• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 34
  • 10
  • 8
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Extension and analysis of hybrid ARQ schemes in the context of cooperative relaying

Vanyan, Anna 10 June 2014 (has links) (PDF)
In the wireless channel, cooperative communications allow one or many relays to assist the communication between the source and the destination. The aim of this thesis is the development of tools for the analysis of cooperative systems, when HARQ techniques are employed to provide cross-layer error protection. The first chapter of the thesis gives background information on network coding in cooperative relay networks, and introduces the motivation for this work. The second chapter is devoted to the analysis of the energetic-fair performance evaluations of FEC, ARQ-STBC and HARQ schemes at the MAC and IP layers. New analytical framework is derived and applied to a point-to-point network scenario. This framework allows to make energetic fair comparisons between the schemes with and without retransmissions. We determine under which channel conditions the cross-layer error protection is energetically more efficient than the simple channel coding. In the third chapter of this thesis we study the cooperative deterministic protocols. The protocols that we consider differ based on the behaviour of the relay(s), source(s), and destination. We consider two major types of cooperative protocols: decode-and forward (DCF), and demodulate-and-forward (DMF). Each of these protocols in its turn is analysed with and without combining mechanisms at the destination. We derive the soft decoders at the destination side for each respective case, and compare the performances of these protocols at the MAC layer. The following quality of service metrics are evaluated: frame error rate, delay, efficiency, goodput. The analysis is done evaluating the steady-state, using finite state Markov chains and a combinatorial approach. The analysis, however, becomes very complex as the number of transmissions and/or nodes in the network increases. The fourth chapter introduces a class of probabilistic communication protocols, where the devices retransmit with a given probability. We prove the existence of an equivalent class of protocols, with the same performances as the deterministic class. Using proofs of concept it is shown that the probabilistic protocol class allows for tractable steady-state analysis, even for many nodes in the network. Based on this, we then derive the QoS metrics and evalute them also by simulations. The derived performance evaluation metrics are then optimized by constraining the frame error rate, and trying to find the most optimal transmissions number and code rates which maximize the goodput. It is furthermore shown, that the equivalent protocol has larger optimal region than the deterministic one.
32

Schémas pratiques pour la diffusion (sécurisée) sur les canaux sans fils

Mheich, Zeina 19 June 2014 (has links) (PDF)
Dans cette thèse, on s'est intéressé à l'étude des canaux de diffusion avec des contraintes de transmission pratiques. Tout d'abord, on a étudié l'impact de la contrainte pratique de l'utilisation d'un alphabet fini à l'entrée du canal de diffusion Gaussien avec deux utilisateurs. Deux modèles de canaux de diffusion sont considérés lorsqu'il y a, en plus d'un message commun pour les deux utilisateurs, (i) un message privé pour l'un des deux utilisateurs sans contrainte de sécurité (ii) un message confidentiel pour l'un des deux utilisateurs qui doit être totalement caché de l'autre utilisateur. On a présenté plusieurs stratégies de diffusion distinguées par leur complexité d'implémentation. Plus précisément, on a étudié les régions des débits atteignables en utilisant le partage de temps, la superposition de modulation et le codage par superposition. Pour la superposition de modulation et le cas général du codage par superposition, les régions des débits atteignables maximales sont obtenues en maximisant par rapport aux positions des symboles dans la constellation et la distribution de probabilité jointe. On a étudié le compromis entre la complexité d'implémentation des stratégies de transmission et leurs efficacités en termes de gains en débits atteignables. On a étudié aussi l'impact de la contrainte de sécurité sur la communication en comparant les débits atteignables avec et sans cette contrainte. Enfin, on a étudié les performances du système avec des schémas d'accusés de réception hybrides (HARQ) pour un canal à écoute à évanouissement par blocs lorsque l'émetteur n'a pas une information parfaite sur l'état instantané du canal mais connait seulement les statistiques. On a considéré un schéma adaptatif pour la communication sécurisée en utilisant des canaux de retour à niveaux multiples vers l'émetteur pour changer la longueur des sous mots de code à chaque retransmission afin que le débit utile secret soit maximisé sous des contraintes d'"outages".
33

Mitigating the effect of soft-limiting for OFDM peak reduction

Bibi, Nargis January 2014 (has links)
Digital communication systems which use Orthogonal Frequency Division Multiplexing (OFDM) are now widely used and have many advantages. The main disadvantage is the requirement for highly linear analogue electronics including the high power amplifier (HPA). This requirement cannot be met in all circumstances because of the occurrence of symbols with high peak to average power ratio (PAPR). Such symbols may be non-linearly distorted by limiting. Approaches to solve this problem have been either to reduce the PAPR at the transmitter or to try to mitigate the effect of the non-linearity at the receiver. Soft-limiting, i.e. applying limiting in software prior to the HPA is a simple way to reduce the PAPR. It produces non-linear distortion which will cause an increase in the bit-error-rate (BER) at the receiver. This thesis surveys existing alternatives ways of reducing the effect of non-linearity and proposes some new ones. Two iterative receiver techniques, based on statistical analysis of the nature of the non-linearity, have been implemented and investigated. These are the ‘Bussgang Noise Cancellation’ (BNC) technique and the ‘Decision Aided Reconstruction’ (DAR) techniques. As these techniques are valid for any memory-less nonlinearity, an alternative form of limiting, named as Inverted-Wraparound (IWRAP) has been included in the BNC investigation. A new method is proposed which is capable of correcting the received time-domain samples that are clipped, once they have been identified. This is named the ‘Equation-Method’ and it works by identifying constellation symbols that are likely to be correct at the receiver. If there are a sufficient number of these and they are correctly identified, the FFT may be partitioned to produce a set of equations that may be solved for the clipped time-domain samples. The thesis proposes four enhancements to this new method which improve its effectiveness. It is shown that the best form of this method outperforms conventional techniques especially for severe clipping levels. The performance of these four enhancements is evaluated over channels with additive white Gaussian noise (AWGN) in addition to clipping distortion. A technique based on a ‘margin factor’ is designed to make these methods work more effectively in the presence of AWGN noise. A new combining algorithm referred as ‘HARQ for Clipping’ is presented where soft bit decisions are combined from multiple transmissions. ‘HARQ for Clipping’ has been combined with the best version of the Equation-Method, and the performance of this approach is evaluated in terms of the BER with different levels of AWGN. It has been compared to other approaches from the literature and was found to out-perform the BNC iterative receiver by 3dB at signal to noise ratios around 10dB. Without HARQ, the best version of the Equation-Method performs better than the BNC receiver, at signal-to-nose ratios above about 17dB.
34

Modely systému LTE / LTE system models

Navrátil, Petr January 2013 (has links)
Master’s thesis is focused on part of mobile network named LTE. Project is analyzes the LTE physical layer, which is divided into four basic parts: Physical channels and modulation, Multiplexing and channel coding, Physical layer procedures, Physical layer measurements. Every part is described by actual 3GPP standard [1]. To understand the problem is expected a reader basic knowledge of OFDM systems, which the LTE system uses. The next part of this master’s thesis is dedicated to mathematic model physical layer of system LTE, created by program Matlab. This model is designed to measure errors in data transmission.

Page generated in 0.0381 seconds