skip to main content
research-article

802.11 with multiple antennas for dummies

Published: 07 January 2010 Publication History

Abstract

The use of multiple antennas and MIMO techniques based on them is the key feature of 802.11n equipment that sets it apart from earlier 802.11a/g equipment. It is responsible for superior performance, reliability and range. In this tutorial, we provide a brief introduction to multiple antenna techniques. We describe the two main classes of those techniques, spatial diversity and spatial multiplexing. To ground our discussion, we explain how they work in 802.11n NICs in practice.

References

[1]
IEEE Std. 802.11n-2009: Enhancements for higher throughput. http://www.ieee802.org, 2009.
[2]
G.J. Foschini and M.J. Gans. On limits of wireless communications in a fading environment when using multiple antennas. Wireless Personal Communications, 6:311--335, 1998.
[3]
A. Goldsmith. Wireless Communications. Cambridge University Press, 2005.
[4]
G. Judd, X. Wang, and P. Steenkiste. Efficient channel-aware rate adaptation in dynamic environments. In ACM MobiSys, pages 118--131, 2008.
[5]
C. Oestges and B. Clerckx. MIMO Wireless Communications: From Real-World Propagation to Space-Time Code Design. Academic Press, 2007.
[6]
Y. Palaskas, A. Ravi, S. Pellerano, and S. Sandhu. Design Consideration for Integrated MIMO Radio Transceivers. In K. Iniewski, editor, Wireless Technologies: Circuits, Systems, and Devices, chapter 4. Taylor & Francis, Inc, 2007.
[7]
E. Telatar. Capacity of multi-antenna Gaussian channels. European Trans. Telecommunications, 10(6):585--595, 1999.
[8]
D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, 2005.
[9]
L. Zheng and D. Tse. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Trans. Information Theory, 49(5):1073--1096, May 2003.

Cited By

View all
  • (2024)Time to Think the Security of WiFi-Based Behavior Recognition SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326132821:1(449-462)Online publication date: 1-Jan-2024
  • (2023)Behavior Privacy Preserving in RF SensingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314388020:1(784-796)Online publication date: 1-Jan-2023
  • (2023)Maximum Exposure Evaluation for MIMO Based on Optimization AlgorithmJournal of Physics: Conference Series10.1088/1742-6596/2537/1/0120192537:1(012019)Online publication date: 1-Jun-2023
  • Show More Cited By

Index Terms

  1. 802.11 with multiple antennas for dummies

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 40, Issue 1
    January 2010
    128 pages
    ISSN:0146-4833
    DOI:10.1145/1672308
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 January 2010
    Published in SIGCOMM-CCR Volume 40, Issue 1

    Check for updates

    Author Tags

    1. 802.11n
    2. mimo
    3. multiple antennas

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)46
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 11 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Time to Think the Security of WiFi-Based Behavior Recognition SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326132821:1(449-462)Online publication date: 1-Jan-2024
    • (2023)Behavior Privacy Preserving in RF SensingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314388020:1(784-796)Online publication date: 1-Jan-2023
    • (2023)Maximum Exposure Evaluation for MIMO Based on Optimization AlgorithmJournal of Physics: Conference Series10.1088/1742-6596/2537/1/0120192537:1(012019)Online publication date: 1-Jun-2023
    • (2022)A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and ControlInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201807010810:3(1-19)Online publication date: 8-Jul-2022
    • (2022)Monitoring of neck activity for early warning of cervical spondylosisMathematical Biosciences and Engineering10.3934/mbe.202203619:1(792-811)Online publication date: 2022
    • (2022)Indoor Safety Monitoring for Falls or Restricted Areas Using Wi-Fi Channel State Information and Deep Learning Methods in Mega Building Construction ProjectsSustainability10.3390/su14221503414:22(15034)Online publication date: 14-Nov-2022
    • (2022)Indoor Human Fall Detection Algorithm Based on Wireless SensingTsinghua Science and Technology10.26599/TST.2022.901001127:6(1002-1015)Online publication date: Dec-2022
    • (2022)Physical-World Attack towards WiFi-based Behavior RecognitionIEEE INFOCOM 2022 - IEEE Conference on Computer Communications10.1109/INFOCOM48880.2022.9796920(400-409)Online publication date: 2-May-2022
    • (2022)A Novel WiFi-Based Personnel Behavior Sensing With a Deep Learning MethodIEEE Access10.1109/ACCESS.2022.322238110(120136-120145)Online publication date: 2022
    • (2022)A Passive Indoor Population Detection Method Based on WiFi Channel Status Information2022 6th Asian Conference on Artificial Intelligence Technology (ACAIT)10.1109/ACAIT56212.2022.10137856(1-6)Online publication date: 9-Dec-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media