TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES

Citation Count – 12

A Vertical Handover Decision Approaches in Next Generation Wireless Networks: A Survey

 Harsha A. Bhute1 , Dr. P.P Karde2 , Dr. V.M. Thakare3

1 Department of Computer Engineering, Sinhgad College of Engineering, Pune, India

2 Department of Information Technology, Government Polytechnic, Professor, Amravati, India

3 Professor & Head, Department of Computer Science, SGBAU, Amravati University, Amravati, India

Abstract

In next generation wireless network the most desirable feature is its ability to move seamlessly over various access network regardless of the network infrastructure is used. The handover between these dissimilar networks can be explored by using vertical handover algorithms. This paper focuses on the vertical handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms which provide significant improvements in throughput but at a cost of higher delays. As per the need for the real time applications in next generation wireless networks there is a requirement of developing new optimized algorithms that are able to produce high throughput and minimizing signaling cost and delay.

Keywords

Vertical handover, QoS, mobile networks, next generation wireless networks.

For More Details:   https://wireilla.com/papers/ijmnct/V4N2/4214ijmnct04.pdf

Volume Link:  https://wireilla.com/ijmnct/vol4.html

References

[1] O. Ormond, G. Muntean and J. Murphy, “Network Selection Strategy in Heterogeneous Wireless Networks,” Proc. of IT&T 2005: Information Technology and Telecommunications, pp. 175-184, Cork, October 2005.

[2] L.-J. Chen, G. Yang, T. Sun, M.Y. Sanadidi, M. Gerla, “Enhancing QoS support for vertical handovers using implicit/explicit handover notifications,” In 2nd IEEE International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, pp. 8-37, 2005.

[3] Y.C. Chen, J.H. Hsia and Y.J. Liao, “Advanced seamless vertical handover architecture for WiMA and WiFi heterogeneous networks with QoS guarantees,” Computer Communications, Volume 32 Issue 2, February 2009, Pages 281-293.

[4] L. J. Chen et al, “A smart decision model for vertical handover,” In Proc. of the 4th International Workshop on Wireless Internet and Reconfigurability. (ANWIRE 2004), Athens, Greece, May 2004.

[5] A. H. Zahran, B. Liang, and A. Saleh, “Signal threshold adaptation for vertical handover in heterogeneous wireless networks,” Mobile Networks and Applications, vol. 11, no. 4, pp. 625-640, August 2006.

[6] I.F. Akyildiz, J. McNair, J.S.M. Ho, H. Uzunalioglu, W. Wang, “Mobility management in nextgeneration wireless systems,” Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, August 1999.

[7] F. Zhu and J. McNair, “Optimizations for vertical handover decision algorithms,” In Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 867–872, 2004.

[8] S. Balasubramaniam and J. Indulska, “Vertical handover supporting pervasive computing in future wireless networks,” Computer Communications, vol. 27, no. 8, pp. 708–719, 2004.

[9] H. Wang, R. Katz, J. Giese, “Policy-enabled handovers across heterogeneous wireless networks,” Second IEEE Workshop on Mobile Computing Systems and Applications, 1999 (Proceedings WMCSA’99), 1999, pp. 51-60.

[10] S. Quiqyang and A. Jamalipour, “A network selection mechanism for next generation networks,” In International Conference of Communications, 2005 (ICC 2005), vol. 2, 2005, pp. 1418–1422.

[11] W. Zhang, “Handover Decision Using Fuzzy MADM in heterogeneous networks,” In Proc. IEEE WCNC’05, New Or-leans, LA March 2005.

[12] Y. Nkansah-Gyekye and J. I. Agbinya, “Vertical handover between WWAN and WLAN,” ICNICONSMCL’06, 2006

[13] K. Pahlavan, P. Krishnamurthy, A. Hatami, M. Ylianttila, J. Makela, R. Pichna, and J. Vallstron, “Handover in hybrid mobile data networks,” IEEE Personal Communications, 7(2):34–47, 2000.

[14] L. Xia, L.-G. Jiang, and C. He, “A novel fuzzy logic vertical handover algorithm with aid of differential prediction and pre-decision method,” In Proceedings of the 2007 IEEE International Conference on Communications (ICC’07), pages 5665–5670, Glasgow, Scotland, June 2007.

[15] M.Kassar, B.Kervella, G.Pujolle, “An overview of vertical handover decision strategies in heterogeneous wireless networks,” Elsevier, Journal of computer communications, Vol.37, No.10, 2008.

[16] J.Y. Hwang, J. Oh and Y. Han, “A two-step vertical handover algorithm in heterogeneous traffic and systems,” In 66th IEEE Vehicular Technology Conference, 2007, pp. 1543-1547.

[17] T. Shu, M. Liu, and Z. Li, “A performance evaluation model for rssbased vertical handover algorithms,” pp. 271 –276, jul. 2009

[18] N. Nasser, A. Hasswa, H. Hassanein, “Handovers in Fourth Generation Heterogeneous networks,” IEEE Communications Magazine, vol. 44, no. 10, Oct. 2006, pp. 96-103.

[19] K.H. Hong, S.K. Lee, L.Y. Kim and P.J. Song, “Cost-Based Vertical Handover Decision Algorithm for WWAN/WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and Networking Volume 2009, 2009, Article ID 372185, 11 pages doi:10.1155/2009/372185.

[20] F. Zhu and J. McNair, “Multiservice vertical handover decision algorithms,” EURASIP Journal on Wireless Communications and Networking, vol. 2, no. 52, April 2006, pp. 1-13.

[21] R.Tawil, G.Pujolle and O.Salazar, “A Vertical Handover Decision Schemes In Heterogeneous Wireless Systems,” Vehicular Technology Conference, VTC Spring 2008. IEEE, Singapore, 2008, pp. 2626-2630.

[22] J.D Martinez- Morales, V.P.Rico and E.Steven, “Performance comparison between MADM algorithms for vertical handover in 4G networks,” 7th International Conference on Electrical  Engineering Computing Science and Automatic Control (CCE 2010) Tuxtla Gutiérrez, Chiapas, México. September 8-10, 2010, pp. 309-314.

[23] K. Savitha and C. Chandrasekar, “Grey Relation Analysis for Vertical Handover Decision Schemes in Heterogeneous Wireless Networks,” European Journal of Scientific Research,Vol.54, issue 4, June2011, pp.560-568.

[24] S. Kunarak and R. Suleesathira, “Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in Heterogeneous Wireless Networks,” Proc. The 2010 International Conference on Advanced Technologies for Communications, Hochiminh City, Oct. 20-22, 2010

[25] C. Ceken and H. Arslan, “ Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in Heterogeneous Wireless Networks,” Wireless and Microwave Technology Conference (WAMICON), 2009 IEEE 10th Annual .

[26] A. Hasswa, N. Nasser and H.S. Hassanein, “A Seamless Context-Aware Architecture for Fourth Generation Wireless Networks,” Springer Journal on Wireless Personal Communications, available online, April 2007.

[27] T. Ahmed, K. Kyamakya, and M. Ludwig, “Design and Implementation of a Context Aware Decision Algorithm for Heterogeneous Networking,” ACMSAC’06.

[28] S.Balasubramaniam, T. Pfeifer, and J. Indulska, “Active Node supporting Context-aware vertical Handover in pervasive computing Environment with Redundent Positioning,” Wireless Pervasive Computing, 2006 1st International Symposium , February 2006.

[29] K. Yang, I. Gondal, and B. Qiu, “Context Aware Vertical Soft Handover Algorithm For Heterogeneous Wireless Networks,” in Proc. VTC Fall, 2008, pp.1-5.

[30] X. Yan, Y. A. S¸ekercio glu, and N. Mani. “A method for minimizing unnecessary handoverin heterogeneous wireless networks, ” In Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’08), pages 1–5, Newport Beach, CA, USA, June 2008.

[31] K. Jang-Sub, S. Erchin, S. Dong-Ryeol and Q. Khalid, “Handover Triggering and Network Selection Algorithms for Load-Balancing 978-1-4673-0734-5/12/$31.00 ©2012 IEEE 366

[32] Handover in CDMA-WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and Networking, Vol.2008, Issue 1, pp.136939, 2008, ISSN: 16871472.

[34] R.Tawil, J.Demerjain, G.Pujolle And O.Salazar, “Processing-Delay Reduction During The Vertical Handover Decision In Heterogeneous Wireless System,” International Conference on Computer Systems and Applications, AICCSA IEEE/ACS 2008, pp.381-385.

[35] S. Dekleva, J.P. Shim, U. Varshney, G. Knoerzer, Evolution and emerging issues in mobile wireless networks, Communications of the ACM 50 (6) (2007) 38–43.

[36] D.-J. Deng, H.-C. Yen, Quality-of-Service provisioning system for multimedia transmission in IEEE 802.11 wireless LANs, IEEE Journal on Selected Areas in Communication 23 (6) (2005) 1240–1252.

[37] IEEE802.11 WG Draft Supplement to Part 11. Wireless medium access control (MAC) and physical layer (PHY) specification: medium access control (MAC) enhancements for Quality of Service (QoS). IEEE Standard 802.11e/D4.3, May 2003.

[38] H.S. Park, H.S. Yoon, T.H. Kim, J.S. Park, M.S. Duo, J.Y. Lee, Vertical handover procedure and algorithm between IEEE802.11 WLAN and CDMA cellular network, Mobile Communications (2003) 103–112.

[39] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. “Context Aware Computing for The Internet of Things: A Survey”, In the proceeding of IEEE Communications Surveys & Tutorials, Accepted For Publication , pp. 1 -41, 2013.

[40] Yan, Xiaohuan, Y. Ahmet Şekercioğlu, and Sathya Narayanan. “A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks.” Computer Networks 54.11, pp 1848-1863. Elsevier, 2010.

[41] Behrouz Shahgholi Ghahfarokhi • Naser Movahhedinia, “Context-Aware Handover Decision in an Enhanced Media Independent Handover Framework”, Wireless Pers Commun (2013) 68:1633– 1671,DOI 10.1007/s11277-012-0543-4, Published online: 21 February 2012, © Springer Science+Business Media, LLC. 2012.

[42] Hong, C. P., Kang, T. H., Kim, S. D., “A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment”. Asia-Pacific Network Operations and Management Symposium 2006, Busan, Korea.

[42] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Mobility management across wireless Networks” in the proceeding of 3rd International Conference on Intelligent Systems & Networks (IISN-2009) Computational Intelligence Laboratory (Ci-Lab), IST Klawad Yamuna Nagar, Haryana, Feb, 14th – 16th 2009.pp.68-75.

[43] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Cross Layered Mobility management in Heterogeneous Wireless Networks.” in the proceeding of “ITA-09” ,International Conference on IT In Academics, SIOM, Pune Feb, 20th to 22nd 2009.pp. 365-374

[44] Harsha A. Bhute,  “Mobility Management In Next Generation Wireless Networks” in proceeding of First National Conference on Cryptography and Network Security (NCCNS-2009) VIT University Vellore, Tamilnadu 19th Feb 2009.

Citation Count –09

Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model

Manmeet Mahinderjit Singh, Soh Sin Siang, Oh Ying San, Nurul Hashimah Ahamed Hassain Malim and Azizul Rahman Mohd Shariff,

Universiti Sains Malaysia, Malaysia

Abstract

Internet banking has the potential to provide fast and reliable services to customers for which they are relatively happy. Due to the technological changes taking place all over the world, many institutions, including the banking sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank, Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of customers who spend time unending in order to transact business. The purpose of this research was to assess the Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch. Findings from analysis of data revealed that though there was the existence of internet banking facilities of the bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank. Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in effective banking operations and transactional purposes. To maximize the operations and potential of the bank management must endeavor to educate the customers about the existence of internet banking facilities since a few customers were aware of the existence of such facilities.

Keywords

Bring Your Own Device (BYOD) model; Advanced Persistent Threat (APT) attack, Malware; Smartphone; Security

For More Details:  https://wireilla.com/papers/ijmnct/V4N5/4514ijmnct01.pdf

Volume Link: https://wireilla.com/ijmnct/vol4.html

References

[1] Osterman Research by Dell, “The Need for IT to Get in Front of the BYOD Problem White Paper”, January, 2013.

[2] Georg Disterer, Carsten Kleiner, BYOD Bring Your Own Device,CENTERIS 2013 – Conference on ENTERprise Information Systems / ProjMAN 2013 -International Conference on Project MANagement / HCIST 2013 – International Conference on Health and Social Care Information Systems and Technologies, May 2013

[3] Check Point Software Technologies Dimensional Research, “The Impact of Mobile Devices on Information Security”, June, 2013.

[4] Lumension Information Security, “2013 Survey Results of BYOD & Mobile Security”, 2013.

[5] iBanking: Exploiting the Full Potential of Android Malware [Online] http://www.symantec.com/connect/blogs/ibanking-exploiting-full-potential-android-malware Accessed date: 20/5/2014

[6] Owasp Mobile Security project https://www.owasp.org/index.php/ OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Accessed Date : 20/5/2014

[7] SYBASE, “Mobility Advantage: Why Secure Your Mobile Devices? White Paper”, February 2013.

[8] Jessica Keyes, “Bring Your Own Devices (BYOD) Survival Guide”, CRC Press Taylor & Francis Group, Boca Raton, 2013

[9] Brian Prince (16th April 2014), SQL Injection Breaches Take Months to Uncover and Fix: Survey, [Online] Available: http://www.securityweek.com/sql-injection-breaches-take-months-uncover-andfix-survey, Last Accessed Date: 23 May 2014.

[10] Dell Secure Works, “Anatomy of an Advanced Persistent Threat (APT)”, 31 March, 2011.

[11] Command Five Pty Ltd, “Advanced Persistent Threats: A Decade in Review”, June 2011.

[12] Why heartbleed could be much worse for android user [Online] http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014

[13] Mobile Security Reference Architecture v1.0, CIO council, 23 May 2013

[14] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”, Communication and Applications, 2012.

[15] Johannes de Vries & Hans Hoogstraaten, “Systems for Detecting Advanced Persistent Threats”, International Conference on Cyber Security, 2012.

[16] Tarique, Mustafa, “Malicious Data Leak Prevention and Purposeful Evasion Attacks: An Approach to Advanced Persistent Threat (APT) Management”, Conference at IEEE, 2013.

[17] Websense, “Advanced Persistent Threats And Other Advanced Attacks White Paper”, 2011

[18] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged Networks White Paper”, September, 2006.

[19] T. Andrew, Radu Vlas, Alan Yang & Cristina Vlas, “Risk Management in Era of BYOD”, IEEE Computer Society, 2013.

[20] Sean Chung, Barbara & Yan Bai, “2TAC: Distributed Access Control Architecture for “Bring Your Own Device” Security”, IEEE International Conference on BioMedical Computng, 2012.

[21] T. Ruesbsamen, and C. Reich, “Enhancing Mobile Devices Security by Security Level Integration in a Cloud Proxy”, The Third International Conference on Cloud Computing, GRIDs, and Virtualization, Furtwangen, Germany, pp. 159-168, July 2012.

[22] R.G. Lenon, “Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud”, Computing Department, Ireland, 2012.

[23] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”, Communication and Applications, 2012.

[24] J.A, de Vries, “Towards a roadmap for development of intelligent data analysis based cyber attack detection systems”, Delft University of Technology, 5th July 2012.

[25] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged Networks White Paper”, September, 2006.

[26] Wei Feng, “TEEM: A User Oriented Trusted Mobile Device for Multi-platform Security Applications”, Institute of Software Academy of Sciences, 2013.

[27] Zhang Dawei and Han Zhen, “Protocol for Trusted Channel Based on Portable Trusted Module”, Trusted Computing and Information Security, 2012.

[28] Kathleen N. McGill, “Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module”, Johns Hopkins APL Technical Digest, vol. 32, 2013.

[29]Allen Bethea (2012), What is the difference between SHA-1 and SHA-256, [Online] Available: http://www.ask.com/explore/difference-between-sha1-sha256-2062 Last accessed date: 23 May 2014.

[30] Liqun Chen and Mark Ryan, “Attack, solution and verification for shared authorization data in TCG TPM”, University of Birningham, UK, 2011.

[31] International Data Corporation; Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains, According to IDC; published 7 August 2013; http://www.idc.com/getdoc.jsp?containerId=prUS24257413.

[32] Cisco Security Threat Report 2014 [Online] https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf accessed date: 18/5/2014.

[33] F-Secure, “Mobile Threat Report Q3 2013”, F-Secure Corporation, Helsinki, 5 November, 2013.

[34] Trend Micro, “Implementing BYOD plan” , Trend Micro Corporation [Online] http://www.trendmicro.com/cloud-content/us/pdfs/businessrep orts/rpt_implementing_byod_plans.pdf Accessed date : 17/5/2014

[35] Why heartbleed could be much worse for android user [Online] http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014

[36] Ebay ask 145 million user to change their password after cyber attack [Online] http://uk.reuters.com/article/2014/05/21/uk-ebay-password-idUKKBN0E10ZL20140521 Accessed date: 20/5/2014

[37] BlueBox, “A New Era Dawns in Mobile Data Security”, whitepaper, August 2013

[38] F-Secure, “Mobile Threat Report Q1 2013”, F-Secure Corporation, Helsinki, 11 May, 2013.

[39] Mark Shepherdson, Trustmarque, “BYOD – the biometric implications” Volume 2013, Issue 4, Pages 5–7, April 2013

[40] John Thielens, “Why APIs are central to a BYOD security strategy”, ScienceDirect network security Volume 2013, Issue 8, Pages 5–6 August 2013

[41] Khoula Alharthy, Wael Shawkat, Implement Network security control solutions in BYOD environment, 2013 IEEE international conference on control system, computing and engineering, Penang, Malaysia, 29 Nov-1 Dec

Citation Count – 09

Performance Comparison Of Two Clipping Based Filtering Methods For Papr Reduction In Ofdm Signal

Md. Munjure Mowla1 , Md. Yeakub Ali2 and Rifat Ahmmed Aoni3

1,2 Department of Electronics & Telecommunication Engineering, Rajshahi University of Engineering & Technology, Rajshahi – 6204, Bangladesh

3Department of Electrical Engineering, University of Malaya, Kuala Lumpur -50603, Malaysia

Abstract

The growth of wireless communication technologies has been producing the intense demand for high-speed, efficient, reliable voice & data communication. As a result, third generation partnership project (3GPP) has implemented next generation wireless communication technology long term evolution (LTE) which is designed to increase the capacity and speed of existing mobile telephone & data networks. LTE has adopted a multicarrier transmission technique known as orthogonal frequency division multiplexing (OFDM). OFDM meets the LTE requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers. One major generic problem of OFDM technique is high peak to average power ratio (PAPR) which is defined as the ratio of the peak power to the average power of the OFDM signal. A trade-off is necessary for reducing PAPR with increasing bit error rate (BER), computational complexity or data rate loss etc. In this paper, two clipping based filtering methods have been implemented & also analyzed their modulation effects on reducing PAPR.

Keywords

Bit Error rate (BER), Complementary Cumulative Distribution Function (CCDF), Long Term Evolution (LTE), Orthogonal Frequency Division Multiplexing (OFDM) and Peak to Average Power Ratio (PAPR)

For More Details: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct03.pdf

Volume Link: https://wireilla.com/ijmnct/vol4.html

References

[1] R. Prasad, OFDM for Wireless Communications Systems. London, Boston: Artech House, Inc, 2004.

[2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission”, IEEE Wireless Comm, vol. 12, no.2, pp.56-65, Apr. 2005.

[3] Md. Munjure Mowla, “Peak to average power ratio analysis and simulation in LTE system”, M.Sc dissertation, Department of Electrical & Electronic Engineering, Rajshahi University of Engineering & Technology, Bangladesh, 2013.

[4] Muhammad Atif Gulzar , Rashid Nawaz and Devendra Thapa, “Implementation of MIMO-OFDM System for WiMAX”, M.Sc Dissertation, Department of Electrical Engineering, Linnaeus University, Sweden, 2011.

[5] Natalia Revuelto, “PAPR reduction in OFDM systems”, M.Sc Dissertation, Universitat Politecnica de Catalunya, Spain, 2008.

[6] Y.S. Cho, J. Kim, W.Y.Yang and C.G. Kang, MIMO OFDM Wireless Communications with MATLAB, Singapore: John Wiley & Sons (Asia) Pte Ltd, 2010.

[7] M.M.Mowla and S.M.M. Hasan, “Performance improvement of PAPR reduction for OFDM signal in LTE system”, International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 4, August 2013 (ISSN: 0975-3834).

Citation Count – 09

A Review Paper On: The Papr Analysis Of Orthogonal Frequency Division Multiplexing (Ofdm)

MOHSIN KHAN1, SAMIMA IQBAL2 and WASEEM ASGHAR3

1 Department of Computer Science, Lahore Garrison University, Lahore

2, 3 Computing & Technology Department, IQRA University Islamabad Campus

Abstract

OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique. Due to its advantages in multipath fading channel e.g. robust against ISI, ICI and some other advantages like best QoS for multiple users, efficient usage of bandwidth it is suggested to be the modulation technique for next generation 4G networks e.g. LTE. But along with all its advantages there are some disadvantages also e.g. High PAPR (Peak to Average Power Ratio) at the transmitter end and BER (Bit Error Rate) at the receiving end. Since OFDM is only used in the downlink of 4G networks. To reduce the problems of OFDM some techniques e.g. SLM, PTS, Clipping, Coding, & Pre-coding etc are suggested but none of them is reduce the PAPR and BER to an acceptable value. This Paper will discuss some techniques of PAPR & BER reduction, and their advantages and disadvantages in detail.

Keywords

PAPR, OFDM, SLM, DHT, DCT

For More Details:  https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct01.pdf

Volume Link:  https://wireilla.com/ijmnct/vol4.html

References

[1] Y.Wu and W. Y. Zou, “Orthogonal frequency division multiplexing: A multi-carrier modulation scheme,” IEEE Trans. Consumer Electronics, vol. 42. no. 3, pp. 392-399, August 1995.

[2] W. Y. Zou and Y. Wu, “COFDM: An overview,” IEEE Trans. Broadcasting, vol. 41 no.1, pp. 1-8, March 1995.

[3] JAE HONG LEE SEUNG HEE HAN, “AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION,” IEEE Wireless Communications, pp. 56-65, April 2005.

[4] Yiyan Wu Tao Jiang, “An Overview: Peak-to-Average Power Ratio Reduction Techniques for OFDM Signals,” IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 2, JUNE 2008, vol. 54, no.2, pp. 257-268, June 2008.

[5] Jr L. J. Cimini, “Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans. Communication, vol. COM-33, no. 7, pp. 665-675, July 1985.

[6] Y. G. Li and G. Stüber, “Orthogonal Frequency Division Multiplexing for Wireless Communications,” Boston, MA: Springer-Verlag, January 2006.

[7] Chenyang Yang,Gang Wu, Shaoqian Li, and Geoffrey Ye Li Taewon Hwang, “OFDM and Its Wireless Applications: A Survey,” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, vol. 58, NO. 4, pp. 1673-1694, May 2009.

[8] R. O’Neill and L. B. Lopes, “Envelope Variations and Spectral Splatter in Clipped Multicarrier Signals ,” IEEE Processing PIMRC 95 Toronto, Canada, pp. 71-75, September 1995.

[9] X. Li and Jr L. J. Cimini, “Effect of Clipping and Filtering on the Performance of OFDM,” IEEE Communication Letter, vol. 2, no. 5, pp. 131-133, May 1998.

[10] D. Kim and G. L. Stüber, “Clipping Noise Mitigation for OFDM by Decision–Aided Reconstruction,” IEEE Communication Letter, vol. 3, no. 1, pp. 4-6, January 1999.

[11] H. Saeedi, M. Sharif, and F. Marvasti, “Clipping Noise Cancellation in OFDM Systems Using Oversampled Signal Reconstruction ,” IEEE Communication Letter, vol. 6, no. 2, pp. 73-75, February 2002.

[12] Sungkeun Cha, Myonghee Park, Sungeun Lee, Keuk-Joon Bang, and Daesik Hong, “A new PAPR reduction technique for OFDM systems using advanced peak windowing method,” IEEE Transactions on Consumer Electronics, , vol. 54, no. 2, pp. 405-410, May 2008.

[13] P. Foomooljareona nd W.A.C. Fernando, “PAPR Reduction in OFDM Systems,” Thammasat Int. J. Sc. Tech, vol. 7, no. 3, pp. 70-79, December 2002.

[14] Jiang Tao and Guangxi Zhu, “Nonlinear companding transform for reducing peak-to-average power ratio of OFDM signals,” IEEE Transactions on Broadcasting, vol. 50, no. 3, pp. 342-346, September 2004.

[15] N. Bouaynaya, and S. Mohan Y. Rahmatallah, “Bit error rate performance of linear companding transforms for PAPR reduction in OFDM systems,” in Proc. IEEE GLOBECOM, Houston, TX, USA, December 2011.

[16] Muller S. H. and Huber J. B, “A novel peak power reduction scheme for OFDM,” the 8th IEEE International Symposium on in Personal, Indoor and Mobile Radio Communications, 1997.

[17] M. Breiling, S.H. Muller-Weinfurtner, and J.B Huber, “SLM peak-power reduction without explicit side information,” IEEE Communications Letters, vol. 5, no. 6, pp. 239-241, June 2001.

[18] Chin-Liang Wang, Sheng-Ju Ku, and Chun-Ju Yang, “A Low-Complexity PAPR Estimation Scheme for OFDM Signals and Its Application to SLM-Based PAPR Reduction,” IEEE Journal of Selected Topics in Signal Processing, vol. 4, no. 3, pp. 637-645, June 2010.

[19] S.H. Muller and J.B Huber, “OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences,” IEEE Electronics Letters , vol. 33, no. 5, pp. 368-369, February 1997.

[20] Han Seung Hee and Jae Hong Lee, “PAPR reduction of OFDM signals using a reduced complexity PTS technique,” IEEE Signal Processing Letters, vol. 11, no. 11, pp. 887-890, November 2004.

[21] Dae-Woon Lim, Seok-Joong Heo, Jong-Seon No, and Habong Chung, “A new PTS OFDM scheme with low complexity for PAPR reduction,” IEEE Transactions on Broadcasting, vol. 52, no. 1, pp. 77- 82, March 2006.

[22] J. Tellado, “Peak to Average Power Reduction for Multicarrier Modulation,” Ph.D. dissertation, Stanford Univ, 2000.

[23] B. S. Krongold and D. L. Jones, “An Active Set Approach for OFDM PAR Reduction via Tone Reservation,” IEEE Transaction Signal Processing, vol. 52, no. 2, pp. 495-509, February 2004.

[24] D L Jones, “Peak power reduction in OFDM and DMT via active channel modification,” in Proc. Asilomar Conference on Signals, Systems, and Computers, vol. 2, pp. 1076-1079, 1999.

[25] B. S. Krongold and D. L. Jones, “PAR Reduction in OFDM via Active Constellation Extension,” IEEE Transaction on Broadcasting, vol. 49, no. 3, pp. 258-268, September 2003.

[26] S. Pino-Povedano and F.J Gonzalez-Serrano, “PAPR reduction for OFDM transmission using a method of Convex Optimization and Amplitude Predistortion,” International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 210-214, 9-11 September 2009.

[27] C. Nader, P. Handel, and N Bjorsell, “Peak-to-Average Power Reduction of OFDM Signals by Convex Optimization: Experimental Validation and Performance Optimization,” IEEE Transactions on Instrumentation and Measurement, vol. 60, no. 2, pp. 473-479, February 2011.

[28] Lung-Sheng Tsai, Wei-Ho Chung, and Da-shan Shiu, “Lower Bounds on the Correlation Property for OFDM Sequences with Spectral-Null Constraints,” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2652-2659, August 2011.

[29] J.A. Davis and J Jedwab, “Peak-to-mean power control and error correction for OFDM transmission using Golay sequences and Reed-Muller codes,” Electronics Letters, vol. 33, no. 4, pp. 267-268, February 1997.

[30] J.A. Davis and J Jedwab, “Peak-to-mean power control in OFDM, Golay complementary sequences, and Reed-Muller codes,” IEEE Transactions on Information Theory, vol. 45, no. 7, pp. 2397-2417, November 1999.

[31] Jiang Tao and Guangxi Zhu, “Complement block coding for reduction in peak-to-average power ratio of OFDM signals,” IEEE Communications Magazine, vol. 43, no. 9, pp. S17-S22, September 2005.

[32] Heeyoung Jun, Jaehee Cho, et.al Myonghee Park, “PAPR reduction in OFDM transmission using Hadamard transform,” ICC 2000, pp. 430-433, 2000.

[33] Xiang-Gen Xia, “Precoded and vector OFDM robust to channel spectral nulls and with reduced cyclic prefix length in single transmit antenna systems,” IEEE Transactions on Communications, vol. 49, no. 8, pp. 1363-1374, August 2001.

[34] Yuan-Pei Lin and See-May Phoong, “BER minimized OFDM systems with channel independent precoders,” IEEE Transactions on Signal Processing, vol. 51, no. 9, pp. 2369-2380, September 2003.

[35] Zhengdao Wang, Shengli Zhou, and G.B Giannakis, “Joint coding-precoding with low-complexity turbo-decoding,” IEEE Transactions on Wireless Communication, vol. 3, no. 3, pp. 832-842, May 2004.

[36] Yew Kuan Min, M. Drieberg, and V Jeoti, “On PAPR Reduction in OFDM Systems: A Technique using Normalized Complex Hadamard Transform,” IEEE Region TENCON 2005, pp. 1-4, 21-24 November 2005.

[37] I. Baig and V Jeoti, “PAPR analysis of DHT-precoded OFDM system for M-QAM,” International Conference on Intelligent and Advanced Systems (ICIAS), pp. 1-4, 15-17 June 2010.

[38] I. Baig and V Jeoti, “DCT precoded SLM technique for PAPR reduction in OFDM systems,” International Conference on Intelligent and Advanced Systems (ICIAS), 2010, pp. 1-6, 15-17 June 2010.

[39] I. Baig and V Jeoti, “PAPR Reduction in OFDM Systems: Zadoff-Chu Matrix Transform Based Pre/Post-Coding Techniques,” Second International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2010, pp. 373-377, July 2010.

[40] A. Joshi, D. Bhardwaj, and D.S Saini, “PAPR reduction in OFDM with FEC (RS-CC and Turbo coding) using DHT preceding,” International Symposium on Instrumentation & Measurement, Sensor Network and Automation (IMSNA), vol. 1, no. 1, pp. 14-18, 25-28 August 2012.

[41] N. Ahmed and K.R. Rao, “Orthogonal transforms for digital signal processing,” Berlin: SpringerVerlag, 1975.

[42] R.N. Bracewell, “Discrete Hartley transform,” Journal of the Optical Society of America, vol. 73, no. 12, pp. 1832-1835, 1983.

[43] B.M Popovic´, “Spreading sequences for multi-carrier CDMA systems,” In IEE Colloquium CDMA Techniques and Applications for Third Generation Mobile Systems, pp. 1-8, 1997.

[44] N. Ahmed, T. Natarajan, and K.R and Rao, “Discrete cosine transform,” IEEE Transactions on Computers, C-23(1), pp. 90-93, 1974.

Citation Count – 08

Performance Analysis On The Basis Of A Comparative Study Between Multipath Rayleigh Fading And Awgn Channel In The Presence Of Various Interference

Sutanu Ghosh

Dr. Sudhir Chandra Sur Degree Engineering College

Abstract

Interference is the most important issue for present wireless communication. There are various kinds of channel used in wireless communication. Here I want to show a performance analysis on the basis of two different channels – AWGN and Multipath Rayleigh fading channel. This is the comparative analysis with different kinds of modulation techniques. Here I have also measured the Bit Error Rate with respect to different modulation techniques and compare the rate in different channels. My objective is to compare the different characteristics of the transmitter and receiver for different types of channels and modulators.

Keywords

Rayleigh fading channel, Bit Error Rate, AWGN, Cellular Interference.

For More Details:  http://wireilla.com/papers/ijmnct/V4N1/4114ijmnct02.pdf

Volume Link:  https://wireilla.com/ijmnct/vol4.html

References

[1] Cavers, James K. “An analysis of pilot symbol assisted modulation for Rayleigh fading channels [mobile radio].” Vehicular Technology, IEEE Transactions on 40.4 (1991): 686-693

[2] Stein, Seymour. “Fading channel issues in system engineering.” Selected Areas in Communications, IEEE Journal on 5.2 (1987): 68-89.

[3] Mishra, Ajay R. “Fundamentals of cellular network planning and optimisation: 2G/2.5 G/3G… evolution to 4G.”Wiley. com, 2004.

[4] Foschini, Gerard J. and Michael J. Gans. “On limits of wireless communications in a fading environment when using multiple antennas.” Wireless personal communications 6.3 (1998): 311-335.

[5] Yang, Hong-Chuan and M-S. Alouini. “Closed-form formulas for the outage probability of wireless communication systems with a minimum signal power constraint.” Vehicular Technology, IEEE Transactions on 51.6 (2002): 1689-1698.

[6] T. S. Rappaport, Wireless Communications: Principles and Practice. N.J.: Prentice Hall, 1996.

[7] Petersen, B. R. and D. D. Falconer. “Exploiting cyclostationary subscriber-loop interference by equalization.” Global Telecommunications Conference, 1990, and Exhibition.’Communications: Connecting the Future’, GLOBECOM’90., IEEE. IEEE, 1990.

[8] Chen, S. and B. Mulgrew. “Overcoming co-channel interference using an adaptive radial basis function equaliser.” Signal Processing 28.1 (1992): 91-107.