576 research outputs found

    Interference Localization for Uplink OFDMA Systems in Presence of CFOs

    Full text link
    Multiple carrier frequency offsets (CFOs) present in the uplink of orthogonal frequency division multiple access (OFDMA) systems adversely affect subcarrier orthogonality and impose a serious performance loss. In this paper, we propose the application of time domain receiver windowing to concentrate the leakage caused by CFOs to a few adjacent subcarriers with almost no additional computational complexity. This allows us to approximate the interference matrix with a quasi-banded matrix by neglecting small elements outside a certain band which enables robust and computationally efficient signal detection. The proposed CFO compensation technique is applicable to all types of subcarrier assignment techniques. Simulation results show that the quasi-banded approximation of the interference matrix is accurate enough to provide almost the same bit error rate performance as that of the optimal solution. The excellent performance of our proposed method is also proven through running an experiment using our FPGA-based system setup.Comment: Accepted in IEEE WCNC 201

    Narrowband Interference Suppression in Wireless OFDM Systems

    Full text link
    Signal distortions in communication systems occur between the transmitter and the receiver; these distortions normally cause bit errors at the receiver. In addition interference by other signals may add to the deterioration in performance of the communication link. In order to achieve reliable communication, the effects of the communication channel distortion and interfering signals must be reduced using different techniques. The aim of this paper is to introduce the fundamentals of Orthogonal Frequency Division Multiplexing (OFDM) and Orthogonal Frequency Division Multiple Access (OFDMA), to review and examine the effects of interference in a digital data communication link and to explore methods for mitigating or compensating for these effects

    Vulnerability of LTE to Hostile Interference

    Full text link
    LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we need it. Unfortunately, like any wireless technology, disruption through radio jamming is possible. This paper investigates the extent to which LTE is vulnerable to intentional jamming, by analyzing the components of the LTE downlink and uplink signals. The LTE physical layer consists of several physical channels and signals, most of which are vital to the operation of the link. By taking into account the density of these physical channels and signals with respect to the entire frame, as well as the modulation and coding schemes involved, we come up with a series of vulnerability metrics in the form of jammer to signal ratios. The ``weakest links'' of the LTE signals are then identified, and used to establish the overall vulnerability of LTE to hostile interference.Comment: 4 pages, see below for citation. M. Lichtman, J. Reed, M. Norton, T. Clancy, "Vulnerability of LTE to Hostile Interference'', IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 201

    IMPLEMENTATION AND PERFORMANCE ANALYSIS OF LONG TERM EVOLUTION USING SOFTWARE DEFINED RADIO

    Get PDF
    The overwhelming changes in the field of communication brought about need for high data rates, which led to the development of a system known as Long Term Evolution (LTE). LTE made good use of Orthogonal Frequency Division Multiplexing Access (OFDMA) in its downlink and Single Carrier Frequency Division Multiplexing Access (SCFDMA) in its uplink transmission because of their robust performance. These multiple access techniques are the major focus of study in this thesis, with their implementation in the LTE system. GNU Radio is a software Defined Radio (SDR) platform. It comprises of C++ signal processing libraries. For user simplicity, it has graphical user interface (GUI) known as GNU Radio Companion (GRC), to build a signal processing flow graph. GRC translates any specific task flow graph to a python program which calls inbuiltC++ signal processing blocks. By leveraging this feature and existing modules in GRC, OFDMA and SCFDMA is implemented. In this study we made use of existing OFDMA flow graph of GNU Radio to study the behavior of downlink and general performing SCFDMA system was implemented with some modifications of the existing GNU Radio blocks. With the GNU Radio implementation, we tested the working mechanism of both the systems. OFDMA is used in downlink for achieving high spectral efficiency and SCFDMA was introduced in uplink due to its low PAPR feature. These multiple access schemes have to meet the requirement of high throughput with low BER and PAPR, low delays and low complexity. In this thesis we are focused on evaluating these multiple access techniques in terms of BER and PAPR with modulation techniques like QPSK, 16-QAM and 64-QAM. Performance analysis part is performed in MATLAB

    Survey on wireless technology trade-offs for the industrial internet of things

    Get PDF
    Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment
    • …
    corecore