Wireless Personal Communications pp 105-148 | Cite as
WPAN Simulation Scenarios-2 with the Different Coding
Chapter
First Online:
Abstract
In this chapter, the previous scenarios of the WPAN Bluetooth system simulation are repeated with more powerful error control schemes. The chapter presents the components of the convolutional encoders with different constraint lengths. The convolutional code is widely used as error control technique within different wireless communications systems. The MATLAB codes of the encoded packets using the convolutional codes are presented. The frame with the proposed channel coding is discussed; the user data ‘payload’ is decreased with the check bits increasing. The performance of the proposed scenarios is analyzed.
Keywords
Convolutional codes Constraint length Complexity Simulation code Modified packetsReferences
- 1.Howitt I (2001) WLAN and WPAN coexistence in UL band. IEEE Trans Veh Technol 50(4)Google Scholar
- 2.Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19(5)Google Scholar
- 3.Bluetooth specifications v1.1. http://www.bluetooth.com
- 4.Specification of bluetooth system, volume 2, version 1.1, February 22, 2001Google Scholar
- 5.Bluetooth specifications v1.2. http://www.bluetooth.com
- 6.Heller JA (1968) Short constraint length convolutional codes. Jet Propul Lab Calif Inst Technol Space Programs Summary 37–54 III:171–177Google Scholar
- 7.Omura JK (1969) On the Viterbi decoding algorithm. IEEE Trans Inform Theor IT-15Google Scholar
- 8.Heller JA, Jacobs IM (1971) Viterbi decoding for satellite and space communication. IEEE Trans Commun Technol 19(5)Google Scholar
- 9.Gilbert E (1960) Capacity of a burst-noise channel. Bell Syst Tech J 39:1253–1266Google Scholar
- 10.Chen L-J, Sun T, Chen Y-C Improving Bluetooth EDR data throughput using FEC and interleavingGoogle Scholar
- 11.Ahiara Wilson C, Chbuisi I (2015) Simulink modeling of convolutional encoders. SSRG Int J Electr Electron Eng (SSRG-IJEEE) 2(5)Google Scholar
- 12.Arasteh D (2006) Teaching convolutional coding using MATLAB in communication systems course. In: Proceedings of the 2006 ASEE Gulf-Southwest annual conference southern university and A&M CollegeGoogle Scholar
- 13.El-Bendary MAM, Abou El-Azm A, El-Fishawy N, Al-Hosarey FSM, Eltokhy MAR, Abd El-Samie FE, Kazemian HB (2012) JPEG image transmission over mobile bluetooth networks with efficient channel coding and interleaving. Int J ElectronGoogle Scholar
- 14.El-Bendary MAM (2015) Lower complexity of secured WSN networks. Springer (Book Chapter)Google Scholar
- 15.El-Bendary MAM, Abu El-Azm AF, El-Fishawy NA, Shawky F, El-Samie FE (2011) Embedded Throughput Improving of Low-rate EDR Packets for Lower-latency. In: World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 2011Google Scholar
- 16.Mohsen A, El-Bendary M (2016) Developing security tools of WSN and WBAN networks applications. SpringerGoogle Scholar
Copyright information
© Springer Nature Singapore Pte Ltd. 2018