1,565 research outputs found

    A selective control information detection scheme for OFDM receivers

    Get PDF
    In wireless communications, both control information and payload (user-data) are concurrently transmitted and required to be successfully recovered. This paper focuses on block-level detection, which is applicable for detecting transmitted control information, particularly when this information is selected or chosen from a finite set of information that are known at both transmitting and receiving devices. Using an orthogonal frequency division multiplexing architecture, this paper investigates and evaluates the performance of a time-domain decision criterion in comparison with a form of Maximum Likelihood (ML) estimation method. Unlike the ML method, the proposed time-domain detection technique requires no channel estimation as it uses the correlation (in the time-domain) that exists between the received and the transmitted selective information as a means of detection. In comparison with the ML method, results show that the proposed method offers improved detection performance, particularly when the control information consists of at least 16. However, the implementation of the proposed method requires a slightly increased number of mathematical computations

    Vulnerability of LTE to Hostile Interference

    Full text link
    LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we need it. Unfortunately, like any wireless technology, disruption through radio jamming is possible. This paper investigates the extent to which LTE is vulnerable to intentional jamming, by analyzing the components of the LTE downlink and uplink signals. The LTE physical layer consists of several physical channels and signals, most of which are vital to the operation of the link. By taking into account the density of these physical channels and signals with respect to the entire frame, as well as the modulation and coding schemes involved, we come up with a series of vulnerability metrics in the form of jammer to signal ratios. The ``weakest links'' of the LTE signals are then identified, and used to establish the overall vulnerability of LTE to hostile interference.Comment: 4 pages, see below for citation. M. Lichtman, J. Reed, M. Norton, T. Clancy, "Vulnerability of LTE to Hostile Interference'', IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 201

    Channel Estimation in Uplink of Long Term Evolution

    Get PDF
    Long Term Evolution is considered to be the fastest spreading communication standard in the world.To live up to the increasing demands of higher data rates day by day and higher multimedia services,the existing UMTS system was further upgraded to LTE.To meet their requirements novel technologies are employed in the downlink as well as uplink like Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier- Frequency Division Multiple Access (SC-FDMA).For the receiver to perform properly it should be able to recover athe transmittedadata accurately and this is done through channel estimation.Channel Estimation in LTE engages Coherent Detection where a prior knowledge of the channel is required,often known as Channel State Information (CSI).This thesis aims at studying the channel estimation methods used in LTE and evaluate their performance in various multipath models specified by ITU like Pedestrian and Vehicular.The most commonly used channel estimation algorithms are Least Squarea(LS) and Minimum MeanaSquare error (MMSE) algorithms.The performance of these estimators are evaluated in both uplink as well as Downlink in terms of the Bit Error Rate (BER).It was evaluated for OFDMA and then for SC-FDMA,further the performance was assessed in SC-FDMA at first without subcarrier Mapping and after that with subcarrier mapping schemes like Interleaved SC-FDMA (IFDMA) and Localized SC-FDMA (lFDMA).It was found from the results that the MMSE estimator performs better than the LS estimator in both the environments.And the IFDMA has a lower PAPR than LFDMA but LFDMA has a better BER performance

    SGD Frequency-Domain Space-Frequency Semiblind Multiuser Receiver with an Adaptive Optimal Mixing Parameter

    Get PDF
    A novel stochastic gradient descent frequency-domain (FD) space-frequency (SF) semiblind multiuser receiver with an adaptive optimal mixing parameter is proposed to improve performance of FD semiblind multiuser receivers with a fixed mixing parameters and reduces computational complexity of suboptimal FD semiblind multiuser receivers in SFBC downlink MIMO MC-CDMA systems where various numbers of users exist. The receiver exploits an adaptive mixing parameter to mix information ratio between the training-based mode and the blind-based mode. Analytical results prove that the optimal mixing parameter value relies on power and number of active loaded users existing in the system. Computer simulation results show that when the mixing parameter is adapted closely to the optimal mixing parameter value, the performance of the receiver outperforms existing FD SF adaptive step-size (AS) LMS semiblind based with a fixed mixing parameter and conventional FD SF AS-LMS training-based multiuser receivers in the MSE, SER and signal to interference plus noise ratio in both static and dynamic environments
    corecore