Long Term Evaluation (LTE) Research Papers (original) (raw)
Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating... more
Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.
In this paper, we propose to improve the performance of the channel estimation for LTE Downlink systems under the effect of the channel length. As LTE Downlink system is a MIMO-OFDMA based system, a cyclic prefix (CP) is inserted at the... more
In this paper, we propose to improve the performance of the channel estimation for LTE Downlink systems under the effect of the channel length. As LTE Downlink system is a MIMO-OFDMA based system, a cyclic prefix (CP) is inserted at the beginning of each transmitted OFDM symbol in order to mitigate both inter-carrier interference (ICI) and inter-symbol interference (ISI). The inserted CP is usually equal to or longer than the channel length. However, the cyclic prefix can be shorter because of some unforeseen channel behaviour. Previous works have shown that in the case where the cyclic prefix is equal to or longer than the channel length, LMMSE performs better than LSE but at the cost of computational complexity .In the other case, LMMSE performs also better than LS only for low SNR values. However, LS shows better performance for LTE Downlink systems for high SNR values. Therefore, we propose a hybrid LS-LMMSE channel estimation technique robust to the channel length effect. MATLAB Monte –Carlo simulations are used to evaluate the performance of the proposed estimator in terms of Mean Square Error (MSE) and Bit Error Rate (BER) for 2x2 LTE Downlink systems.
As the spectrum for wireless transmission gets crowded due to the increase in the users and applications, the efficient use of the spectrum is a major challenge in today's world. A major affecting factor is the inefficient usage of the... more
As the spectrum for wireless transmission gets crowded due to the increase in the users and applications, the efficient use of the spectrum is a major challenge in today's world. A major affecting factor is the inefficient usage of the frequency bands. Interference in the neighboring cells affects the reuse of the frequency bands. In this paper, some of the quality of service parameters such as residual bandwidth, number of users, duration of calls, frequency of calls and priority are considered. This paper presents work based on the optimization of dynamic channel allocation using genetic algorithm (GA). This attempts to allocate the channel to users such that overall congestion in the network is minimized by reusing already allocated frequencies. The working of Genetic Algorithm which is used in the optimization procedure is also explained. The optimized channel is then compared with a non-optimized channel to check the efficiency of the genetic algorithm.
One of the major challenges for Machine-to-Machine (M2M) paradigm is the capability to scale to a larger number of connected devices and to provide ultra-low delay communications in order to meet future Internet of Things (IoT)... more
One of the major challenges for Machine-to-Machine (M2M) paradigm is the capability to scale to a larger number of connected devices and to provide ultra-low delay communications in order to meet future Internet of Things (IoT) requirements. In this paper, we study the performance of LTE-M protocol in terms of delay, throughput and bandwidth utilization. Next, we propose a novel scheduling mechanism for LTE-M protocol to support M2M communications. The ultimate goal is to optimally allocate the resource blocks to different users in a more efficient manner in order to maximize the usage of the available bandwidth and reduce communications delay.
As the network convergence with services for both static and mobile networks has been the principal object of the next generation networks, the recent research focus is converging in the direction of standardizing common infrastructure... more
As the network convergence with services for both static and mobile networks has been the principal object of the next generation networks, the recent research focus is converging in the direction of standardizing common infrastructure based on all-IP networks. IMS is a recent initiative. Moreover, designing and deploying a standard QoS provisioning mechanisms in large networks is not a trivial matter. IPTV services are considered between the important IMS flow, the actual QoS management mechanisms proposed by 3GPP allow providing the IMS network components control and efficient service delivery, however the 3GPP approach focuses entirely on the step of providing the service, but there is no mechanism for monitoring Qos dynamically. This paper discusses the issues, design and analysis related to on demand dynamic QoS control in these next generation networks and fuss both Quality of Service (QoS) information signaling and IPTV traffic engineering options that may serve as key components of IPTV service specific QoS policies, which are designed to accommodate with customer requirements and resource availability by using the eTOM process to monitor the Qos values and to propose optimal solution to provide the quality of delivered content. The eTOM process interact with implemented marking entities which execute an algorithm to marking IPTV packets, this cooperation must improve the quality of service of the IPTV traffic.
Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management... more
Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management architectures are required to tackle issues regarding: media content, subscriber reachability and subscriptions information coming from different types of networks in order to enable well organized communications among different environments such as: IMS, IPTv and subscribers management repositories. This paper describes the work of Eureka Mobicome project on the definition of an architecture to manage and provide services among distinct service delivery platforms (IPTV and ENUM) using IMS as a common core and proposes a compound modular architecture to set the basis for Future Internet converging service provision. The proposed architecture has been validated by the Interconnection of different prototypes deployed at Madrid (Spain) and Oslo (Norway).
A Vehicular Ad hoc Network (VANET) is a most popular application of Mobile Ad hoc Networks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, we examine... more
A Vehicular Ad hoc Network (VANET) is a most popular application of Mobile Ad hoc Networks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, we examine the significance of Greedy Forwarding with Border Node based approach for VANETs. We propose a position based routing protocol to forward packet to the border nodes of the forwarding nodeas the next-hop node. This protocol is called Border Node based Greedy Forwarding (BNGF) since it uses border nodes with greedy forwarding. We categorize BNGF as BNGF-H for highway and BNGF-C for city traffic scenario. We have simulated this protocol using NS-2 simulator and evaluated the performance in terms of end-to-end delay and packet delivery ratio. We have compared both the methods for highway and city traffic scenarios. The results clearly show that the end-to-end delay for BNGF-C is significantly lower and packet delivery ratio is higher than BNGF-H.
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a... more
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate... more
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.