wi-Fi-based, geolocation systems. The technique leverages on the IEEE802.11 fine timing measurements (FTM) capabilities, enabled in stateof- the-art Wi-Fi chipsets, and supports two concurrent operation modes; the CToA “client-mode” enables “GPS-like” operation indoors, and allows an unlimited number of clients to privately estimate their position and navigate indoors, without exposing their presence to the network

    0
    122
    1.65MB
    2018-11-13
    10
  • 精通Linux内核网络

    《精通Linux内核网络》讨论Linux 内核网络栈的实现及其原理,深入而详尽地分析网络子系统及其架构,主要内容包括:内核网络基础知识、Netlink 套接字、ARP、邻居发现和ICMP 等重要协议的实现、IPv4 和IPv6 的深入探索、Linux 路由选择、Netfilter 和IPsec 的实现、Linux 无线网络、InfiniBand 等。 《精通Linux内核网络》不仅适合从事网络相关项目的专业人员参考,也能为相关研究人员和学生提供极大帮助。 目录 第1章 绪论 1 第2章 Netlink套接字 13 第3章 Internet控制消息协议(ICMP) 36 第4章 IPv4 61 第5章 IPv4路由选择子系统 105 第6章 高级路由选择 131 第7章 Linux邻接子系统 153 第8章 IPv6 192 第9章 Netfilter 227 第10章 IPsec 257 第11章 第4层协议 280

    0
    0
    102.29MB
    2018-11-13
    0
  • 802.11-2016

    ieee-802.11最新协议802.11-2016,3000多页完整版,ofdma

    0
    167
    20.01MB
    2018-11-09
    11
  • 分享达人

    成功上传6个资源即可获取
关注 私信
上传资源赚积分or赚钱