hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 4 Executive summary | The following document describes the characteristics of the system and its benefits to the European community. The ASAP system is designed to provide economical benefits by shortening the delivery time of large and expensive freights such as containers, efficient distribution of produced cars etc. On top, the system pr... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5 Detailed information on various aspects | |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.1 Estimated number of FHSS transmissions (worst condition) | The number of containers and other large assets that are on the road is estimated at 20 000 000. These assets are dispersed all over Europe. The geographical area of Europe is 10 360 000 square km. Therefore; there are on average 2 end units per square km, provided that all potential assets are equipped with ASAP end u... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.2 Estimated interference | The transmission of ASAP end units produces extremely low out-of-band energy. On the other hand the system is highly non susceptible to other transmissions interference. The very sparse transmissions guarantee the ability of other systems to coexist with the ASAP system. |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.3 Limitation of the duty cycle of the end units | The end-units connected to the assets are programmed to transmit twice a day unless a rare occurrence happens which requires tracking of a specific end-unit. |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.4 Polling transmitter | No additional high power paging transmitters are required. asap technology does exploit the existing paging networks. |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.5 The economic benefits | ASAP is addressing the problem of freight transportation across Europe. Freight often travels on multi modal transportation, mainly to reduce transportation prices, especially these days where the demand of higher usage of trains and other low pollution means of transportation is on the rise. Therefore an efficient fre... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.6 Social benefit | In addition to the economic benefit, introduction of this technology will contribute to the quality of life by: • Improvements in the employment situation by shortening the time to deliver of assets. • Improvements in the quality of life, health and safety of European citizens by monitoring spill or leakage of dangerou... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.7 Spectrum requirement and justification | The Strategic Plan for the 862 MHz to 868 MHz proposed by the SRD MG and approved by WG FM offers the opportunity for introduction of the FHSS technology: "The frequency band 863 MHz to 870 MHz should be considered for non-specific spread spectrum SRD applications by using Direct Sequence Spread Spectrum (DSSS) and/or ... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.8 Technical Issues | Market information & Contribution to community social objectives: see annex A Technical information: see annex B Expected Compatibility studies: see annex C |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 5.9 Current Regulation - Region 1 and CEPT allocation | RR Region 1 Allocation and RR footnotes relevant to CEPT and frequency band European Common Allocation Utilization EU footnote ECC/ERC document Standard Note Cordless Telephones ERC DEC (01) 02 To be phased out in accordance with ERC Decisions (01) 02 Defence systems Radio microphones ERC REC 70- 03 EN 300 422 EN 301 3... |
db710b0c0bfc6540cdea67146fb6ed72 | 102 134 | 6 Main conclusions | The UHF band 865 MHz to 868 MHz could meet market requirements by allowing low duty cycle FHSS systems to operate providing co-existence with other SRD applications, enabling both economical & social benefits of ASAP system. Compatibility evaluations and studies for services are as listed in annex C. ETSI ETSI TR 102 1... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 2 References | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 2.1 Normative references | Normative references are not applicable in the present document. |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 3 Definition of terms, symbols and abbreviations | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 3.1 Terms | For the purposes of the present document, the following terms apply: apprenticeship: model of learning, in which knowledge is acquired in the process of performing apps: short for application software, which is a type of computer program that performs a specific personal, educational, and business function and where ea... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 3.2 Symbols | Void. |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: 3GPP 3rd Generation Partnership Project AD Advertisement AI Artificial Intelligence ANEC European Association for the Coordination of Consumer Representation in Standardisation ATM Automatic Teller Machine BECTA British Educational Communicati... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.0 Introduction | Children, as ICT users, are in most aspects differently abled than adults. Only if their abilities, needs and requirements are studied, understood and differentiated, can well-working, understandable and accessible ICT solutions be offered. Our challenge in providing guidance on designing for children is complex, becau... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.1 Key theories of child development | An overview of the key theories and characteristics of child development is provided in this clause in three main areas: • physical growth; • cognitive maturation; and • social development is discussed in chronological order. The focus is on the typical development of the normal child. Our selection criteria for the ap... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.0 Introduction | The embryological development is a progressive process of anatomical differentiation, which also applies to the development of behaviour. Some aspects of the orderly progression of development are determined by maturation, genetically pre-programmed, independent of specific environmental conditions (e.g. walking). Chil... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.1 0-2 years | Noteworthy characteristics of newborn children are their small size, different body proportions and need to associate with other people in order to survive. The rate of growth will initially be high to later slow considerably. Sex differences can be observed, with girls achieving more than half of their adult height by... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.2 2-5 years | The pre-school period begins. Breathing becomes slower and deeper and physical health improves. Motor patterns and skills -sequences of precise movements -and manipulation develop. The various motor and sensor control areas of the ETSI 15 ETSI TR 102 133 V2.1.1 (2025-07) brain start to correlate and work together. Visu... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.3 5-11 years | Between 5 to 12, middle childhood, children extend their abstract thinking ability to include concepts such as the past and future and begin to be able to have the ability to see things from the perspective of another person. During this time, they begin to mentalize (also called theory of mind) is the ability to expla... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.4 11-13 years | Children at this stage have entered a highly emotional space. They are just beginning to cope with hormonal changes brought about by the onset of puberty. They are also hitting a time when peers will have the most influence on them. They want to be poised and have self-control, but they are often clumsy and in conflict... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 4.2.5 13-18 years | The teenage years bring many changes, not only physically, but also mentally and socially. During these years, adolescents increase their ability to think abstractly and eventually make plans and set long-term goals. Each child may progress at a different pace and may have a different view of the world. In general, the... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.0 Introduction | In the following clause, the parameters of the use of technology that have implications for use by children will be systematically examined. In addition to developing a conceptual framework for future research, some specific issues of current interest will be emphasized. This is not a comprehensive list of issues, but,... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.1 Developmental mapping | The following three dimensions reflect individual traits and skills that develop as a result of genetically determined maturation and interaction with the environment. Each of these three dimensions is a composite of several developmental themes (some of them listed below), specifically selected in this context because... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.2 Location / Context | Children use technology in many different locations and for many different activities. This raises a wide variety of issues specific to the fact that children are the users. This clause will consider where the child will be using the technology, including the context of use. Examples of location and contexts that highl... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.3 Physical Characteristics | Children do not have the same characteristics as adults. Their skeletal and nervous systems are not mature; they do not have the strength or stamina that an adult would be expected to have. As they are maturing physically, they are vulnerable to damage from excessive use of or exposure to equipment that is not designed... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.4 Operating Characteristics | Not only should a child be able to physically operate an appropriate ICT system, but they should also be able to negotiate the basic operation of the system at the software level. Various parameters may influence the successful comprehension of the operation of the system, and the ability to execute the procedures nece... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.5 Services | Having ensured that the basic system is usable, it will be necessary to consider issues arising from the use of the system to access communication and information exchange services. A wide variety of issues may be involved, including: • opening and closing communication channels with the correct and appropriate communi... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6 Content | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6.0 Introduction | The following clause will focus on content on the Internet and mobile services. In order to identify issues requiring action, these areas will be considered jointly, as a convergence of technologies and the increasing prevalence of hybrid services have rapidly made the distinction between Internet and mobile telephony ... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6.1 Comprehension | Comprehension is a process that involves not only decoding messages, but also making additional inferences about meaning and, at more advanced levels, the explicit and covert intentions of the message source. Young children, e.g. pre-schoolers, are beginner readers who can encounter difficulties in mastering media lite... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6.2 Legal and ethical concerns | The characteristic Internet use patterns of children are difficult to measure. Entertainment is the primary attraction for children, but attempting to describe and document activity is like trying to hit a moving target [i.9]. Children mature, preferences change, technology advances and new knowledge bases emerge and s... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6.3 Marketing and Privacy | Children have growing personal spending power and influence over their parents' purchasing decisions [i.6]. It has been known for a while of the effectiveness of online marketing to children. Therefore, it is not surprising that from 1993 to 1996 advertising in child-oriented media increased more than 50 % and that in ... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.6.4 Approaches to controlling content | Content control may be divided into different basic categories: • blocklists; • category filters; • keyword filters; • monitoring use; and • separate "kids" domains. The Internet Content Rating Association (ICRA) is an international, independent organization that empowers the public, especially parents, to make informe... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 5.7 Applying the approach to a specific target group | It is beyond the scope of the present document to provide an exhaustive evaluation of every ICT service that children can be expected to encounter in their daily lives. Our intention has been, rather, to suggest an analytical framework within which such endeavours can be carried out at some future time. This clause ill... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7 Legalisation and Regulation | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.1 Introduction | This clause focuses on EU legalisation with how they impact children. These are points companies and service providers need to consider when they have users and/or customers who are children. While this clause will not look at national legalisation it is something companies have to be aware of their obligations under t... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.2 Legislation | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.2.1 Digital Services Act (DSA) | The DSA will make sure that all digital services that are used by consumers, especially the so-called Very Large Online Platforms (VLOP) and Very Large Online Search Engines (VLOS) do more to protect users' rights, keep users safe and stop the spread of illegal or inappropriate content [i.35]. The DSA covers different ... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.2.2 Artificial Intelligence Act | The EU AI Act gives explicit attention to children as a vulnerable category [i.36] and [i.37]. In Recital 28a clarifies explicitly that "children have specific rights as enshrined in Article 24 of the EU Charter and the United Nations Convention on the Rights of the Child (further elaborated in the UNCRC General Commen... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.2.3 European Cyber Resilience Act (CRA) | The Cyber Resilience Act (CRA) [i.56], is a piece of European Union legislation that governs the cybersecurity of products with digital elements distributed on its territory. It directly complements other legislative pieces such as the AI Act or the NIS2 Directive. The CRA officialises the responsibility of manufacture... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.3 Regulation | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.3.1 General Data Protection Regulation (GDPR) | The General Data Protection Regulation (Regulation (EU) 2016/679) [i.49], is a European Union regulation on information privacy in the EU and the European Economic Area (EEA). It also governs the transfer of personal data outside the EU and EEA. The GDPR's goals are to enhance individuals' control and rights over their... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 7.3.2 NIS2 Directive | The Directive (EU) 2022/2555 [i.50] on measures for a high common level of cybersecurity across the EU, known as NIS2, sets out a common cybersecurity regulatory framework aiming to enhance the level of cybersecurity in the European Union (EU), requiring EU Member States to strengthen cybersecurity capabilities and int... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8 Security, Data Protection and Privacy | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.1 Introduction | There is an abundance of material covering these topics in general [i.39]. This clause will focus on key points relevant to children. For example, this includes design considerations, education, and awareness which also includes teachers and parents. The provision of links to information resources. It should be noted t... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.2 Cybersecurity | Cybersecurity is just as critical for young people as adults. Though the risks and harms will differ. The common cybersecurity breaches that users may experience are: • Phishing - unsolicited emails and fraudulent messages that seek to trick the recipient into providing private information. • Malware is software that g... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.3 Data Protection | When the personal data of children is collected additional protection is as children are less aware of the risks and consequences of sharing data and of their rights [i.38]. Any information addressed specifically to a child should be adapted to be easily accessible, using clear and plain language. For most online servi... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4 Online Safety | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4.1 Overview | Ensuring children understand online safety is essential because many of them will be using a wide range of technologies in their home environments, even before they start school. Technology is becoming an integral part of children's lives; it entertains them, engages them and motivates them. Safety advice for younger c... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4.2 Parental Controls | Parental controls are designed to help protect children from inappropriate content online, such as pornography or other adult content. These controls can be used in a number of ways, e.g. to help ensure that your children access only age- appropriate content, to set usage times and to monitor activity. Four main places... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4.3 Report Button | Ideally, it is important that places online where people spend time together are safe and fun for everyone. This means everyone needs to follow the rules and be respectful to others. If something online worries, upsets or confuses a user they should be able to report this so an online safety team or moderator can inves... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4.4 Online Sextortion | Sextortion is a type of blackmail when someone threatens to share nudes, semi-nudes, sexual information, or videos of someone unless the victim pays money or agrees to do something else, such as share more images. Sextortion is a crime and can be committed by individuals or by a group of people working together. Crimin... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.4.5 Online Sexual Harassment | Online sexual harassment is any unwanted sexual behaviour that occurs online. It can happen on any online platform and could include content such as photos, videos, posts, web pages, messages or fake profiles. Even if the harassment was intended as a joke, or was a misunderstanding, it is the experience of the victim t... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 8.5 Online Privacy | Today, children are growing up in a digital world; being online and using digital services is an integral part of their lives where they learn, play and connect with others. However, the online world was not designed with children's needs in mind and, as a result, the potential for harm is ever-present. Children may be... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9 Conclusions and Recommendations | |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.1 Overview | Conclusions are based on reviews of relevant literature, surveys of media coverage of issues, stakeholder reports and published guidance from industry and academia. Specific recommendations have been highlighted in bold text below. This present document did not initiate laboratory studies or surveys of user groups. |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.2 Design Issues | • Children, as ICT users, are, in most respects, differently abled than their adult counterparts. Only if their abilities, needs, and requirements are studied, understood, and differentiated can well-working, understandable, and accessible ICT solutions be offered. • It is recommended that: - the analytical approach de... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.3 Market Issues | • A better understanding of the market for ICT products for children and its characteristics is needed. The market's transient nature makes it difficult to market relatively high-priced products to children and their parents. • It is recommended that: - regular studies of the market for ICT products for children should... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.4 Health and Safety Concerns | • Smartphones can pose several health and safety concerns for children, including: - Mental health: Excessive smartphone use can lead to anxiety, depression, and loneliness. Children are also vulnerable to cyberbullying, which can have detrimental effects on their mental health. - Sleep disturbances: The blue light emi... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.5 Security and Privacy Concerns | • Age verification mechanisms independent of identity are needed and are being developed in response to the EU Digital Services Act: - European standardization bodies and activities investigating and/or proposing identity verification schemes are determining the need for reliable age verification mechanisms that do not... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.6 User Interface Design Issues | • Help facilities, guidelines, manuals and documentation for children need to be better understood and produced. There are ETSI documents which guide user interface design issues: ETSI EG 203 499 [i.43] User-centred terminology for existing and upcoming ICT devices, services and applications; ETSI TR 103 852 [i.44] An ... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.7 General Accessibility Issues | In general ICT devices and services should comply with the European Accessibility Act, a directive that aims to improve the functioning of the internal market for accessible products and services by removing barriers created by divergent rules in Member States. These covered products and services include: • computers a... |
24af704f27937dcfe30029f8d80b1fba | 102 133 | 9.8 Proactive issues | The implications of anticipated future products and services need to be understood. Examples of such systems are communicating, social media networks, smart toys, image sharing (messaging apps and the internet), video sharing platforms and AI systems: • Technology and service development activities need to be monitored... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 1 Scope | The objective of ETSI Project TIPHON is the specification of interoperability mechanisms and related parameters to enable multimedia communications (particularly voice) to take place, to a defined quality of service, between Switched Circuit Networks (SCN) and Internet Protocol (IP) based networks and their associated ... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 2 References | For the purposes of this Technical Report (TR) the following references apply: [1] ITU-T Recommendation J.160: "Architectural framework for the delivery of time-critical services over cable television networks using cable modems". [2] ETSI TS 101 882 (V1.1.1): "Telecommunications and Internet Protocol Harmonization Ove... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 3 Definitions and abbreviations | |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: authentication header: IPSec security protocol that provides message integrity for complete IP packets, including the IP header Application-Specific Data: application-specific field in the IPSec header that along with the destination I... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: AN Access Node ANC ANnouncement Controller ANP ANnouncement Player ANS ANnouncement Server AOC Advice Of Charge API Application Programming Interface ETSI ETSI TR 102 129 V1.1.1 (2003-01) 11 ATM Asynchronous Transfer Mode BICC Bearer Independe... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4 Overview | The study was initially conducted to identify what was needed to be done for convergence between IPCablecom and TIPHON. However, it was recognized that this task was extremely ambitious, hence the present document describes an analysis of interworking between IPCablecom and TIPHON. Three interworking scenarios have bee... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.1 Interworking through SCN Interfaces | Both TIPHON and IPCablecom support an SCN interface for basic call. The signalling is done through ISUP whilst the media transfer is either PSTN or IP in the case of TIPHON and only PSTN for IPCablecom at this point in time. It is likely that IPCablecom will evolve to ISDN. This interworking assumes that TIPHON complet... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.2 Interworking through MGC interfaces | Both TIPHON and IPCablecom provide Media Gateway Control. However, until recently, IPCablecom is based on MGCP variations and TIPHON is based on H.248. Three interworking scenarios are considered and a proposed way forward is given. |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.2.1 Interworking through MGCP | This is the most controversial scenario from a TIPHON point of view and may not get any support from the TIPHON membership. However, this is of course the most popular way forward within IPCablecom community. This scenario which is recalled at least for completeness and to highlight the opportunities for ETSI and TIPHO... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.2.2 Interworking through H.248 | While this is the preferred TIPHON solution, it is still under discussion within the IPCablecom community. IPCablecom has now accepted, with a lot of reluctance, the implementation of H.248 as an option for the case of the Audio Server Protocol. It is assumed that once this conversion specified, elements of code could ... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.2.3 Interworking through MGCP to H.248 converter | In this case, it is assumed that the IPCablecom network provides the MGCP part and that TIPHON provides the mapping to H.248 meta-protocol. It is believed that the same implementation can do both protocols. The converter can: • either be provided by and within IPCablecom in which case we are back to the case of clause ... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 4.3 Interworking through SIP | In TIPHON, SIP is supported for setting up end-to-end sessions in the IP environment. Though IPCablecom is based on MGCP and its variants for the inner part of the network, an extension based on SIP will likely be developed for network interconnection where two or more IPCablecom networks (not in each others vicinity) ... |
10895ddc70d25bd7d9a9a43d788761d5 | 102 129 | 5 Conclusions | The present document was initially addressing convergence between TIPHON and IPCablecom. It became apparent that convergence was a formidable task, hence its scope was changed to interworking scenarios between TIPHON and IPCablecom networks. Additionally, it was decided that the material produced during the initial pha... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 1 Scope | The present document provides, initially, a theoretical overview of how point-to-point systems that use SFRC could improve the link capacity and/or system gain, or could focus power in different directions or cover an area. Focus is put on LOS links. In general these different results may "compete" with one another and... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 2 References | |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 2.1 Normative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks in... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 3 Definitions, symbols and abbreviations | |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: Eigenvalue (λ2): Eigenvalues of the matrix H × HH are the root of the characteristic equation: 0 ) det( 2 = − × I H H H λ expectation (EH): weighted average value of a Random Variable over all possible realizations that the Random Vari... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 3.2 Symbols | For the purposes of the present document, the following symbols apply: α Transmission Power Weight (for Water Filling/Pouring) A Free Space Loss and Fading Attenuation Effects Matrix argmin(.) Argument which minimize the brackets content B Bandwidth C Capacity [bit/s/Hz] dB decibel dBc decibel relative to mean carrier ... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: AWGN Added White Gaussian Noise BER Bit Error Ratio BLAST Bell Laboratories Layered Space Time C/N Carrier to Noise CCDP Co-Channel Dual Polarization CEPT Comité Européen des Postes et Télécommunications CS Channel Separation ETSI ETSI TR 102 ... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4 Overview | 4.1 Capacity improvement of the MIMO system (Spatial Multiplexing) For an N × N MIMO systems the "Spatial Multiplexing" refers to the promising Capacity improvement. Basically, "N" independent orthogonal sub-channels, are provided on the same communication channel (CS), then the SISO maximal achievable spectral efficie... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3 Methods to achieve spatial frequency reuse | |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.1 Spatial configuration | |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.1.1 MIMO channel with spatial configuration | Figure 4.3.1.1 describes a typical communication channel with spatial configuration which also stands for spatial frequency reuse applications. In the example three antennas are considered either in transmission and receiver sides, thus it can be defined as a 3 × 3 MIMO system. The dotted lines in figure 4.3.1.1 repres... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.1.2 MIMO System Model | In figure 4.3.1.2 it is depicted a MIMO System Model block diagram. The meaning of the symbols follows: X = TX symbol vector xj = j-th input signal at j-th transmit antenna R = received signal vector ri = i-th received signal at i-th receive antenna Y = RX estimated symbol vector yi = i-th output signal at i-th receive... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.2 Spatial frequency reuse based on rich scattering | This method of achieving orthogonality is valid when the link path has considerable amount of multipath scattering caused by reflections and diffractions on obstacles. This scenario is common in the lower frequency, usually below 6 GHz, where often application scenarios do not present direct line of sight connections. ... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.3 Spatial frequency reuse based on link geometry | |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.3.1 Channel matrix pure line of sight case | Consider a MIMO system with N transmit antennas and M receive antennas. Figure 4.3.3.1a describes the case of M = N = 2 antennas at TX and RX sides where the antenna arrays are formed by parallel and equally spaced elements. The path length difference between adjacent receive antennas (ΔR) is: [ ] m 2 2 2 R d R d R R ≅... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.3.2 Maximal orthogonal condition and optimal antenna spacing | In the channel matrix the columns correspond to the sub-channels from transmit antenna to all receive antenna, thus the mutual correlation calculated between the channel matrix columns correspond to the degree of "orthogonality" between the MIMO sub-channels. It is proofed by theory that the correlation is proportional... |
4f7834675cbb2bc6f0267bc4888c3a84 | 102 311 | 4.3.3.3 Spatial diversity gain | In general MIMO system can achieve both separation of independent input signals, that share the same frequency, and Spatial Diversity Gain (SDG) to the receiver over Single Input Single Output system (SISO), this gain is inherent to the system due to the antenna plurality. The SDG value can easily be computed from the ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.