hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
db710b0c0bfc6540cdea67146fb6ed72
102 134
4 Executive summary
The following document describes the characteristics of the system and its benefits to the European community. The ASAP system is designed to provide economical benefits by shortening the delivery time of large and expensive freights such as containers, efficient distribution of produced cars etc. On top, the system pr...
db710b0c0bfc6540cdea67146fb6ed72
102 134
5 Detailed information on various aspects
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.1 Estimated number of FHSS transmissions (worst condition)
The number of containers and other large assets that are on the road is estimated at 20 000 000. These assets are dispersed all over Europe. The geographical area of Europe is 10 360 000 square km. Therefore; there are on average 2 end units per square km, provided that all potential assets are equipped with ASAP end u...
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.2 Estimated interference
The transmission of ASAP end units produces extremely low out-of-band energy. On the other hand the system is highly non susceptible to other transmissions interference. The very sparse transmissions guarantee the ability of other systems to coexist with the ASAP system.
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.3 Limitation of the duty cycle of the end units
The end-units connected to the assets are programmed to transmit twice a day unless a rare occurrence happens which requires tracking of a specific end-unit.
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.4 Polling transmitter
No additional high power paging transmitters are required. asap technology does exploit the existing paging networks.
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.5 The economic benefits
ASAP is addressing the problem of freight transportation across Europe. Freight often travels on multi modal transportation, mainly to reduce transportation prices, especially these days where the demand of higher usage of trains and other low pollution means of transportation is on the rise. Therefore an efficient fre...
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.6 Social benefit
In addition to the economic benefit, introduction of this technology will contribute to the quality of life by: • Improvements in the employment situation by shortening the time to deliver of assets. • Improvements in the quality of life, health and safety of European citizens by monitoring spill or leakage of dangerou...
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.7 Spectrum requirement and justification
The Strategic Plan for the 862 MHz to 868 MHz proposed by the SRD MG and approved by WG FM offers the opportunity for introduction of the FHSS technology: "The frequency band 863 MHz to 870 MHz should be considered for non-specific spread spectrum SRD applications by using Direct Sequence Spread Spectrum (DSSS) and/or ...
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.8 Technical Issues
Market information & Contribution to community social objectives: see annex A Technical information: see annex B Expected Compatibility studies: see annex C
db710b0c0bfc6540cdea67146fb6ed72
102 134
5.9 Current Regulation - Region 1 and CEPT allocation
RR Region 1 Allocation and RR footnotes relevant to CEPT and frequency band European Common Allocation Utilization EU footnote ECC/ERC document Standard Note Cordless Telephones ERC DEC (01) 02 To be phased out in accordance with ERC Decisions (01) 02 Defence systems Radio microphones ERC REC 70- 03 EN 300 422 EN 301 3...
db710b0c0bfc6540cdea67146fb6ed72
102 134
6 Main conclusions
The UHF band 865 MHz to 868 MHz could meet market requirements by allowing low duty cycle FHSS systems to operate providing co-existence with other SRD applications, enabling both economical & social benefits of ASAP system. Compatibility evaluations and studies for services are as listed in annex C. ETSI ETSI TR 102 1...
24af704f27937dcfe30029f8d80b1fba
102 133
2 References
24af704f27937dcfe30029f8d80b1fba
102 133
2.1 Normative references
Normative references are not applicable in the present document.
24af704f27937dcfe30029f8d80b1fba
102 133
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i...
24af704f27937dcfe30029f8d80b1fba
102 133
3 Definition of terms, symbols and abbreviations
24af704f27937dcfe30029f8d80b1fba
102 133
3.1 Terms
For the purposes of the present document, the following terms apply: apprenticeship: model of learning, in which knowledge is acquired in the process of performing apps: short for application software, which is a type of computer program that performs a specific personal, educational, and business function and where ea...
24af704f27937dcfe30029f8d80b1fba
102 133
3.2 Symbols
Void.
24af704f27937dcfe30029f8d80b1fba
102 133
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: 3GPP 3rd Generation Partnership Project AD Advertisement AI Artificial Intelligence ANEC European Association for the Coordination of Consumer Representation in Standardisation ATM Automatic Teller Machine BECTA British Educational Communicati...
24af704f27937dcfe30029f8d80b1fba
102 133
4.0 Introduction
Children, as ICT users, are in most aspects differently abled than adults. Only if their abilities, needs and requirements are studied, understood and differentiated, can well-working, understandable and accessible ICT solutions be offered. Our challenge in providing guidance on designing for children is complex, becau...
24af704f27937dcfe30029f8d80b1fba
102 133
4.1 Key theories of child development
An overview of the key theories and characteristics of child development is provided in this clause in three main areas: • physical growth; • cognitive maturation; and • social development is discussed in chronological order. The focus is on the typical development of the normal child. Our selection criteria for the ap...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.0 Introduction
The embryological development is a progressive process of anatomical differentiation, which also applies to the development of behaviour. Some aspects of the orderly progression of development are determined by maturation, genetically pre-programmed, independent of specific environmental conditions (e.g. walking). Chil...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.1 0-2 years
Noteworthy characteristics of newborn children are their small size, different body proportions and need to associate with other people in order to survive. The rate of growth will initially be high to later slow considerably. Sex differences can be observed, with girls achieving more than half of their adult height by...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.2 2-5 years
The pre-school period begins. Breathing becomes slower and deeper and physical health improves. Motor patterns and skills -sequences of precise movements -and manipulation develop. The various motor and sensor control areas of the ETSI 15 ETSI TR 102 133 V2.1.1 (2025-07) brain start to correlate and work together. Visu...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.3 5-11 years
Between 5 to 12, middle childhood, children extend their abstract thinking ability to include concepts such as the past and future and begin to be able to have the ability to see things from the perspective of another person. During this time, they begin to mentalize (also called theory of mind) is the ability to expla...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.4 11-13 years
Children at this stage have entered a highly emotional space. They are just beginning to cope with hormonal changes brought about by the onset of puberty. They are also hitting a time when peers will have the most influence on them. They want to be poised and have self-control, but they are often clumsy and in conflict...
24af704f27937dcfe30029f8d80b1fba
102 133
4.2.5 13-18 years
The teenage years bring many changes, not only physically, but also mentally and socially. During these years, adolescents increase their ability to think abstractly and eventually make plans and set long-term goals. Each child may progress at a different pace and may have a different view of the world. In general, the...
24af704f27937dcfe30029f8d80b1fba
102 133
5.0 Introduction
In the following clause, the parameters of the use of technology that have implications for use by children will be systematically examined. In addition to developing a conceptual framework for future research, some specific issues of current interest will be emphasized. This is not a comprehensive list of issues, but,...
24af704f27937dcfe30029f8d80b1fba
102 133
5.1 Developmental mapping
The following three dimensions reflect individual traits and skills that develop as a result of genetically determined maturation and interaction with the environment. Each of these three dimensions is a composite of several developmental themes (some of them listed below), specifically selected in this context because...
24af704f27937dcfe30029f8d80b1fba
102 133
5.2 Location / Context
Children use technology in many different locations and for many different activities. This raises a wide variety of issues specific to the fact that children are the users. This clause will consider where the child will be using the technology, including the context of use. Examples of location and contexts that highl...
24af704f27937dcfe30029f8d80b1fba
102 133
5.3 Physical Characteristics
Children do not have the same characteristics as adults. Their skeletal and nervous systems are not mature; they do not have the strength or stamina that an adult would be expected to have. As they are maturing physically, they are vulnerable to damage from excessive use of or exposure to equipment that is not designed...
24af704f27937dcfe30029f8d80b1fba
102 133
5.4 Operating Characteristics
Not only should a child be able to physically operate an appropriate ICT system, but they should also be able to negotiate the basic operation of the system at the software level. Various parameters may influence the successful comprehension of the operation of the system, and the ability to execute the procedures nece...
24af704f27937dcfe30029f8d80b1fba
102 133
5.5 Services
Having ensured that the basic system is usable, it will be necessary to consider issues arising from the use of the system to access communication and information exchange services. A wide variety of issues may be involved, including: • opening and closing communication channels with the correct and appropriate communi...
24af704f27937dcfe30029f8d80b1fba
102 133
5.6 Content
24af704f27937dcfe30029f8d80b1fba
102 133
5.6.0 Introduction
The following clause will focus on content on the Internet and mobile services. In order to identify issues requiring action, these areas will be considered jointly, as a convergence of technologies and the increasing prevalence of hybrid services have rapidly made the distinction between Internet and mobile telephony ...
24af704f27937dcfe30029f8d80b1fba
102 133
5.6.1 Comprehension
Comprehension is a process that involves not only decoding messages, but also making additional inferences about meaning and, at more advanced levels, the explicit and covert intentions of the message source. Young children, e.g. pre-schoolers, are beginner readers who can encounter difficulties in mastering media lite...
24af704f27937dcfe30029f8d80b1fba
102 133
5.6.2 Legal and ethical concerns
The characteristic Internet use patterns of children are difficult to measure. Entertainment is the primary attraction for children, but attempting to describe and document activity is like trying to hit a moving target [i.9]. Children mature, preferences change, technology advances and new knowledge bases emerge and s...
24af704f27937dcfe30029f8d80b1fba
102 133
5.6.3 Marketing and Privacy
Children have growing personal spending power and influence over their parents' purchasing decisions [i.6]. It has been known for a while of the effectiveness of online marketing to children. Therefore, it is not surprising that from 1993 to 1996 advertising in child-oriented media increased more than 50 % and that in ...
24af704f27937dcfe30029f8d80b1fba
102 133
5.6.4 Approaches to controlling content
Content control may be divided into different basic categories: • blocklists; • category filters; • keyword filters; • monitoring use; and • separate "kids" domains. The Internet Content Rating Association (ICRA) is an international, independent organization that empowers the public, especially parents, to make informe...
24af704f27937dcfe30029f8d80b1fba
102 133
5.7 Applying the approach to a specific target group
It is beyond the scope of the present document to provide an exhaustive evaluation of every ICT service that children can be expected to encounter in their daily lives. Our intention has been, rather, to suggest an analytical framework within which such endeavours can be carried out at some future time. This clause ill...
24af704f27937dcfe30029f8d80b1fba
102 133
7 Legalisation and Regulation
24af704f27937dcfe30029f8d80b1fba
102 133
7.1 Introduction
This clause focuses on EU legalisation with how they impact children. These are points companies and service providers need to consider when they have users and/or customers who are children. While this clause will not look at national legalisation it is something companies have to be aware of their obligations under t...
24af704f27937dcfe30029f8d80b1fba
102 133
7.2 Legislation
24af704f27937dcfe30029f8d80b1fba
102 133
7.2.1 Digital Services Act (DSA)
The DSA will make sure that all digital services that are used by consumers, especially the so-called Very Large Online Platforms (VLOP) and Very Large Online Search Engines (VLOS) do more to protect users' rights, keep users safe and stop the spread of illegal or inappropriate content [i.35]. The DSA covers different ...
24af704f27937dcfe30029f8d80b1fba
102 133
7.2.2 Artificial Intelligence Act
The EU AI Act gives explicit attention to children as a vulnerable category [i.36] and [i.37]. In Recital 28a clarifies explicitly that "children have specific rights as enshrined in Article 24 of the EU Charter and the United Nations Convention on the Rights of the Child (further elaborated in the UNCRC General Commen...
24af704f27937dcfe30029f8d80b1fba
102 133
7.2.3 European Cyber Resilience Act (CRA)
The Cyber Resilience Act (CRA) [i.56], is a piece of European Union legislation that governs the cybersecurity of products with digital elements distributed on its territory. It directly complements other legislative pieces such as the AI Act or the NIS2 Directive. The CRA officialises the responsibility of manufacture...
24af704f27937dcfe30029f8d80b1fba
102 133
7.3 Regulation
24af704f27937dcfe30029f8d80b1fba
102 133
7.3.1 General Data Protection Regulation (GDPR)
The General Data Protection Regulation (Regulation (EU) 2016/679) [i.49], is a European Union regulation on information privacy in the EU and the European Economic Area (EEA). It also governs the transfer of personal data outside the EU and EEA. The GDPR's goals are to enhance individuals' control and rights over their...
24af704f27937dcfe30029f8d80b1fba
102 133
7.3.2 NIS2 Directive
The Directive (EU) 2022/2555 [i.50] on measures for a high common level of cybersecurity across the EU, known as NIS2, sets out a common cybersecurity regulatory framework aiming to enhance the level of cybersecurity in the European Union (EU), requiring EU Member States to strengthen cybersecurity capabilities and int...
24af704f27937dcfe30029f8d80b1fba
102 133
8 Security, Data Protection and Privacy
24af704f27937dcfe30029f8d80b1fba
102 133
8.1 Introduction
There is an abundance of material covering these topics in general [i.39]. This clause will focus on key points relevant to children. For example, this includes design considerations, education, and awareness which also includes teachers and parents. The provision of links to information resources. It should be noted t...
24af704f27937dcfe30029f8d80b1fba
102 133
8.2 Cybersecurity
Cybersecurity is just as critical for young people as adults. Though the risks and harms will differ. The common cybersecurity breaches that users may experience are: • Phishing - unsolicited emails and fraudulent messages that seek to trick the recipient into providing private information. • Malware is software that g...
24af704f27937dcfe30029f8d80b1fba
102 133
8.3 Data Protection
When the personal data of children is collected additional protection is as children are less aware of the risks and consequences of sharing data and of their rights [i.38]. Any information addressed specifically to a child should be adapted to be easily accessible, using clear and plain language. For most online servi...
24af704f27937dcfe30029f8d80b1fba
102 133
8.4 Online Safety
24af704f27937dcfe30029f8d80b1fba
102 133
8.4.1 Overview
Ensuring children understand online safety is essential because many of them will be using a wide range of technologies in their home environments, even before they start school. Technology is becoming an integral part of children's lives; it entertains them, engages them and motivates them. Safety advice for younger c...
24af704f27937dcfe30029f8d80b1fba
102 133
8.4.2 Parental Controls
Parental controls are designed to help protect children from inappropriate content online, such as pornography or other adult content. These controls can be used in a number of ways, e.g. to help ensure that your children access only age- appropriate content, to set usage times and to monitor activity. Four main places...
24af704f27937dcfe30029f8d80b1fba
102 133
8.4.3 Report Button
Ideally, it is important that places online where people spend time together are safe and fun for everyone. This means everyone needs to follow the rules and be respectful to others. If something online worries, upsets or confuses a user they should be able to report this so an online safety team or moderator can inves...
24af704f27937dcfe30029f8d80b1fba
102 133
8.4.4 Online Sextortion
Sextortion is a type of blackmail when someone threatens to share nudes, semi-nudes, sexual information, or videos of someone unless the victim pays money or agrees to do something else, such as share more images. Sextortion is a crime and can be committed by individuals or by a group of people working together. Crimin...
24af704f27937dcfe30029f8d80b1fba
102 133
8.4.5 Online Sexual Harassment
Online sexual harassment is any unwanted sexual behaviour that occurs online. It can happen on any online platform and could include content such as photos, videos, posts, web pages, messages or fake profiles. Even if the harassment was intended as a joke, or was a misunderstanding, it is the experience of the victim t...
24af704f27937dcfe30029f8d80b1fba
102 133
8.5 Online Privacy
Today, children are growing up in a digital world; being online and using digital services is an integral part of their lives where they learn, play and connect with others. However, the online world was not designed with children's needs in mind and, as a result, the potential for harm is ever-present. Children may be...
24af704f27937dcfe30029f8d80b1fba
102 133
9 Conclusions and Recommendations
24af704f27937dcfe30029f8d80b1fba
102 133
9.1 Overview
Conclusions are based on reviews of relevant literature, surveys of media coverage of issues, stakeholder reports and published guidance from industry and academia. Specific recommendations have been highlighted in bold text below. This present document did not initiate laboratory studies or surveys of user groups.
24af704f27937dcfe30029f8d80b1fba
102 133
9.2 Design Issues
• Children, as ICT users, are, in most respects, differently abled than their adult counterparts. Only if their abilities, needs, and requirements are studied, understood, and differentiated can well-working, understandable, and accessible ICT solutions be offered. • It is recommended that: - the analytical approach de...
24af704f27937dcfe30029f8d80b1fba
102 133
9.3 Market Issues
• A better understanding of the market for ICT products for children and its characteristics is needed. The market's transient nature makes it difficult to market relatively high-priced products to children and their parents. • It is recommended that: - regular studies of the market for ICT products for children should...
24af704f27937dcfe30029f8d80b1fba
102 133
9.4 Health and Safety Concerns
• Smartphones can pose several health and safety concerns for children, including: - Mental health: Excessive smartphone use can lead to anxiety, depression, and loneliness. Children are also vulnerable to cyberbullying, which can have detrimental effects on their mental health. - Sleep disturbances: The blue light emi...
24af704f27937dcfe30029f8d80b1fba
102 133
9.5 Security and Privacy Concerns
• Age verification mechanisms independent of identity are needed and are being developed in response to the EU Digital Services Act: - European standardization bodies and activities investigating and/or proposing identity verification schemes are determining the need for reliable age verification mechanisms that do not...
24af704f27937dcfe30029f8d80b1fba
102 133
9.6 User Interface Design Issues
• Help facilities, guidelines, manuals and documentation for children need to be better understood and produced. There are ETSI documents which guide user interface design issues: ETSI EG 203 499 [i.43] User-centred terminology for existing and upcoming ICT devices, services and applications; ETSI TR 103 852 [i.44] An ...
24af704f27937dcfe30029f8d80b1fba
102 133
9.7 General Accessibility Issues
In general ICT devices and services should comply with the European Accessibility Act, a directive that aims to improve the functioning of the internal market for accessible products and services by removing barriers created by divergent rules in Member States. These covered products and services include: • computers a...
24af704f27937dcfe30029f8d80b1fba
102 133
9.8 Proactive issues
The implications of anticipated future products and services need to be understood. Examples of such systems are communicating, social media networks, smart toys, image sharing (messaging apps and the internet), video sharing platforms and AI systems: • Technology and service development activities need to be monitored...
10895ddc70d25bd7d9a9a43d788761d5
102 129
1 Scope
The objective of ETSI Project TIPHON is the specification of interoperability mechanisms and related parameters to enable multimedia communications (particularly voice) to take place, to a defined quality of service, between Switched Circuit Networks (SCN) and Internet Protocol (IP) based networks and their associated ...
10895ddc70d25bd7d9a9a43d788761d5
102 129
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ITU-T Recommendation J.160: "Architectural framework for the delivery of time-critical services over cable television networks using cable modems". [2] ETSI TS 101 882 (V1.1.1): "Telecommunications and Internet Protocol Harmonization Ove...
10895ddc70d25bd7d9a9a43d788761d5
102 129
3 Definitions and abbreviations
10895ddc70d25bd7d9a9a43d788761d5
102 129
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: authentication header: IPSec security protocol that provides message integrity for complete IP packets, including the IP header Application-Specific Data: application-specific field in the IPSec header that along with the destination I...
10895ddc70d25bd7d9a9a43d788761d5
102 129
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: AN Access Node ANC ANnouncement Controller ANP ANnouncement Player ANS ANnouncement Server AOC Advice Of Charge API Application Programming Interface ETSI ETSI TR 102 129 V1.1.1 (2003-01) 11 ATM Asynchronous Transfer Mode BICC Bearer Independe...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4 Overview
The study was initially conducted to identify what was needed to be done for convergence between IPCablecom and TIPHON. However, it was recognized that this task was extremely ambitious, hence the present document describes an analysis of interworking between IPCablecom and TIPHON. Three interworking scenarios have bee...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.1 Interworking through SCN Interfaces
Both TIPHON and IPCablecom support an SCN interface for basic call. The signalling is done through ISUP whilst the media transfer is either PSTN or IP in the case of TIPHON and only PSTN for IPCablecom at this point in time. It is likely that IPCablecom will evolve to ISDN. This interworking assumes that TIPHON complet...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.2 Interworking through MGC interfaces
Both TIPHON and IPCablecom provide Media Gateway Control. However, until recently, IPCablecom is based on MGCP variations and TIPHON is based on H.248. Three interworking scenarios are considered and a proposed way forward is given.
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.2.1 Interworking through MGCP
This is the most controversial scenario from a TIPHON point of view and may not get any support from the TIPHON membership. However, this is of course the most popular way forward within IPCablecom community. This scenario which is recalled at least for completeness and to highlight the opportunities for ETSI and TIPHO...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.2.2 Interworking through H.248
While this is the preferred TIPHON solution, it is still under discussion within the IPCablecom community. IPCablecom has now accepted, with a lot of reluctance, the implementation of H.248 as an option for the case of the Audio Server Protocol. It is assumed that once this conversion specified, elements of code could ...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.2.3 Interworking through MGCP to H.248 converter
In this case, it is assumed that the IPCablecom network provides the MGCP part and that TIPHON provides the mapping to H.248 meta-protocol. It is believed that the same implementation can do both protocols. The converter can: • either be provided by and within IPCablecom in which case we are back to the case of clause ...
10895ddc70d25bd7d9a9a43d788761d5
102 129
4.3 Interworking through SIP
In TIPHON, SIP is supported for setting up end-to-end sessions in the IP environment. Though IPCablecom is based on MGCP and its variants for the inner part of the network, an extension based on SIP will likely be developed for network interconnection where two or more IPCablecom networks (not in each others vicinity) ...
10895ddc70d25bd7d9a9a43d788761d5
102 129
5 Conclusions
The present document was initially addressing convergence between TIPHON and IPCablecom. It became apparent that convergence was a formidable task, hence its scope was changed to interworking scenarios between TIPHON and IPCablecom networks. Additionally, it was decided that the material produced during the initial pha...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
1 Scope
The present document provides, initially, a theoretical overview of how point-to-point systems that use SFRC could improve the link capacity and/or system gain, or could focus power in different directions or cover an area. Focus is put on LOS links. In general these different results may "compete" with one another and...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
2 References
4f7834675cbb2bc6f0267bc4888c3a84
102 311
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks in...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
3 Definitions, symbols and abbreviations
4f7834675cbb2bc6f0267bc4888c3a84
102 311
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: Eigenvalue (λ2): Eigenvalues of the matrix H × HH are the root of the characteristic equation: 0 ) det( 2 = − × I H H H λ expectation (EH): weighted average value of a Random Variable over all possible realizations that the Random Vari...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
3.2 Symbols
For the purposes of the present document, the following symbols apply: α Transmission Power Weight (for Water Filling/Pouring) A Free Space Loss and Fading Attenuation Effects Matrix argmin(.) Argument which minimize the brackets content B Bandwidth C Capacity [bit/s/Hz] dB decibel dBc decibel relative to mean carrier ...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: AWGN Added White Gaussian Noise BER Bit Error Ratio BLAST Bell Laboratories Layered Space Time C/N Carrier to Noise CCDP Co-Channel Dual Polarization CEPT Comité Européen des Postes et Télécommunications CS Channel Separation ETSI ETSI TR 102 ...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4 Overview
4.1 Capacity improvement of the MIMO system (Spatial Multiplexing) For an N × N MIMO systems the "Spatial Multiplexing" refers to the promising Capacity improvement. Basically, "N" independent orthogonal sub-channels, are provided on the same communication channel (CS), then the SISO maximal achievable spectral efficie...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3 Methods to achieve spatial frequency reuse
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.1 Spatial configuration
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.1.1 MIMO channel with spatial configuration
Figure 4.3.1.1 describes a typical communication channel with spatial configuration which also stands for spatial frequency reuse applications. In the example three antennas are considered either in transmission and receiver sides, thus it can be defined as a 3 × 3 MIMO system. The dotted lines in figure 4.3.1.1 repres...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.1.2 MIMO System Model
In figure 4.3.1.2 it is depicted a MIMO System Model block diagram. The meaning of the symbols follows: X = TX symbol vector xj = j-th input signal at j-th transmit antenna R = received signal vector ri = i-th received signal at i-th receive antenna Y = RX estimated symbol vector yi = i-th output signal at i-th receive...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.2 Spatial frequency reuse based on rich scattering
This method of achieving orthogonality is valid when the link path has considerable amount of multipath scattering caused by reflections and diffractions on obstacles. This scenario is common in the lower frequency, usually below 6 GHz, where often application scenarios do not present direct line of sight connections. ...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.3 Spatial frequency reuse based on link geometry
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.3.1 Channel matrix pure line of sight case
Consider a MIMO system with N transmit antennas and M receive antennas. Figure 4.3.3.1a describes the case of M = N = 2 antennas at TX and RX sides where the antenna arrays are formed by parallel and equally spaced elements. The path length difference between adjacent receive antennas (ΔR) is: [ ] m 2 2 2 R d R d R R ≅...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.3.2 Maximal orthogonal condition and optimal antenna spacing
In the channel matrix the columns correspond to the sub-channels from transmit antenna to all receive antenna, thus the mutual correlation calculated between the channel matrix columns correspond to the degree of "orthogonality" between the MIMO sub-channels. It is proofed by theory that the correlation is proportional...
4f7834675cbb2bc6f0267bc4888c3a84
102 311
4.3.3.3 Spatial diversity gain
In general MIMO system can achieve both separation of independent input signals, that share the same frequency, and Spatial Diversity Gain (SDG) to the receiver over Single Input Single Output system (SISO), this gain is inherent to the system due to the antenna plurality. The SDG value can easily be computed from the ...