CCK Modulation: Beyond Wi-Fi

被引:0
|
作者
Pursley, Michael B. [1 ]
Royster, Thomas C. [1 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Complementary code key; error-control coding; IEEE; 802.11b; Wi-Fi;
D O I
10.1109/LCOMM.2009.080740
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The full-rate IEEE 802.11b standard for wireless local area networks, also known as Wi-Fi, employs 256-ary complementary code keying (CCK). For applications that do not require adherence to the standard, it may be desirable to use forward error correction coding with CCK, but the bit-to-symbol mappings used in IEEE 802.11b degrade the performance of most standard binary codes. We show that a standard binary convolutional code performs much better with alternative bit mappings, and we demonstrate that chip scrambling gives additional improvement.
引用
收藏
页码:31 / 33
页数:3
相关论文
共 50 条
  • [1] Beyond The Wi-Fi Era
    Amin, Osama
    Dang, Shuping
    Abdelhady, Amr M.
    Ma, Guoqing
    Ye, Jia
    Alouini, Mohamed-Slim
    Shihada, Basem
    [J]. FRONTIERS IN COMMUNICATIONS AND NETWORKS, 2024, 5
  • [2] Wireless beyond mobile and wi-fi
    [J]. Smith, Ed, 1600, Institute of Telecommunications Professionals (14):
  • [4] Future Directions for Wi-Fi 8 and Beyond
    Reshef, Ehud
    Cordeiro, Carlos
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (10) : 50 - 55
  • [5] Wi-Fi
    李景色
    [J]. 今日科苑, 2013, (07) : 56 - 58
  • [6] To Wi-Fi or not to
    Scalise, D
    [J]. HOSPITALS & HEALTH NETWORKS, 2005, 79 (12): : 26 - 26
  • [8] Wi-Fi
    Rikitianskaia, Maria
    [J]. INTERNET HISTORIES, 2022, 6 (03): : 343 - 344
  • [9] Wi-Fi
    Anon
    [J]. Database and Network Journal, 2006, 36 (01): : 16 - 18
  • [10] Surveying Wi-Fi security - Presentation of Wi-Fi security measures, varius Wi-Fi attacks and a classification survey of Wi-Fi Networks in Thessaloniki
    Violettas, George E.
    Theodoroy, Tryfon L.
    Chalkias, Konstantinos
    Stephanides, George
    [J]. WINSYS 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2008, : 96 - 101