Abstract:
In at least some embodiments, a communication device includes a transceiver with a physical (PHY) layer. The PHY layer is configured for body area network (BAN) operations in a limited multipath environment using M-ary PSK, differential M-ary PSK or rotated differential M-ary PSK. Also, the PHY layer uses a constant symbol rate for BAN packet transmissions.
Abstract:
In at least some embodiments, a communication device includes a transceiver with a physical (PHY) layer. The PHY layer is configured for body area network (BAN) operations in a limited multipath environment based on a constant symbol rate for BAN packet transmissions and based on M-ary PSK, differential M-ary PSK or rotated differential M-ary PSK modulation. The PHY layer is configured to transmit and receive data in a frequency band selected from the group consisting of: 402-405 MHz, 420-450 MHz, 863-870 MHz, 902-928 MHz, 950-956 MHz, 2360-2400 MHz, and 2400-2483.5 MHz.
Abstract:
A symbol modulation system applicable to a body area network is disclosed herein. The symbol modulation system includes a symbol mapper. The symbol mapper is configured to determine a time within a predetermined symbol transmission interval at which a transmission representative of the symbol will occur. The time is determined based on a value of a symbol and a value of a time-hopping sequence. The time is selected from a plurality of symbol value based time slots, and a plurality of time-hopping sequence sub-time-slots within each symbol value based time slot. The symbol mapper is configured to generate a single guard interval within the symbol transmission interval. The single guard interval is positioned to terminate the symbol transmission interval.
Abstract:
A VBUS conductor is checked to determine whether a voltage on the VBUS conductor is greater than a vSafe0V voltage within a detect time interval. A device policy manager applies a vSafeDB voltage to the VBUS conductor when the voltage on the VBUS conductor is greater than the vSafe0V voltage. The policy engine waits for a bit stream to be detected within a timer interval. When the bit stream is not detected within the timer interval, the device policy manager is instructed to apply the vSafe0V voltage to the VBUS conductor. The device policy manager applies a vSafe5V voltage to the VBUS conductor when the bit stream is detected, and the policy engine waits for the bit stream to stop within a device ready timer interval. When the bit stream has stopped within the device ready timer interval, the policy engine sends capabilities as a source port.
Abstract:
A method for communicating in a wireless sensor network (WSN) is described. Using control logic, a first wireless transceiver is caused to transmit a wireless packet to a node in a wireless sensor network. The control logic bases its causing on a transmission coinciding with a break in transmission for a second wireless network, such that the transmission from the first wireless transceiver does not coincide with transmissions made on the second wireless network. Time synchronized channel hopping (TSCH) slot frames for wireless packet transmission in the wireless sensor network are caused to be time offset if the first wireless transceiver is utilizing TSCH. Wake up sequence transmissions for the wireless sensor network are caused to be time offset if the first wireless transceiver is utilizing coordinated sampled listening (CSL).
Abstract:
A system and method for tracking noise in a received signal uses a forward/backward Decision-Directed Phase Tracking Loop to generate a phase-noise compensation signal that removes phase noise from received single-carrier signals.
Abstract:
A method includes simulating transmission of multiple symbols representing multiple bits over at least one communication channel, where the multiple symbols are associated with a polar code. The method also includes identifying error rates of equivalent bit channels associated with the simulated transmission of the symbols. The method further includes selecting a specified number of the bits as frozen bits in the polar code using the identified error rates. Simulating the transmission of the symbols could include computing log likelihood ratio (LLR) values associated with the equivalent bit channels and simulating polar decoding of received symbols using the LLR values. Identifying the error rates could include calculating means and variances of the LLR values associated with the equivalent bit channels and identifying probability density functions of the LLR values using the means and variances. The selected bits could represent the specified number of bits identified as having worst error rates.
Abstract:
A method includes receiving multiple bits to be transmitted. The method also includes applying a first binary alphabet polar code to a first subset of the multiple bits to generate first encoded bits. The first encoded bits are associated with a first bit level of a multilevel coding scheme. The method further includes generating one or more symbols using the first encoded bits and bits associated with a second bit level of the multilevel coding scheme. The first binary alphabet polar code is associated with a first coding rate. In addition, the method could include applying a second binary alphabet polar code to a second subset of the multiple bits to generate second encoded bits. The second encoded bits are associated with the second bit level. The second binary alphabet polar code is associated with a second coding rate such that the bit levels have substantially equal error rates.
Abstract:
Embodiments of the invention provide a method of decoding of hexagonal constellations. The decoding methods exploit the inherent structure of the hexagonal grid to eliminate/minimize the requirements for distance computations. A constellation which has unused constellation points is received. A plurality of lookup tables is used for indicating whether a particular constellation point is used. The lookup tables are indexed using the two integers u and v. An initial estimate of u and v is found. The euclidean distance to an immediate four neighbors resulting in the immediate upper and lower integers for ū and v. The upper or lower integer that corresponds to the smalling distance is selected and all other immediate neighbors are computed. Assignment of constellation points on the hexagonal grid for a given constellation size is provided which exploits the inherent redundancy provided by the hexagonal grid. Assignment of codewords to the available constellation points to minimize the Hamming distance between adjacent codewords is also provided.
Abstract:
A wireless device includes a wireless transceiver configured to transmit to and receive from nodes in a wireless sensor network (WSN) and control logic coupled to the first wireless transceiver. The wireless transceiver transmits a wireless packet to a node in the WSN based on the transmission coinciding with a break in transmissions for a second wireless network. Based on the wireless transceiver being configured to transmit the wireless packets utilizing time synchronized channel hopping, slot frames for packet transmissions in the WSN are time offset so as not to coincide with transmissions made on the second wireless network. Based on the wireless transceiver being configured to transmit the packets utilizing coordinated sampled listening, wake up sequence transmissions for the WSN are time offset so as not to coincide with the transmissions made on the second wireless network.