SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 542
SEARCHING AND TRACKING OF NEIGHBORING BASE STATIONS
S. Jacqulin Veda Jancy1
, B. Jesvin Veancy2
, P.Yogesh3
1
M.E Communication Systems, Easwari Engineering College, India
2
Assistant professor (Sl Gr), Easwari Engineering College, India
3
Dept of Information Science and Technology, Anna University, Chennai, India
Abstract
Long term evolution (LTE) is considered to be a key technology for the next generation of cellular telecommunications. Searching and
tracking of neighboring cells is important for cellular network management such as handover and base station cooperation. The cell
search procedure begins when the mobile unit is powered on and it starts communicating with the strongest base station. The main
objective is to find the neighbor cells in the LTE system. Simulations are done using LTE simulator to find the probability of detecting
the number of neighbor cells under various channel conditions and at different UE locations.
Keywords: Long Term Evolution (LTE), Cell search, synchronization, PSS, SSS.
---------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
The Long Term Evolution (LTE) is an upcoming mobile
communication standard that is specified by the 3rd
Generation Partnership Project (3GPP). LTE is a wireless
broadband technology designed to support roaming Internet
access via cell phones and handhelds. The goal of LTE is to
provide low-latency, high-data-rate and packet-optimized
radio-access technology. LTE system supports peak data rates
of 326 Mb/s with 4 X 4 MIMO within 20 MHz bandwidth.
LTE system supports flexible bandwidths. It supports
OFDMA and SC-FDMA access schemes. In addition to FDD
(Frequency Division Duplexing) and TDD (Time Division
Duplexing), half duplex FDD is also allowed to support low
cost UE. OFDMA allows data to be directed to or from
multiple users on a subcarrier – by - subcarrier basis for a
specified number of symbol periods. The SC-FDMA has much
lower PAPR(Peak to Average Power Ratio) when compared to
OFDMA which makes it a great choice for uplink
transmission in LTE. In mobile cellular systems, initial cell
search is an important task for a user equipment (UE) to get
synchronized to an eNode B (eNB) when the UE starts up.
Reliable searching and tracking of neighboring cells around
the user equipment (UE) in addition to the serving cell
provides rich information for cellular network management
and applications, such as handover, base station cooperation,
and location inference. For example, reliable cell detection
(i.e., with a high detection probability) leads to efficient
handover of the UE to the best neighboring cell. The number
of detected cells is also an important metric for many
applications: (i) the performance of UE’s location inference
highly depends on the number of detected cells [4] (ii) in
heterogeneous network deployment more detected cells will
give the base station a larger flexibility to offload the traffic
and optimize the network throughput via inter-cell interference
coordination (ICIC).Cell identity (ID) information in LTE
systems is carried by the signals in both the primary and
secondary synchronization channels called primary and
secondary synchronization signals (PSS and SSS)
respectively. While the PSS is mainly dedicated for
synchronization and the SSS provides complete information
about the cell ID.
2. CELL SEARCH
In the LTE system the mobile unit has to search for the
available radio cells and lock to one of them to continue
communication while moving between the cells. Multiple
mobile unit users simultaneously try to access the same set of
radio cells and also the UE mobile unit begins it search blindly
without any knowledge of the bandwidth it has allocated.
Hence the initial cell search procedure must also be
implemented in timing and frequency synchronization[1].
UE will tune its radio turn by turning to different frequency
channels depending upon which bands it is supporting.
Assuming that it is currently tuned to a specific band / channel
UE first finds the primary synchronization signal (PSS) which
is located in the last OFDM symbol of first time slot of the
first sub frame (sub frame 0) of radio frame. This enables UE
to be synchronized on sub frame level. The PSS is repeated in
sub frame 5 which means UE is synchronized on 5ms basis
since each sub frame is 1ms.UE is also able to obtain physical
layer identity (0 to 2) from PSS. In the next step UE finds the
secondary synchronization signal (SSS). SSS symbols are also
located in the same sub frame of PSS but in the symbol before
PSS. From SSS UE is able to obtain physical layer cell
identity group number (0 to 167).
Using physical layer identity and cell identity group number,
UE knows the cell ID for the cell . LTE systems consist of 504
unique physical layer cell identities. To accommodate and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 543
manage this large amount, the cell identities are divided into
168 unique cell layer identity groups. Each group further
consists of three physical layer identities. This is usually
represented as: N(1)ID=0….167 and N(2)ID=0,1,2.
Cell ID is calculated as 3 × N(1)CellID + N(2)CellID
In LTE system there are 504 Physical Cell Identities. LTE can
address 504 cell identity with the PSS and SSS . In the LTE
air interface, Physical Layer Cell Identity is used for cell
identification and channel synchronization. The N(1)CellID
and N(2)CellID values are also used to .seed the Secondary
Synchronization Signal and Primary Synchronization Signal.
The cell identity is a number from 0 to 503 and it distinguishes
a cell from its immediate neighbors.
3. SYNCHRONIZATION SIGNALS DETECTION
The hierarchical cell search procedure is performed in two
steps using two signals detection:
1. Primary Synchronization Signal and
2. Secondary Synchronization Signal
Fig 1 Cell Search
The synchronization signals have 72 subcarriers reserved for
them, but they use only 62 of the 72 subcarriers. The Primary
Synchronization signal first determines one of three cell
identities (0, 1, 2) and it is also represented by N(2)ID.The
secondary synchronization signal is used to determine a cell
ID between 0 and 167 represented by N(1)ID.
3.1 PSS Detection
The main function of PSS is to detect the boundary of a frame
where non-coherent detection method has to be used at the
receiver since there is no known reference information
initially. Matched filter is a basic non - coherent detection
method that can be used to detect PSS efficiently. The
sequence is mapped to the subcarriers around DC and
transformed into time domain by 64bit IDFT[4]. To detect this
signal at the receiver, the correlation with the domain signal of
the ZC sequence is calculated. If the maximum value of
correlation is greater than a preset threshold, then
corresponding OFDM symbol timing is noted and the symbol
is assumed to contain the PSS corresponding to the reference
sequence. The PSS value is provided by index of the
correlation maximizing reference sequence. The UE knows
which PSS sequence is being received and it has a known
reference of the signal, the UE can now estimate the channel
using its known reference of the original signal.
At the end of this step the UE knows:
1. Slot boundary.
2. Cell ID index (PSS value)
In FDD system the PSS is transmitted in sub frame 0 or sub
frame 4. So with the detection of PSS, the UE knows it is
synchronized with either sub frame 0 or sub frame 5.
Determination of whether it is sub frame 0 or sub frame 5 will
enable frame timing synchronization which will be performed
with the detection of SSS.
3.2 SSS Detection
The SSS is transmitted by the same subcarriers as those of
PSS in the immediately preceding symbol. Therefore we can
assume that these channel parameters remain the same for the
SSS subcarriers as well. The SSS is a binary sequence of +1’s
& -1’s formed after the interleaving of two sequences.
Furthermore these two sequences are scrambled with two
binary sequences which depend on N2(ID) . Therefore the
detection process proceeds by first deriving the scrambling
sequences, then finding the values and then finally computing
the value by a simple table look-up procedure. The sequence
d(0)…..d(61) used for the secondary synchronization signal is
an interleaved concatenation of two length-31 binary
sequences. The concatenated sequence is scrambled with a
scrambling sequence given by the PSS. The combination of
two length-31 sequences defining the secondary
synchronization signal differs between sub frame 0 and sub
frame 5 according to:
d(2n)=s0
(m0)
(n)c0(n) in slot0 (1)
d(2n)=s1
(m1)
(n)c0(n) in slot10 (2)
d(2n+1)=s1
(m1)
(n)c1(n)z1
(m0)
(n) in slot 0 (3)
d(2n+1)=s0
(m0)
(n)c1(n)z1
(m1)
(n) in slot 10 (4)
The above equation clearly indicates that the SSS is different
for sub frame 0 and sub frame 5. So, detection of SSS will
enable UE to determine the frame timing as well. The
detection of SSS is a coherent process. Since the UE has
determined an estimate of the channel from the PSS, it now
removes the effects of the channel before it detects the SSS.
The SSS and PSS are closely located in time to enable the
coherent detection.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 544
The block diagram in Figure 2 assists in descrambling the SSS
signal. The following steps illustrate the detection of the SSS.
1. Channel effects are removed from the SSS and any
frequency offset determined earlier is corrected.
2. The received signal is de-interleaved into the odd part and
the even part, i.e. d(2n) and d(2n+1).Since N(2)ID is known
from the PSS, the scrambling code c0(n) is already known to
the UE and can be descrambled from the received signal. So
the UE now correlates the descrambled signal with copies of
s0
(m0)
(n) to determine a match. Now, the UE has determined
m0 or m1.
3. Now that the UE knows one value of m0 or m1, it can use it
to descramble the sequence z.
Fig 2 SSS Detection
4. The equations (1) to(4) is used to find the solution.
z1
(m
o
)
(n)=Z((n+(m0 mod8))mod31)
5. Say, the UE is in subframe zero, c0 was known to the UE,
m0 was determined using s0(.) and using this m0 ,z1 was
descrambled. Similarly m1 is calculated. So, now the Cell
Identity:
NcellID = 3 N(1)ID + N(2)ID
With this the UE is also able to determine the sub frame
number, thus completing frame timing synchronization also.
At the end of this step, the UE has determined the radio cell
ID and Radio Frame value is determined. Thus the neighbor
cell identity is determined.
4. SIMULATION RESULTS
The cell search in LTE System under different channel
conditions is simulated in LTE system level simulator. We
consider the deployment of 57 cells with wrap - around
structure and inter - cell distance equal to1.732 km. The SNR
is defined as the average received signal power at 1 km from
the cell to the noise power ratio. The cell center, middle, and
edge are referred to be the area within0.4 km, between 0.4 km
to 0.7 km, and between 0.7 km to1 km, to the cell site,
respectively.
Basic Parameters for LTE Simulation Environment
Frequency 2.0 GHz
Receiver noise figure 9 dB
System Bandwidth 5MHz
Thermal noise density -174 dBm/Hz
Inter eNodeB distance 1732m
Macroscopic pathloss 128.1 + 37.6 log10(R)
eNodeB TX Power 20 watts
UE speed 5 km/h
Transmission time interval 100
Cyclic prefix normal
4.1 Number of Neighboring Cells in Flat Fading
Channel
In this the LTE network consists of Nt different cells with
distinct cell IDs where Nt=57,100,200,504 .The probability of
finding the number of neighbouring cells in flat fading channel
is simulated.
Fig 3 Probability of detection with respect to the number of
neighboring cells in flat fading channel
It is shown that when the number of cells in a system is small
(Nt=57) then the probability of neighbor cell detection is
higher and when the systems cell number is large the
probability of neighbor cell detection is reduced.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 545
4.2 Number of Neighboring Cells in Multi Path
Fading Channel
Fig 4 Probability of detection with respect to the number of
neighboring cells in multi path fading channel
In this the LTE network consists of Nt different cells with
distinct cell IDs where Nt=57,100,200,504 .The probability of
finding the number of neighboring cells in multipath fading
channel is simulated. It is shown that even when the number
of cells in a system is small (Nt=57) the probability of
neighbor cell detection is less when compared to flat fading
channel. The probability of detection is less because of the
reflection of radio waves by the obstacles present in the
environment.
4.3 Cell Detection with respect to SNR
Fig 5 Number of detected cells at different UE locations (cell
edge, middle and center) with respect to the SNR
In this the LTE network consists of 57 different cells with
distinct cell IDs. The number of detected cells at different UE
locations with respect to different SNR is simulated. The SNR
is defined as the average received signal power at 1 km from
the cell to the noise power ratio. The different UE locations
are cell center, middle, and edge which are referred to be the
area within 0.4 km, between 0.4 km to 0.7 km, and between
0.7 km to1 km, to the cell site, respectively. It is shown that
the UE can detect most cells at the cell edge compared to at
the cell center and at the cell middle in high SNR regimes,
which agrees with intuition that the UE at cell edge has a
better overall signal reception from its neighboring cells.
However, in low SNR regimes, the better performance is
obtained at cell center than at cell middle. This is because the
UE at cell center can better estimate the channel to its serving
cell and hence cancel its signal for other cell detection, and
accurate detection and channel estimation for the first cell is
especially important for other cells in low SNR regimes.
4.4 Cell Detection with respect to the Number of
Candidate Cells
Fig 6 Number of detected cells at different ue locations (cell
edge, middle and center) with respect to the number of
candidate cells.
In this Number of detected cells at different UE locations (cell
edge, middle, and center) with respect to the number of
candidate cells is simulated. The UE is equipped with a single
antenna and SNR = 20 dB. When the UE is in edge both the
number of detected cells and detection probability decreases
with the increase in number of candidate cells The same is
obtained for cell center and cell middle. This shows the effect
of candidate cell set on the system. Thus the candidate cell
number should be reduced in practical system to improve the
performance.
5. CONCLUSIONS AND FUTURE WORK
This work offered an insight into synchronization and cell
search in future LTE Mobile communication systems.
Therefore two synchronization signals, the PSS and SSS are
defined by 3GPP. The PSS on the one hand allows precise
estimation of the N2(ID). This estimation is made possible
through exploitation of the ideal cyclic auto - correlation
properties of the used Zadoff-Chu sequences.In addition the
base station allows it’s identification by the SSS which allow
the computation of the cell-ID. Through interleaving of
multiple sequences , which have ID depending cyclic shifts
the UE is able to estimate the IDs using correlation. Finally
the neighbour cell search in LTE systems under various
channel conditions and number of neighbour cells at different
UE locations with respect to different SNR has been
simulated. The above works has been generated by simulating
the scenario in LTE System Level Simulator. This can be
extended to perform interference reduction and handoff
process when a UE moves form one cell to another in LTE
system.
0 100 200 300 400 500 600
1
1.5
2
2.5
3
3.5
4
4.5
NUMBER OF CANDIDATE CELLS
NUMBEROFDETECTEDCELLS
NUMBER OF DETECTED CELLS AT DIFFERENT UE LOCATIONS
Center (1Rx)
Middle (1Rx)
Edge (1Rx)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 546
REFERENCES
[1]. Cell search and cell selection in UMTS LTE by Rohde &
Schwarz.
[2]. Wikipedia. (2011). 3GPP Long Term Evolution
[3]. Synchronization and Cell Search Seminar LTE:: Derr
Mobiillf funk derr Zukunfftt Fabian Schuh University
Erlangen-Nürnberg Chair of Mobile Communications. January
2010.
[4]. 3GPP. (n.d.). 3GPP TR 25.913 - v7.3.0, Requirements for
EUTRA and EUTRAN Available:
http://www.3gpp.org/ftp/Specs/archive/25%5Fseries/25
[5]. A. Roessler, Cell Search and Cell Selection in UMTS
LTE. Munich, Germany: , 2009.
[6]. G. Li, and G. L. Stüber, Eds., Orthogonal Frequency
Division Multiplexing for Wireless Communications. New
York: Springer, 2006.
[7]. European Telecommunications Standards Institute, 3GPP
TS 36.211 version 9.1.0 Release 9, Sophia Antipolis, France:
ETSI, 2010. [15] H. G.Myung, J. Lim, and D. J. Goodman,
“Single Carrier FDMA forUplink Wireless Transmission,”
IEEE Veh. Technol. Soc., vol. 1, no. 3, pp. 30-38, Sept. 2006.
[8]. A Novel Low Complexity Cell Search Scheme for LTE
Systems Pin-Kai Tseng, Sen-Hung Wang, Student Member,
IEEE and Chih-Peng Li, Member, IEEE,.

More Related Content

What's hot

Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsRoger Gomes
 
System level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksSystem level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksijwmn
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERSvtunotesbysree
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...ijwmn
 
International Journal of Computer Science and Security Volume (3) Issue (5)
International Journal of Computer Science and Security Volume (3) Issue (5)International Journal of Computer Science and Security Volume (3) Issue (5)
International Journal of Computer Science and Security Volume (3) Issue (5)CSCJournals
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vSURESHA V
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
A novel approach for mobility management
A novel approach for mobility managementA novel approach for mobility management
A novel approach for mobility managementijwmn
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switchesBhavik Vashi
 
Research on pilot based channel estimation for lte downlink
Research on pilot based channel estimation for lte downlinkResearch on pilot based channel estimation for lte downlink
Research on pilot based channel estimation for lte downlinkIAEME Publication
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hocijmnct
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 

What's hot (19)

Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home Applications
 
System level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksSystem level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networks
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
 
International Journal of Computer Science and Security Volume (3) Issue (5)
International Journal of Computer Science and Security Volume (3) Issue (5)International Journal of Computer Science and Security Volume (3) Issue (5)
International Journal of Computer Science and Security Volume (3) Issue (5)
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
A novel approach for mobility management
A novel approach for mobility managementA novel approach for mobility management
A novel approach for mobility management
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Research on pilot based channel estimation for lte downlink
Research on pilot based channel estimation for lte downlinkResearch on pilot based channel estimation for lte downlink
Research on pilot based channel estimation for lte downlink
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hoc
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 

Viewers also liked

Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationseSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumeSAT Publishing House
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acideSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain ofeSAT Publishing House
 
A study to improve the quality of image enhancement
A study to improve the quality of image enhancementA study to improve the quality of image enhancement
A study to improve the quality of image enhancementeSAT Publishing House
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack oneSAT Publishing House
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issueseSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...eSAT Publishing House
 
A novel methodology for test scenario generation based on control flow analys...
A novel methodology for test scenario generation based on control flow analys...A novel methodology for test scenario generation based on control flow analys...
A novel methodology for test scenario generation based on control flow analys...eSAT Publishing House
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labvieweSAT Publishing House
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...eSAT Publishing House
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...eSAT Publishing House
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingeSAT Publishing House
 
An approach of composite materials in industrial
An approach of composite materials in industrialAn approach of composite materials in industrial
An approach of composite materials in industrialeSAT Publishing House
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudseSAT Publishing House
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss surveyeSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perceptioneSAT Publishing House
 

Viewers also liked (20)

Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applications
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminum
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
A study to improve the quality of image enhancement
A study to improve the quality of image enhancementA study to improve the quality of image enhancement
A study to improve the quality of image enhancement
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...
 
A novel methodology for test scenario generation based on control flow analys...
A novel methodology for test scenario generation based on control flow analys...A novel methodology for test scenario generation based on control flow analys...
A novel methodology for test scenario generation based on control flow analys...
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labview
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
An approach of composite materials in industrial
An approach of composite materials in industrialAn approach of composite materials in industrial
An approach of composite materials in industrial
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss survey
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 

Similar to LTE Cell Search & Tracking

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Lte access procedure
Lte access procedureLte access procedure
Lte access procedureMones Tarazi
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
User equipment geolocation depended on long-term evolutionsignal-level measur...
User equipment geolocation depended on long-term evolutionsignal-level measur...User equipment geolocation depended on long-term evolutionsignal-level measur...
User equipment geolocation depended on long-term evolutionsignal-level measur...IJECEIAES
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Comparison of Health Care System Architectures
Comparison of Health Care System ArchitecturesComparison of Health Care System Architectures
Comparison of Health Care System ArchitecturesIJEACS
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Fast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte systemFast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte systemeSAT Journals
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
 

Similar to LTE Cell Search & Tracking (20)

CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Lte access procedure
Lte access procedureLte access procedure
Lte access procedure
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
User equipment geolocation depended on long-term evolutionsignal-level measur...
User equipment geolocation depended on long-term evolutionsignal-level measur...User equipment geolocation depended on long-term evolutionsignal-level measur...
User equipment geolocation depended on long-term evolutionsignal-level measur...
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Comparison of Health Care System Architectures
Comparison of Health Care System ArchitecturesComparison of Health Care System Architectures
Comparison of Health Care System Architectures
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Rs
RsRs
Rs
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
O026084087
O026084087O026084087
O026084087
 
Fast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte systemFast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte system
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

LTE Cell Search & Tracking

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 542 SEARCHING AND TRACKING OF NEIGHBORING BASE STATIONS S. Jacqulin Veda Jancy1 , B. Jesvin Veancy2 , P.Yogesh3 1 M.E Communication Systems, Easwari Engineering College, India 2 Assistant professor (Sl Gr), Easwari Engineering College, India 3 Dept of Information Science and Technology, Anna University, Chennai, India Abstract Long term evolution (LTE) is considered to be a key technology for the next generation of cellular telecommunications. Searching and tracking of neighboring cells is important for cellular network management such as handover and base station cooperation. The cell search procedure begins when the mobile unit is powered on and it starts communicating with the strongest base station. The main objective is to find the neighbor cells in the LTE system. Simulations are done using LTE simulator to find the probability of detecting the number of neighbor cells under various channel conditions and at different UE locations. Keywords: Long Term Evolution (LTE), Cell search, synchronization, PSS, SSS. ---------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The Long Term Evolution (LTE) is an upcoming mobile communication standard that is specified by the 3rd Generation Partnership Project (3GPP). LTE is a wireless broadband technology designed to support roaming Internet access via cell phones and handhelds. The goal of LTE is to provide low-latency, high-data-rate and packet-optimized radio-access technology. LTE system supports peak data rates of 326 Mb/s with 4 X 4 MIMO within 20 MHz bandwidth. LTE system supports flexible bandwidths. It supports OFDMA and SC-FDMA access schemes. In addition to FDD (Frequency Division Duplexing) and TDD (Time Division Duplexing), half duplex FDD is also allowed to support low cost UE. OFDMA allows data to be directed to or from multiple users on a subcarrier – by - subcarrier basis for a specified number of symbol periods. The SC-FDMA has much lower PAPR(Peak to Average Power Ratio) when compared to OFDMA which makes it a great choice for uplink transmission in LTE. In mobile cellular systems, initial cell search is an important task for a user equipment (UE) to get synchronized to an eNode B (eNB) when the UE starts up. Reliable searching and tracking of neighboring cells around the user equipment (UE) in addition to the serving cell provides rich information for cellular network management and applications, such as handover, base station cooperation, and location inference. For example, reliable cell detection (i.e., with a high detection probability) leads to efficient handover of the UE to the best neighboring cell. The number of detected cells is also an important metric for many applications: (i) the performance of UE’s location inference highly depends on the number of detected cells [4] (ii) in heterogeneous network deployment more detected cells will give the base station a larger flexibility to offload the traffic and optimize the network throughput via inter-cell interference coordination (ICIC).Cell identity (ID) information in LTE systems is carried by the signals in both the primary and secondary synchronization channels called primary and secondary synchronization signals (PSS and SSS) respectively. While the PSS is mainly dedicated for synchronization and the SSS provides complete information about the cell ID. 2. CELL SEARCH In the LTE system the mobile unit has to search for the available radio cells and lock to one of them to continue communication while moving between the cells. Multiple mobile unit users simultaneously try to access the same set of radio cells and also the UE mobile unit begins it search blindly without any knowledge of the bandwidth it has allocated. Hence the initial cell search procedure must also be implemented in timing and frequency synchronization[1]. UE will tune its radio turn by turning to different frequency channels depending upon which bands it is supporting. Assuming that it is currently tuned to a specific band / channel UE first finds the primary synchronization signal (PSS) which is located in the last OFDM symbol of first time slot of the first sub frame (sub frame 0) of radio frame. This enables UE to be synchronized on sub frame level. The PSS is repeated in sub frame 5 which means UE is synchronized on 5ms basis since each sub frame is 1ms.UE is also able to obtain physical layer identity (0 to 2) from PSS. In the next step UE finds the secondary synchronization signal (SSS). SSS symbols are also located in the same sub frame of PSS but in the symbol before PSS. From SSS UE is able to obtain physical layer cell identity group number (0 to 167). Using physical layer identity and cell identity group number, UE knows the cell ID for the cell . LTE systems consist of 504 unique physical layer cell identities. To accommodate and
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 543 manage this large amount, the cell identities are divided into 168 unique cell layer identity groups. Each group further consists of three physical layer identities. This is usually represented as: N(1)ID=0….167 and N(2)ID=0,1,2. Cell ID is calculated as 3 × N(1)CellID + N(2)CellID In LTE system there are 504 Physical Cell Identities. LTE can address 504 cell identity with the PSS and SSS . In the LTE air interface, Physical Layer Cell Identity is used for cell identification and channel synchronization. The N(1)CellID and N(2)CellID values are also used to .seed the Secondary Synchronization Signal and Primary Synchronization Signal. The cell identity is a number from 0 to 503 and it distinguishes a cell from its immediate neighbors. 3. SYNCHRONIZATION SIGNALS DETECTION The hierarchical cell search procedure is performed in two steps using two signals detection: 1. Primary Synchronization Signal and 2. Secondary Synchronization Signal Fig 1 Cell Search The synchronization signals have 72 subcarriers reserved for them, but they use only 62 of the 72 subcarriers. The Primary Synchronization signal first determines one of three cell identities (0, 1, 2) and it is also represented by N(2)ID.The secondary synchronization signal is used to determine a cell ID between 0 and 167 represented by N(1)ID. 3.1 PSS Detection The main function of PSS is to detect the boundary of a frame where non-coherent detection method has to be used at the receiver since there is no known reference information initially. Matched filter is a basic non - coherent detection method that can be used to detect PSS efficiently. The sequence is mapped to the subcarriers around DC and transformed into time domain by 64bit IDFT[4]. To detect this signal at the receiver, the correlation with the domain signal of the ZC sequence is calculated. If the maximum value of correlation is greater than a preset threshold, then corresponding OFDM symbol timing is noted and the symbol is assumed to contain the PSS corresponding to the reference sequence. The PSS value is provided by index of the correlation maximizing reference sequence. The UE knows which PSS sequence is being received and it has a known reference of the signal, the UE can now estimate the channel using its known reference of the original signal. At the end of this step the UE knows: 1. Slot boundary. 2. Cell ID index (PSS value) In FDD system the PSS is transmitted in sub frame 0 or sub frame 4. So with the detection of PSS, the UE knows it is synchronized with either sub frame 0 or sub frame 5. Determination of whether it is sub frame 0 or sub frame 5 will enable frame timing synchronization which will be performed with the detection of SSS. 3.2 SSS Detection The SSS is transmitted by the same subcarriers as those of PSS in the immediately preceding symbol. Therefore we can assume that these channel parameters remain the same for the SSS subcarriers as well. The SSS is a binary sequence of +1’s & -1’s formed after the interleaving of two sequences. Furthermore these two sequences are scrambled with two binary sequences which depend on N2(ID) . Therefore the detection process proceeds by first deriving the scrambling sequences, then finding the values and then finally computing the value by a simple table look-up procedure. The sequence d(0)…..d(61) used for the secondary synchronization signal is an interleaved concatenation of two length-31 binary sequences. The concatenated sequence is scrambled with a scrambling sequence given by the PSS. The combination of two length-31 sequences defining the secondary synchronization signal differs between sub frame 0 and sub frame 5 according to: d(2n)=s0 (m0) (n)c0(n) in slot0 (1) d(2n)=s1 (m1) (n)c0(n) in slot10 (2) d(2n+1)=s1 (m1) (n)c1(n)z1 (m0) (n) in slot 0 (3) d(2n+1)=s0 (m0) (n)c1(n)z1 (m1) (n) in slot 10 (4) The above equation clearly indicates that the SSS is different for sub frame 0 and sub frame 5. So, detection of SSS will enable UE to determine the frame timing as well. The detection of SSS is a coherent process. Since the UE has determined an estimate of the channel from the PSS, it now removes the effects of the channel before it detects the SSS. The SSS and PSS are closely located in time to enable the coherent detection.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 544 The block diagram in Figure 2 assists in descrambling the SSS signal. The following steps illustrate the detection of the SSS. 1. Channel effects are removed from the SSS and any frequency offset determined earlier is corrected. 2. The received signal is de-interleaved into the odd part and the even part, i.e. d(2n) and d(2n+1).Since N(2)ID is known from the PSS, the scrambling code c0(n) is already known to the UE and can be descrambled from the received signal. So the UE now correlates the descrambled signal with copies of s0 (m0) (n) to determine a match. Now, the UE has determined m0 or m1. 3. Now that the UE knows one value of m0 or m1, it can use it to descramble the sequence z. Fig 2 SSS Detection 4. The equations (1) to(4) is used to find the solution. z1 (m o ) (n)=Z((n+(m0 mod8))mod31) 5. Say, the UE is in subframe zero, c0 was known to the UE, m0 was determined using s0(.) and using this m0 ,z1 was descrambled. Similarly m1 is calculated. So, now the Cell Identity: NcellID = 3 N(1)ID + N(2)ID With this the UE is also able to determine the sub frame number, thus completing frame timing synchronization also. At the end of this step, the UE has determined the radio cell ID and Radio Frame value is determined. Thus the neighbor cell identity is determined. 4. SIMULATION RESULTS The cell search in LTE System under different channel conditions is simulated in LTE system level simulator. We consider the deployment of 57 cells with wrap - around structure and inter - cell distance equal to1.732 km. The SNR is defined as the average received signal power at 1 km from the cell to the noise power ratio. The cell center, middle, and edge are referred to be the area within0.4 km, between 0.4 km to 0.7 km, and between 0.7 km to1 km, to the cell site, respectively. Basic Parameters for LTE Simulation Environment Frequency 2.0 GHz Receiver noise figure 9 dB System Bandwidth 5MHz Thermal noise density -174 dBm/Hz Inter eNodeB distance 1732m Macroscopic pathloss 128.1 + 37.6 log10(R) eNodeB TX Power 20 watts UE speed 5 km/h Transmission time interval 100 Cyclic prefix normal 4.1 Number of Neighboring Cells in Flat Fading Channel In this the LTE network consists of Nt different cells with distinct cell IDs where Nt=57,100,200,504 .The probability of finding the number of neighbouring cells in flat fading channel is simulated. Fig 3 Probability of detection with respect to the number of neighboring cells in flat fading channel It is shown that when the number of cells in a system is small (Nt=57) then the probability of neighbor cell detection is higher and when the systems cell number is large the probability of neighbor cell detection is reduced.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 545 4.2 Number of Neighboring Cells in Multi Path Fading Channel Fig 4 Probability of detection with respect to the number of neighboring cells in multi path fading channel In this the LTE network consists of Nt different cells with distinct cell IDs where Nt=57,100,200,504 .The probability of finding the number of neighboring cells in multipath fading channel is simulated. It is shown that even when the number of cells in a system is small (Nt=57) the probability of neighbor cell detection is less when compared to flat fading channel. The probability of detection is less because of the reflection of radio waves by the obstacles present in the environment. 4.3 Cell Detection with respect to SNR Fig 5 Number of detected cells at different UE locations (cell edge, middle and center) with respect to the SNR In this the LTE network consists of 57 different cells with distinct cell IDs. The number of detected cells at different UE locations with respect to different SNR is simulated. The SNR is defined as the average received signal power at 1 km from the cell to the noise power ratio. The different UE locations are cell center, middle, and edge which are referred to be the area within 0.4 km, between 0.4 km to 0.7 km, and between 0.7 km to1 km, to the cell site, respectively. It is shown that the UE can detect most cells at the cell edge compared to at the cell center and at the cell middle in high SNR regimes, which agrees with intuition that the UE at cell edge has a better overall signal reception from its neighboring cells. However, in low SNR regimes, the better performance is obtained at cell center than at cell middle. This is because the UE at cell center can better estimate the channel to its serving cell and hence cancel its signal for other cell detection, and accurate detection and channel estimation for the first cell is especially important for other cells in low SNR regimes. 4.4 Cell Detection with respect to the Number of Candidate Cells Fig 6 Number of detected cells at different ue locations (cell edge, middle and center) with respect to the number of candidate cells. In this Number of detected cells at different UE locations (cell edge, middle, and center) with respect to the number of candidate cells is simulated. The UE is equipped with a single antenna and SNR = 20 dB. When the UE is in edge both the number of detected cells and detection probability decreases with the increase in number of candidate cells The same is obtained for cell center and cell middle. This shows the effect of candidate cell set on the system. Thus the candidate cell number should be reduced in practical system to improve the performance. 5. CONCLUSIONS AND FUTURE WORK This work offered an insight into synchronization and cell search in future LTE Mobile communication systems. Therefore two synchronization signals, the PSS and SSS are defined by 3GPP. The PSS on the one hand allows precise estimation of the N2(ID). This estimation is made possible through exploitation of the ideal cyclic auto - correlation properties of the used Zadoff-Chu sequences.In addition the base station allows it’s identification by the SSS which allow the computation of the cell-ID. Through interleaving of multiple sequences , which have ID depending cyclic shifts the UE is able to estimate the IDs using correlation. Finally the neighbour cell search in LTE systems under various channel conditions and number of neighbour cells at different UE locations with respect to different SNR has been simulated. The above works has been generated by simulating the scenario in LTE System Level Simulator. This can be extended to perform interference reduction and handoff process when a UE moves form one cell to another in LTE system. 0 100 200 300 400 500 600 1 1.5 2 2.5 3 3.5 4 4.5 NUMBER OF CANDIDATE CELLS NUMBEROFDETECTEDCELLS NUMBER OF DETECTED CELLS AT DIFFERENT UE LOCATIONS Center (1Rx) Middle (1Rx) Edge (1Rx)
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 546 REFERENCES [1]. Cell search and cell selection in UMTS LTE by Rohde & Schwarz. [2]. Wikipedia. (2011). 3GPP Long Term Evolution [3]. Synchronization and Cell Search Seminar LTE:: Derr Mobiillf funk derr Zukunfftt Fabian Schuh University Erlangen-Nürnberg Chair of Mobile Communications. January 2010. [4]. 3GPP. (n.d.). 3GPP TR 25.913 - v7.3.0, Requirements for EUTRA and EUTRAN Available: http://www.3gpp.org/ftp/Specs/archive/25%5Fseries/25 [5]. A. Roessler, Cell Search and Cell Selection in UMTS LTE. Munich, Germany: , 2009. [6]. G. Li, and G. L. Stüber, Eds., Orthogonal Frequency Division Multiplexing for Wireless Communications. New York: Springer, 2006. [7]. European Telecommunications Standards Institute, 3GPP TS 36.211 version 9.1.0 Release 9, Sophia Antipolis, France: ETSI, 2010. [15] H. G.Myung, J. Lim, and D. J. Goodman, “Single Carrier FDMA forUplink Wireless Transmission,” IEEE Veh. Technol. Soc., vol. 1, no. 3, pp. 30-38, Sept. 2006. [8]. A Novel Low Complexity Cell Search Scheme for LTE Systems Pin-Kai Tseng, Sen-Hung Wang, Student Member, IEEE and Chih-Peng Li, Member, IEEE,.