scispace - formally typeset
Search or ask a question
Book

4G: LTE/LTE-Advanced for Mobile Broadband

TL;DR: In this article, the authors focus on LTE with full updates including LTE-Advanced to provide a complete picture of the LTE system, including the physical layer, access procedures, broadcast, relaying, spectrum and RF characteristics, and system performance.
Abstract: Based on the bestseller "3G Evolution - HSPA and LTE for mobile broadband" and reflecting the ongoing success of LTE throughout the world, this book focuses on LTE with full updates including LTE-Advanced to provide a complete picture of the LTE system. Overview and detailed explanations are given for the latest LTE standards for radio interface architecture, the physical layer, access procedures, broadcast, relaying, spectrum and RF characteristics, and system performance. Key technologies presented include multi-carrier transmission, advanced single-carrier transmission, advanced receivers, OFDM, MIMO and adaptive antenna solutions, advanced radio resource management and protocols, and different radio network architectures. Their role and use in the context of mobile broadband access in general is explained. Both a high-level overview and more detailed step-by-step explanations of the LTE/LTE-Advanced implementation are given. An overview of other related systems such as GSM/EDGE, HSPA, CDMA2000, and WIMAX is also provided. This book is a 'must-have' resource for engineers and other professionals in the telecommunications industry, working with cellular or wireless broadband technologies, giving an understanding of how to utilize the new technology in order to stay ahead of the competition. The authors of the book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardisation since the early days of 3G research. They are leading experts in the field and are today still actively contributing to the standardisation of LTE within 3GPP. Includes full details of the latest additions to the LTE Radio Access standards and technologies up to and including 3GPP Release 10Clear explanations of the role of the underlying technologies for LTE, including OFDM and MIMO Full coverage of LTE-Advanced, including LTE carrier aggregation, extended multi-antenna transmission, relaying functionality and heterogeneous deploymentsLTE radio interface architecture, physical layer, access procedures, MBMS, RF characteristics and system performance covered in detail
Citations
More filters
Journal ArticleDOI
TL;DR: A novel traffic-aware spatio-temporal model is developed that derives the analytical expression for the RACH success probability of a randomly chosen IoT device in each CE group over multiple time slots with different RACH schemes, including baseline, back-off (BO), access class barring ( ACB), and hybrid ACB and BO schemes (ACB&BO).
Abstract: NarrowBand-Internet of Things (NB-IoT) is a new 3GPP radio access technology designed to provide better coverage for Low Power Wide Area (LPWA) networks. To provide reliable connections with extended coverage, a repetition transmission scheme and up to three Coverage Enhancement (CE) groups are introduced into NB-IoT during both Random Access CHannel (RACH) procedure and data transmission procedure, where each CE group is configured with different repetition values and transmission resources. To characterize the RACH performance of the NB-IoT network with three CE groups, this paper develops a novel traffic-aware spatio-temporal model to analyze the RACH success probability, where both the preamble transmission outage and the collision events of each CE group jointly determine the traffic evolution and the RACH success probability. Based on this analytical model, we derive the analytical expression for the RACH success probability of a randomly chosen IoT device in each CE group over multiple time slots with different RACH schemes, including baseline, back-off (BO), access class barring (ACB), and hybrid ACB and BO schemes (ACB&BO). Our results have shown that the RACH success probabilities of the devices in three CE groups outperform that of a single CE group network but not for all the groups, which is affected by the choice of the categorizing parameters.This mathematical model and analytical framework can be applied to evaluate the performance of multiple group users of other networks with spatial separations.

10 citations


Cites background or methods from "4G: LTE/LTE-Advanced for Mobile Bro..."

  • ...In ACB mechanism, initially a BS broadcasts an access barring factor QACB , which is specified by the BS according to the network condition [13] [25]....

    [...]

  • ...In NB-IoT, the main purpose of RACH procedure is to achieve uplink synchronization and obtain the grant for initial access to the network [13], in which the first step is to transmit a RACH preamble....

    [...]

  • ..., the dedicated repetition value) in step 1, and control information with the BS is exchanged in step 2,3,4 [13] [23]....

    [...]

  • ...It is known that collision in step 1 of RACH can be detected by the BS, when the collided IoT devices are separable in terms of the power delay profile [13]....

    [...]

Journal ArticleDOI
TL;DR: An overview of Dynamic spectrum access (DSA) and a review of the recent research into the use of DSA to improve bandwidth utilization in LTE-A networks are provided.
Abstract: Increasing utilization of LTE-Advanced (LTE-A) to meet the rapid growth in wireless bandwidth demand is an important focus for current research. Dynamic spectrum access (DSA) is a promising approach that can be utilized to improve bandwidth utilization in LTE-A systems and networks. The application of DSA is not limited to commercial use but can also be applied to provide access to other systems including public safety communication systems and device to device communications. This paper provides a general overview of DSA and a review of the recent research into the use of DSA to improve bandwidth utilization in LTE-A networks. DSA is a flexible technique that is being applied to different network technologies including cognitive radio, mobile cellular femtocells and wireless relay.

10 citations

Journal ArticleDOI
TL;DR: A fast sparse signal recovery approach that shows a clear improvement in detection and estimation performance compared to other state-of-the-art methods and can be integrated into any OFDM based standard.
Abstract: Initial uplink synchronization is an integral part of wireless communication systems. It enables the base station (BS) to detect new subscriber stations (SS) willing to commence communication. It also enables the BS to estimate the uplink channel parameters of these SSs. Accurate estimation of channel parameters is crucial, as they ensure the uplink signals from all the SSs arrive at the BS synchronously at similar power levels. However, this detection and estimation problem turns out to be very challenging when multiple users initiate the synchronization procedure at the same time. We address this issue by exploiting the underlying sparsity of the estimation problem. We propose a fast sparse signal recovery approach that shows a clear improvement in detection and estimation performance compared to other state-of-the-art methods. The proposed method can be integrated into any OFDM based standard.

10 citations


Cites background from "4G: LTE/LTE-Advanced for Mobile Bro..."

  • ...It is well known [17] that in DFT domain the circular convolution in (4) is equivalent to...

    [...]

  • ...Also from the theory of DFT, it is well known that H(n)e−i2πdn/N is the DFT of h circularly shifted by d places [17], which is written compactly as...

    [...]

Journal ArticleDOI
TL;DR: There are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities and an open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.
Abstract: Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.

10 citations


Cites background from "4G: LTE/LTE-Advanced for Mobile Bro..."

  • ...Besides all this, currently, Internet service providers have provided various wireless infrastructure and technology, including UMTS (Universal Mobile Telecommunications System) [4], Wireless Fidelity (Wi-Fi) [5], and 4G LTE (Long-Term Evolution) [6]....

    [...]

Proceedings ArticleDOI
01 Sep 2016
TL;DR: Simulation results indicate that in the chosen scenario under unfavorable conditions, the proposed algorithm is still able to estimate clipping noise and according to its structure, only slightly increases the complexity of the original OMP algorithm.
Abstract: In this paper, the clipping noise estimation problem based on compressed sensing (CS) is investigated when the subcarriers used for creating measurement vector are on the edge of the frequency band. Although selection of such subcarriers would not degrade data rate and is suitable for systems requiring high rates, it still weakens the performance of CS recovery algorithms especially in the presence of noise. To address this issue, a new approach based on the orthogonal matching pursuit (OMP) algorithm is proposed for improving the clipping noise estimation. Simulation results indicate that in the chosen scenario under unfavorable conditions, the proposed algorithm is still able to estimate clipping noise and according to its structure, only slightly increases the complexity of the original OMP algorithm.

10 citations


Cites background from "4G: LTE/LTE-Advanced for Mobile Bro..."

  • ...OFDM is a practical technique which increases the data rate without increasing the bandwidth and also counters the effects of frequency selective channels [1]....

    [...]