Skip to main content

Raytracing in Modern Wireless Communication

 

Why is Raytracing gaining traction in higher frequency band communications?

Many research papers are now focusing on the ray-tracing method to provide communication between transmitter and receiver. To deploy the ray-tracing method, researchers are primarily focusing on higher frequency bands, such as Sub-6 GHz bands, UWB, or millimeter wave, among others. The main reason for this motivation is that we know that as frequency increases, wavelength decreases. We know that when a wavelength is very short, it is more easily reflected or refracted by surfaces such as a building wall, foliage, and so on. Furthermore, if we use the Sub 6 GHz band or millimeter wave, we will encounter a great deal of reflection and refraction from obstacles. On the other hand, in the context of reflection and refraction from obstacles' surfaces, we can say those frequency bands act as rays.

As we know from optics, when a light wave strikes an even plane, it is reflected with the same angle as the incidence angle. If the surface is slightly uneven, wave refraction along reflection occurs. If the surface is slightly uneven, refraction will win out over reflection. Another reason is that light waves have very short ranges in the hundreds of nanometers.

The same logic applies to higher frequency bands. Building walls, foliage, and other obstacles with reflective surfaces are usually even. Even if it is a little rough, keep in mind that the wavelengths of the above-mentioned bands are easily reflected due to their very short wavelength. And function as a light ray.

How does the raytracing model work?

The raytracing model is based on fundamental electromagnetic principles, fresnel coefficient, and farmat’s law. Fresnel coefficients basically tell us how much signal will be transmitted or reflected when transmitted signal bounces off walls of building or any obstacle. For example, for N number of walls, there are N-first order reflections, N(N-1) second order reflections, N(N-1)(N-2) third order reflections, and so on. MPCs due to LOS and reflective path arrives in receiver with different frequency or time delay, which is usually denoted as taps or nodes. From this we can calculate path length, then pathloss and received power. According to Fermat's theorem, a ray follows the direction that takes the least amount of time and occurs when the angle of incidence is identical to the angle of reflection or propagation. 

Why is it gaining popularity? 

It is gaining popularity because it adheres to fundamental electromagnetic theories such as the basic reflection rule, the two-ray reflection method, and so on. Furthermore, wave guide technology assists us in determining whether to emit electric fields vertically or horizontally. Raytracing is a straightforward process.

It can be extremely useful in indoor or UMi scenarios. Here, we can estimate the channel, determine the appropriate AoA and AoD for real-time tracking, and so on. It is a less expensive and less time-consuming method.

Also Read
UWB | Millimeter wave band | 5G | Difference Between Indoor and Outdoor Wireless Communication

People are good at skipping over material they already know!

View Related Topics to







Contact Us

Name

Email *

Message *

Popular Posts

BER vs SNR for M-ary QAM, M-ary PSK, QPSK, BPSK, ...(MATLAB Code + Simulator)

📘 Overview of BER and SNR 🧮 Online Simulator for BER calculation 🧮 MATLAB Code for BER calculation 📚 Further Reading 📂 View Other Topics on M-ary QAM, M-ary PSK, QPSK ... 🧮 Online Simulator for Constellation Diagram of m-ary QAM 🧮 Online Simulator for Constellation Diagram of m-ary PSK 🧮 MATLAB Code for BER calculation of ASK, FSK, and PSK 🧮 MATLAB Code for BER calculation of Alamouti Scheme 🧮 Different approaches to calculate BER vs SNR What is Bit Error Rate (BER)? The abbreviation BER stands for Bit Error Rate, which indicates how many corrupted bits are received compared to the total number of bits sent. BER = (number of bits received in error) / (total number of transmitted bits) What is Signal-to-Noise Ratio (SNR)? SNR is the ratio of signal power to noise powe...

Comparing Baseband and Passband Implementations of m-ary QAM

  Let's assume your original digital message bitstream is: 0, 0, 1, 0, 0, 0, 1, 0, 1, 1 In 4-QAM, we group them into pairs: (00), (10), (00), (10), (11). Your baseband symbols are: Symbol 1 (Bits 00): -1.00 - j1.00 Symbol 2 (Bits 10): 1.00 - j1.00 Symbol 3 (Bits 00): -1.00 - j1.00 Symbol 4 (Bits 10): 1.00 - j1.00 Symbol 5 (Bits 11): 1.00 + j1.00   To transmit these symbols over a wireless medium, we modulate this baseband signal onto a high-frequency carrier (e.g., 50 Hz). This process creates the passband signal , where the information is stored in the phase and amplitude of the sine wave. Fig 1: 4-QAM Baseband I and Q Components Fig 2: 4-QAM Passband Modulated Signal   In this example, the symbol rate is 5 symbols per second. Detailed Explanation 4-QAM Constellation Mapping In standard 4-QAM mapping, bits are converted to complex points on a grid: Bits...

Comparing Baseband and Passband Implementations of ASK, FSK, and PSK

📘 Overview 🧮 Baseband and Passband Implementations of ASK, FSK, and PSK 🧮 Difference betwen baseband and passband 📚 Further Reading 📂 Other Topics on Baseband and Passband ... 🧮 Baseband modulation techniques 🧮 Passband modulation techniques   Baseband modulation techniques are methods used to encode information signals onto a baseband signal (a signal with frequencies close to zero). Passband techniques shift these signals to higher carrier frequencies for transmission. Here are the common implementations: Amplitude Shift Keying (ASK) [↗] : In ASK, the amplitude of the signal is varied to represent different symbols. Binary ASK (BASK) is a common implementation where two different amplitudes represent binary values (0 and 1). ASK is simple but susceptible to noise. ASK Baseband (Digital Bits) ASK Passband (Modulated Carrier)     Fig 1:  ASK Passband Modulation (...

Shannon Limit Explained: Negative SNR, Eb/No and Channel Capacity

Understanding Negative SNR and the Shannon Limit Understanding Negative SNR and the Shannon Limit An explanation of Signal-to-Noise Ratio (SNR), its behavior in decibels, and how Shannon's theorem defines the ultimate communication limit. Signal-to-Noise Ratio in Shannon’s Equation In Shannon's equation, the Signal-to-Noise Ratio (SNR) is defined as the signal power divided by the noise power: SNR = S / N Since both signal power and noise power are physical quantities, neither can be negative. Therefore, the SNR itself is always a positive number. However, engineers often express SNR in decibels: SNR(dB) When SNR = 1, the logarithmic value becomes: SNR(dB) = 0 When the noise power exceeds the signal power (SNR < 1), the decibel representation becomes negative. Behavior of Shannon's Capacity Equation Shannon’s channel capacity formula is: C = B log₂(1 + SNR) For SNR = 0: log₂(1 + SNR) = 0 When SNR becomes smaller (in...

Amplitude, Frequency, and Phase Modulation Techniques (AM, FM, and PM)

📘 Overview 🧮 Amplitude Modulation (AM) 🧮 Online Amplitude Modulation Simulator 🧮 MATLAB Code for AM 🧮 Q & A and Summary 📚 Further Reading Amplitude Modulation (AM): The carrier signal's amplitude varies linearly with the amplitude of the message signal. An AM wave may thus be described, in the most general form, as a function of time as follows: When performing amplitude modulation (AM) with a carrier frequency of 100 Hz and a message frequency of 10 Hz, the resulting peak frequencies are as follows: 90 Hz (100 - 10 Hz), 100 Hz, and 110 Hz (100 + 10 Hz). Figure: Frequency Spectrums of AM Signal (Lower Sideband, Carrier, and Upper Sideband) A low-frequency message signal is modulated with a high-frequency carrier wave using a local oscillator to make communication possible. DSB, SSB, and VSB are common amplitude modulation techniques. We find a lot of bandwidth loss in DSB. The bandwidth of S...

Analog vs Digital Modulation Techniques | Advantages of Digital ...

Modulation Techniques Analog vs Digital Modulation In our previous discussion, we explored the necessity of modulation. In this article, we focus on the fundamental differences between analog and digital modulation. The primary distinction is that digital modulation uses a discrete digital signal to modify the carrier, whereas analog modulation uses a continuous analog signal. Advantages of Digital Modulation over Analog Modulation Bandwidth Efficiency: Digital techniques (like QAM) can transmit more data within a limited frequency range. Noise Resistance: Digital signals have superior resistance to noise because they can be perfectly regenerated. Multiplexing: It is much easier to multiplex various data types (audio, video, text) into a single digital stream. Higher SNR: Better noise immunity leads to a higher Signal-to-Noise Ratio (SNR). Increased Throughput: Modern digital techniques provide significantly higher data ...

Online Simulator for ASK, FSK, and PSK

Try our new Digital Signal Processing Simulator!   Start Simulator for binary ASK Modulation Message Bits (e.g. 1,0,1,0) Carrier Frequency (Hz) Sampling Frequency (Hz) Run Simulation Simulator for binary FSK Modulation Input Bits (e.g. 1,0,1,0) Freq for '1' (Hz) Freq for '0' (Hz) Sampling Rate (Hz) Visualize FSK Signal Simulator for BPSK Modulation ...

ASK, FSK, and PSK (with MATLAB + Online Simulator)

📘 Overview 📘 Amplitude Shift Keying (ASK) 📘 Frequency Shift Keying (FSK) 📘 Phase Shift Keying (PSK) 📘 Which of the modulation techniques—ASK, FSK, or PSK—can achieve higher bit rates? 🧮 MATLAB Codes 📘 Simulator for binary ASK, FSK, and PSK Modulation 📚 Further Reading ASK or OFF ON Keying ASK is a simple (less complex) Digital Modulation Scheme where we vary the modulation signal's amplitude or voltage by the message signal's amplitude or voltage. We select two levels (two different voltage levels) for transmitting modulated message signals. For example, "+5 Volt" (upper level) and "0 Volt" (lower level). To transmit binary bit "1", the transmitter sends "+5 Volts", and for bit "0", it sends no power. The receiver uses filters to detect whether a binary "1" or "0" was transmitted. ...