SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
DOI: 10.5121/ijcnc.2022.14602 21
IMPROVEMENTS FOR UPLINK LONG TERM
EVOLUTION (UL-LTE) IN HETEROGENEOUS
NETWORK USING DYNAMIC SPECTRUM
ALLOCATION TECHNIQUE
Nurzati Iwani Othman1
, Ahmad Fadzil Ismail1
,
Khairayu Badron1
, Wahidah Hashim2
and Sofia Pinardi3
1
Department of Electrical and Computer Engineering,
International Islamic University Malaysia, Gombak, Kuala Lumpur, Malaysia
2College of Computer Science & Info Tech,
Universiti Tenaga Nasional, Kajang, Selangor, Malaysia
3
Electrical Department, Universitas Muhammadiyah Prof. Dr. Hamka, Jakarta, Indonesia
ABSTRACT
Several interference mitigation strategies can be used in LTE networks to meet the consumers' increasing
need for faster data speeds. Dynamic Spectrum Allocation (DSA), which maintains spectrum in a
converged radio system and distributes it across all participating radio terminals, is one of the most
promising solutions. However, the fundamental obstacle to achieving increased network capacities is
increased inter-cell interference. The aim of this paper is to analyse the effectiveness of a newly proposed
DSA technique by comparing its bit error rate (BER) and throughput (TP) with a typical uplink LTE
configuration. To maximise throughput in a heterogeneous network, the suggested DSA technique utilises
the Nash Bargaining Solution (NBS) scheme, a cooperative game theory that could correlate with the bit
error rate. The software tool GNU Radio, which offers signal-processing blocks to develop software-
defined radios and signal-processing systems, was used to create the setups. After the simulations were
performed, the BER values were recorded and compared, while the TP values were established and
computed appropriately. According to the results, the uplink (UL-LTE) architecture with DSA has an
improved TP and a lower BER value. As a result, spectral efficiency can also be improved.
KEYWORDS
Long Term Evolution (LTE), Dynamic Spectrum Allocation (DSA), Single Carrier-Frequency Division
Multiple Access (SC-FDMA), Bit Error Rate (BER), Throughput (TP).
1. INTRODUCTION
The radio spectrum has become increasingly crowded since the invention of radio
communications due to a variety of applications. Such a circumstance undoubtedly contributed to
the point at which various users practically used the entire available radio spectrum. In turn, this
will cause interference to develop within the network. User equipment (UEs) and diverse base
stations (BS), such as macrocell, picocell, and femtocell, are frequently components of
heterogeneous networks. Both uplink (UL) and downlink (DL) transmission can be used to
communicate between them. Data transmission from the user device (UE) to the BS takes place
during the UL communication, and vice versa during the DL communication. These
communications occasionally tend to use the same carrier frequencies, which can lead to
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
22
interferences known as cross-tier interference within the network. A network scenario including a
macrocell BS, a femtocell BS, macrocell users, and femtocell users is shown in Figure 1. To fulfil
the increased demand for high-speed data services, previous researchers suggested that a new
network deployment consisting of a normal cellular network and femtocells may be established
[1].
Figure 1. UL and DL communication scenario in a heterogeneous network
Due to the lower received signal strength from the macrocell, femtocells are typically installed
indoors. In turn, by regulating the attenuation when signal transmission flows through walls,
interior coverage can be made better. Femtocells also aid in increasing network capacity by
decreasing the distance between users and BSs. Researchers have also highlighted how a
heterogeneous network can increase capacity, maximise spectrum, lower capital, and operating
costs, and enhance the network architecture from the standpoint of the user in addition to these
advantages [2]. In a heterogeneous network, macrocells and small cells can be assigned a radio
frequency spectrum that is similar [3]. Femtocells, on the other hand, prefer to operate in Closed
Subscriber Group (CSG) mode, which only permits a small number of authorised small cell
customers to join. As a result, there are coverage gaps within the macrocells known as "black
holes," where users who are macro and who are within the femtocells' transmission range but
who experience substantial inter-cell interference cannot be served by either device (ICI). This
prevents reliable DL transmission, which is why it is known as the victim user equipment (UE).
Next-generation heterogeneous network deployments consider operating small cell densification
because it is the limiting element for increasing network capacities [4].
Cross-tier interference was found to occur for both the UL and DL segments in propagation
scenarios involving macrocells and femtocells [5]. Numerous ways had been presented to reduce
this interference, including those reported in [6] and [7]. These tactics have been created to
increase the effectiveness of heterogeneous networks when compared to those stated in [8] and
[9]. However, there are still several issues with these methods, and neither do they completely
remove the interference, nor do they demonstrate any appreciable effects. Manufacturers of
femtocells have expressed their opinion about selecting what may be regarded as the optimal
mitigation strategy to be implemented into the "enhanced" femtocell design configuration since
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
23
time is of the essence. A viable mitigation method that can reduce the aforementioned cross-tier
interference is urgently needed.
The rest of the papers are organized as follows: Section 2 discusses the related works discussing
interference mitigation techniques, the implemented DSA technique using GNU Radio software,
section 3 details LTE configuration simulation setups for typical and DSA UL-LTE and
throughput calculation expressions, section 4 presents the results and discussions and lastly,
section 5 summarizes the conclusion.
2. RELATED WORKS
Currently being studied are a wide variety of interference mitigation strategies. A method based
on time domain muting (TDM) that uses symbol efficiency (SE) and projected cell load
circumstances as metrics to determine the muting ratio of resources has been suggested [10]. To
verify the projected higher throughput performances, system-level simulation was carried out.
The dynamic cross-tier interference coordination mechanism (D-CTIC) was established and only
used when the interfered user equipment is unsure of its quality-of-service constraint, according
to research on the Spectral Efficiency and Management of Cross-Tier Interference in a Femtocell
Network [11]. As a result, a higher cell spectral efficiency can be attained by tolerating some
cross-tier interference. Additionally, a soft frequency reuse strategy was created, which makes the
promise that it will reduce interference while increasing cell throughput [12]. The plan was
created when the user equipment detected significant interference from femtocells that were
nearby. In addition, earlier researchers have suggested a technique for managing interference that
involved single-hop, multi-hop, and multi-way network setups. The investigation revealed several
issues, including inter-cell interference, out-of-cell interference, and more [13]. Table 1 shows
the Comparison of Different Interference Mitigation Techniques.
Table 1. Comparison of various techniques for mitigating interference
Author(s)
name and
year
Technique Description Advantages Disadvantages
Singh, R., et.
al., 2014
Resource
partitioning [10]
Suggests tiny cells’
muting
Provide users of
macrocells with
greater service
quality by
reducing holes
in their
macrocell
coverage
The spectrum
efficiency factor,
which can increase
throughput, is not
taken into account
Zhou, F. et.
al., 2013
D-CTIC [11] Utilized once the
interfering UE is
unable to maintain its
effectiveness.
Maximizes
spectrum
efficiency
Due to its exclusive
concentration on
femtocells, it is
unsuitable for
heterogeneous
networks
Khandare, R.,
2015
CASFR method
[12]
When a UE
acknowledges
significant
interference from
nearby femtocells,
the scheme is formed
Decreases
interference,
which enhances
the cell's
throughput
The spectral
efficiency factor is
neglected
Sirhan, N. N.
and Martinez-
Multi-Agent Q-
Learning (MAQL)
Produces
collaborative and
Maximizes
spectrum
Lack of
heterogeneity factor
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
24
Ramon, M.,
2022
[14] competitive
scheduling algorithm
efficiency
Cheng,H.,
2014
Dynamic
spectrum
allocation [15]
Utilize the
fluctuating traffic of
various wireless
network systems
Maximizes
spectrum
efficiency
Requires the
additional study to
determine how well
the DSA design
performs
The Dynamic Spectrum Allocation (DSA) technique, another interference mitigation method, has
undergone extensive research for a variety of implementations. Researchers have hypothesised
that the DSA scheme might guarantee the equity of the spectrum allocation by taking the
economic element, spectrum use, and restricting the incidence of inter-system interference
correspondingly [16]. The concept of the throughput maximization factor, which is crucial for
mitigating interference, was left out of the study. Additionally, for cluster-based cognitive radio
ad hoc networks, other researchers presented a novel cross-layer DSA that permits the
improvement of throughput, power consumption, and packet transmission latency. By grouping
the networks into clusters according to the power level of the nodes, the current speed, and the
availability of the spectrum, the proposed strategy was put into practise [17].
3. THE IMPLEMENTED DSA TECHNIQUE USING GNU RADIO SOFTWARE
The Nash Bargaining Solution algorithm, which is also known as the DSA algorithm, was used in
earlier research [15] and has been enhanced in this study. The improvement made in this
algorithm is that the algorithm is simplified so that it promotes low complexity in circuitry which
can conserve the bandwidth of a network.
It is assumed that the UEs sends the request notification which is low data transmissions to the
BS during UL communication. The entire bandwidth is consumed by one symbol at a time
because the data modulation of the UL connection stipulates that the signal is to be transmitted in
serial mode. As a result, the allocation of subcarriers is not considered for UL transmission.
Figure 2 shows the flow chart for the BS's inclusion of packet allocation and recognition. The
BS's scheduler, which controls packet release, dynamic resource allocation, and detection of UEs,
is its central processing unit. First off, the BS offers a buffer where the identifier (ID) and
message type (MT) of the active UEs can be placed. When the UE's ID appears in the buffer, the
BS will transmit a notification or data to the UE.
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
25
Figure 2. The flow chart of the scheduler of the BS
Table 2 displays the various message formats for packets sent from UEs.
Table 2. The MTs sent between UE and BS.
MT UE BS
0 Request BS notifies UE
1 UE notifies BS Transmission of data
2
UE notifies BS of the end of
transmission
BS notifies UE of the end of
transmission
From Table 2, it is understood that MT 0 specifies that the packet is being requested by the UE,
whereas type 1 specifies that the packet is a confirmation that the UE has received the
notification from the BS and lastly, type 2 specifies that the packet is an acknowledgement that
the data transmission has been completed.
End
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
26
4. LTE CONFIGURATION SIMULATION SETUPS
4.1. Typical Uplink LTE (UL-LTE) Configuration
For UL setup in LTE, the Single Carrier-Frequency Division Multiple Access (SC-FDMA)
modulation is utilised. It combines OFDM's resistance to multipath with the low peak-to-average
power ratio (PAPR or PAR) of single carrier techniques. Figure 3 and Figure 4 respectively
depict the flow diagram of the UL-LTE configuration for the modulator and demodulator.
The upper portion of Figure 3 depicts the data packets' mapping for transmission whereas SC-
FDMA transmission is implemented in the lower portion. Because SC-FDMA is utilised as the
multiplexing technique, this setup is regarded as an UL-LTE configuration. Data are generated by
the Random Source block and sent to the stream blocks, where they are transformed into stream
data. Later, the header and payload bits of the stream data are separated, and they are sent via the
Chunks to Symbols blocks to be transformed into symbols. They are then translated into symbols
and sent to the SC-FDMA Carrier Allocator block, where the parallelization of the original
resultant data was accomplished. The system then carried out subcarrier mapping and allocated
the frequency domain data symbols to the larger subcarrier group before passing them through to
FFT and SC-FDMA Interleaver. The Cyclic Prefix block is then applied to the pre-OFDM
symbols to cancel the Inter-Symbol Interference (ISI).
Figure 3. The modulation of UL-LTE setup with SC-FDMA
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
27
Figure 4. The demodulation of UL-LTE setup SC-FDMA
Figure 4 depicts the assembled demodulator portion of the setup. Through the Schmidl and Cox
OFDM Sync block, the SC algorithm was implemented in this arrangement. The processing of
the received data is carried out by the Header / Payload demultiplexer. The first channel taps are
calculated by the Channel Estimator and are then transmitted via tags to the others. other
programming blocks such as the SC-FDMA Frame Equalizer, SC-FDMA De-interleaver, and
SC-FDMA Packet Header Parser are implemented in the process of receiving and equalising the
reception. The Payload stream was then converted into Payload IQ for demodulation, which is
shown in the lower portion, by passing via the FFT, Symbol choice, and OFDM Serializer blocks.
The Error Rate block was also used to determine the bit error rate of the flow graph when the
configuration was actuated by interference, which was created by the Noise Source block.
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
28
4.2. Uplink LTE (UL-LTE) Configuration incorporating DSA (DSA UL-LTE)
Figure 5. Flow graph of DSA UL-LTE configuration with SC-FDMA modulator
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
29
Figure 6. Flow graph of DSA UL-LTE configuration with SC-FDMA demodulator
The blocks used in the flow graph for the DSA UL-LTE configuration are essentially the same as
those used for the typical UL-LTE configuration. The source block is the only difference; in a
typical design, this source block generates a random set of data. The UE Core block serves as the
data source for the flow graph that incorporates DSA. As a result, the DSA UL-LTE setup
operates very identically to the one without DSA implementation. Figure 5 and Figure 6 both
depict the flow graphs for the modulator and demodulator components of the DSAUL-LTE setup.
4.3. Throughput Calculation
The following formula is used to determine the throughput for both the standard LTE
configuration and the UL configuration with DSA implementation. The set of formulas used to
determine capacity and the Signal-to-Interference Plus Noise Ratio (SINR) were modified from
previously conducted research [18]. Based on the constraints of the laboratory, some parameter
values in these calculations were assumed. The parameters for the typical UL-LTE configuration
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
30
and the configuration with DSA implementation are listed in Table 3. The building is assumed to
be a single-story structure, which accounts for the absence of any penetrated floors.
Table 3. Assumptions for the mathematical expressions.
Description Value
Transmitter and receiver distance dTX-RX [m] 20
Factor of outshadowing, out
[dB] 10
Number of penetrated floors, n 0
According to Table 3, dTX-RX represents the separation between the transmitter and receiver, and
out
represents the outshadowing factor, which has a Gaussian distribution with a mean and
standard deviation of zero. Equation (1) below, where is the subcarrier assignment and Cm,n is the
capacity of the serving macrocell, expresses the total system throughput, TX.
𝑇𝑋 = ∑ ∑ đ›œđ‘„,𝑛. đ¶đ‘„,𝑛
𝑁
𝑋 (1)
The capacity formula was depicted from [9] and is expressed in Equation (2) below,
đ¶đ‘š,𝑛 = ∆𝑓. log2(1 + đ‘Žđ›Ÿđ‘š,𝑛) (2)
where đ›Ÿđ‘š,𝑛 is the total SINR for the system and 𝑎 = −1.5 ln(5đ”đžđ‘…).
5. RESULT AND DISCUSSION
5.1. Generated Waveform and BER values for Typical UL-LTE Configuration and
DSA UL-LTE Configuration
Table 4. Generated Waveform and BER values
Type of
configuration
Typical UL-LTE DSA UL-LTE
Waveform
BER (%) 0.5 0.1
Table 4 displays the generated signals and BER values for both configurations with the noise
amplitudes set to 1. Both configurations’ signals have unique forms that are easily distinguished.
When compared to a signal with DSA implementation, the signal produced for the usual LTE
configuration demonstrates that it has higher peaks. The interference for the conventional LTE
design is also stated to be more than it is for DSA deployment.
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
31
Figure 7. Comparison of BER values for typical UL-LTE and DSA UL-LTE configurations
Figure 7 compares the UL communication BER values between the typical UL-LTE
configuration and the DSA UL-LTE configuration. The figure shows that, with a very high
difference of at least 0.35 percent, the value of BER of the DSA UL-LTE configuration is always
lower than that of the typical UL-LTE configuration when the noise amplitude spans from 1 to
10. Furthermore, it is also clear that the BER values for the typical UL-LTE arrangement remain
constant at 0.5. For a typical UL-LTE arrangement, there are no significant differences in the
BER values, and the readings appear to be nearly static when the noise amplitude is changed
from 1 to 10. When compared to the case with DSA UL-LTE, it is clear that the BER values
increase for noise amplitudes between 1 and 4 and decrease only slightly for noise amplitudes
above 5. When the noise amplitude is set to 6, it then gradually increases once again. Up until the
noise amplitude reaches 10, the pattern persists. Therefore, it can be concluded that the range of
noise amplitudes affects the DSA UL-LTE configuration but not the BER values of the typical
LTE setup. As can be seen, the typical UL-LTE configuration has far larger BER values than the
DSA UL-LTE design.
The regression line for the DSA UL-LTE configuration is shown in Figure 8. The benefit of
modelling BER as a function of noise amplitude is that it will allow future researchers to test the
efficacy of DSA UL-LTE configurations by simply inserting their preferred noise amplitudes into
the model, from which the BER value can be obtained. To compare the differences between the
typical UL-LTE and the DSA UL-LTE configuration, the root mean squared error (RMSE) for
both configurations will first be determined. The comparison of the RMSE values is done using
the BER data gathered from the simulations.
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
32
Figure 8. Regression Line for DSA UL-LTE Configuration
Equation 3 illustrates the BER model derived for the DSA UL-LTE configuration as a function of
noise amplitude.
BDSA UL-LTE = 0.004N + 0.11 (3)
where BUL-LTE is the throughput and N is the noise amplitude.
Figure 9 depicts the throughput graph comparing typical UL-LTE configuration with DSA UL-
LTE configuration. When the noise amplitude is between 1 and 10, it can be shown that for the
typical UL-LTE arrangement, the graph nearly maintains a straight horizontal line. The graph
displays a smooth curve for the DSA UL-LTE setup when the noise amplitude is between 1 and
10. The typical UL-LTE configuration's throughputs are not significantly impacted by the range
of noise amplitudes because the throughput values are nearly constant. Additionally, the
throughput figures for DSA UL-LTE configurations are consistently higher than those for the
typical UL-LTE setup. Moreover, it can be seen that the throughput for the DSA UL-LTE setup
decreases as the noise amplitude increases.
Figure 9. Comparison of throughputs for typical UL-LTE configuration and DSA UL-LTE
y = 0.0044x + 0.1119
RÂČ = 0.7415
0.00
0.02
0.04
0.06
0.08
0.10
0.12
0.14
0.16
0.18
0 2 4 6 8 10 12
BER
(%)
Noise Amplitude
REGRESSION LINE FOR UPLINK LTE CONFIGURATION WITH DSA (BER VS NOISE
AMPLITUDE)
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
33
Equation 4 illustrates the throughput model for the DSA UL-LTE configuration as a function of
noise amplitude.
TDSA UL-LTE = -1.54N + 124985 (4)
where TUL-LTE is the throughput for DSA UL-LTE and N is the value of noise amplitude.
6. CONCLUSION
The LTE design has been proven to offer higher throughput than a heterogeneous network setup
without the DSA implementation. The simulation results provided evidence in favor of the
proposition that interference in a heterogeneous network can be successfully decreased. The TP
values were established and calculated per the BER values, which were recorded and compared.
According to the results, the DSA UL-LTE architecture has an improved TP and a lower BER
value. To increase spectral efficiency, interferences must be minimized, and system throughput
must be maximized. In the very near future, it is also intended to pursue empirical inquiry
involving implementation using USRP hardware. Given the limitations of the lab, the
experimental design will be based on the hypotheses developed in this study. The outcomes can
show that the system is hardware compatible and thus usable in real-world applications.
CONFLICTS OF INTEREST
All authors declare no conflicts of interest.
ACKNOWLEDGEMENTS
The authors acknowledge the Research Management Centre (RMC) of the International Islamic
University Malaysia (IIUM) and the Malaysian Ministry of Education (MOHE) for the financial
support during the research. The research output is part of the deliverables for the research
funded under IIUM’s Research University Initiatives, (P-RIGS18-005-0005) by International
Islamic University Malaysia to sponsor this research in the creation of novel theories and
concepts.
REFERENCES
[1] Gomez, J.S., Vasseur, A., Vergne, A., Martins, P., Decreusefond, L. & Chen, W., (2015) “A
CaseStudy on Regularity In Cellular Network Deployment” IEEE Wireless Communication Letters,
4(4):1-1.
[2] Hasan, M. K., Ismail, A. F., Abdalla, A. H., Abdullah, K., Ramli, H. A. M., Islam, S. & Badron, K.,
(2014) “Self-Organizing Joint Sensing and Power Allocation Scheme (SJSPA) to Coordinate Cross-
Tier Interference for LTE-A Heterogeneous Network” IEEE 2nd International Symposium on
Telecommunication Technologies (ISTT).
[3] Kien Vu., Sungoh Kwon and Sangchul Oh., (2015) “Cooperative Interference Mitigation Algorithm
in Heterogeneous Networks” IEICE Transactions on Communications
[4] Stanislaus Iwelski, Erfan Majeed, Zijian Bai, Guido H. Bruck & Peter Jung., (2015) “Cooperative
Interference Mitigation in Heterogeneous LTE Networks” IEEE Wireless Communications and
Networking Conference (WCNC 2015) - Track 1: PHY and Fundamentals.
[5] Guo, Y., Yang, Q., Liu, J. & Kwak, K. S. (2016) “Cross-Layer Rate Control and Resource Allocation
in Spectrum-Sharing OFDMA Small Cell Networks with Delay Constraints” IEEE Transactions on
Vehicular Technology.
[6] Hasan, M.K., Chuah, T.C., El-Saleh, A.A., Shafiq, M., Shaikh, S.A., Islam, S. and Krichen, M.,
(2021) “Constriction Factor Particle Swarm Optimization based load balancing and cell association
for 5G heterogeneous networks” Computer Communications, 180, pp.328-337.
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
34
[7] Hasan, M.K., Ismail, A.F., Islam, S., Hashim, W., Ahmed, M.M. and Memon, I., (2019) “A novel
HGBBDSA-CTI approach for subcarrier allocation in heterogeneous network” Telecommunication
Systems, 70(2), pp.245-262.
[8] Hasan, M.K., Ismail, A.F., Islam, S., Hashim, W. and Pandey, B., (2017) “Dynamic spectrum
allocation scheme for heterogeneous network” Wireless Personal Communications, 95(2), pp.299-
315.
[9] Othman, N. I., Ismail, A. F., Hasan, M. K., Badron. K. & Hashim, W. (2018) “Throughput Analysis
on Dynamic Spectrum Allocation Technique to Mitigate Interference on LTE Heterogeneous
Network” In International Journal of Control and Automation, Vol. 11, No. 4 (2018), pp.95-104
[10] Singh, R., Mishra, S. & Murthy, C. S. R., (2014) “A Multi-tier Cooperative Resource Partitioning
Technique for Interference Mitigation in Heterogeneous Cellular Networks” International Workshop
on Resource Allocation, Cooperation and Competition in Wireless Networks, WiOpt– 2014
[11] Zhou, F., Wang, B., Wang, W., Zhang, Y., Lei, M. & Jiang, L. (2013) “Analysis of Spectral
Efficiency and Management of Cross-Tier Interference in Femtocell Network” IEEE 78th Vehicular
Technology Conference (VTC Fall),
[12] Dimple Chaudhari & Reshma Khandare, (2016) “Intercell Interference and Cross-Tier Interference
Mitigation in LTE based Femtocell Network using 'CASFR' Scheme”International Journal of
Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2.
[13] Lee, N & Heath Jr, R. W., (2016) “Advanced Interference Management Technique: Potentials and
Limitations” IEEE Wireless Communications.
[14] Sirhan, N. N. and Martinez-Ramon, M., (2022) “Cognitive Radio Resource Scheduling Using Multi-
Agent Q-Learning For LTE” International Journal of Computer Networks & Communications
(IJCNC) Vol.14, No.2, March 2022
[15] Cheng, H., (2014) “Implementation of Dynamic Resource Allocation for LTE System using GNU
Radio” A Thesis submitted to the Graduate Faculty of George Mason University in Partial
Fulfillment of The Requirements for the Degree of Master of Science Electrical and Computer
Engineering.
[16] Robert, V. N. J. and Vidya, K., (2021) “A comparative study of cooperative and non-cooperative
game model for overlay spectrum access in multihop cognitive radio networks” AIP Conference
Proceedings 2336, 050008.
[17] Zareei, M., Muzahidul Islam, A. K. M., Mansoor, N. & Baharun, S., (2015) “Dynamic Spectrum
Allocation for Cognitive Radio Ad Hoc Network” Proceedings of 3rd International Conference on
Advances in Electrical Engineering.
[18] Bouras, C., Kokkinos, V., Papazois, A. & Tseliou, G., (2013) “Fractional Frequency Reuse in
Integrated Femtocell/Macrocell Environments” 11th International Conference, WWIC 2013, pp229-
240.
AUTHORS
Nurzati Iwani Othman graduated in 2014 B. Eng and 2018 in MSc from the
International Islamic University Malaysia (IIUM). She is currently pursuing her Ph.D.
in Communication Engineering in IIUM. Her research interests are in 5G wireless
communication that involves interference mitigation methods, game theory, dynamic
spectrum allocation and 5G network design. She can be contacted at email:
nurzati.iwani90@yahoo.com
Ahmad Fadzil Ismail is currently a lecturer at Department of Electrical and Computer
Engineering, Faculty of Engineering, International Islamic University Malaysia (IIUM).
He completed his bachelor degree studies in Electrical Engineering at Gannon
University, Pennsylvania, USA with Cum Laude Latin honors. He holds MSc and PhD
from University of Essex, UK and University of Bath, UK, respectively. His research
interests include development of active and passive target tracking algorithms, radio
frequency and wireless systems and microwave. He can be contacted at email: af_ismail@iium.edu.my
International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022
35
Khairayu Badron obtained her BEng (2006), Msc (2011) and Ph.D (2016) from
International Islamic University Malaysia (IIUM). She is currently one of the faculty
members of Faculty of Engineering, IIUM, and recently commenced her research areas
in Radar and Radiometry research, quantifying propagation effects on microwave and
millimetre wave links. Khairayu is a professional member of IEEE, IEM, BEM and
MTSFB. She has published and co-authored more than 30 papers in International
Journals as well as Conferences on subjects relating to rain attenuation in the tropical
regions. She can be contacted at email: khairayu@iium.edu.my
Wahidah Hashim has been with the College of Computing and Informatics UNITEN,
as an Associate Professor, since 2015. Apart from her active research in wireless
systems, she has been involved in developing Malaysian technical specifications,
standards, and guidelines for wireless devices. Her projects are related to measuring
and assessing signal quality, Unmanned Aerial systems (UAS) as well as vegetation
analysis for the transmission corridor. She has published nearly 130 publications and
filed several patents on her research findings. She is the recipient of Newton Ungku Omar – Leaders in
Innovation Fellowship by Royal Academy Engineering UK and the recipient of the Fulbright U.S. –
ASEAN visiting scholar programme in collaboration with the University of Houston – Victoria, Texas,
USA.
Sofia Pinardi obtained her doctorate in 2021 from IIUM (International Islamic
University Malaysia), master's degree in 2001 from the University of Indonesia, and
bachelor’s degree in 1992 from ISTN (Institute Sains and Technology
National).Telecommunications as her major field of expertise and specialized in
wireless communication, OFDM and wavelet system for 5G. She is currently a lecturer
at the University of Muhammadiyah Prof. Dr. Hamka in Jakarta, Indonesia. She can be
contacted at email: sofiapinardi@uhamka.ac.id

More Related Content

Similar to Improvements for Uplink Long Term Evolution (UL-LTE) in Heterogeneous Network using Dynamic Spectrum Allocation Technique

RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...
RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...
RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...ijwmn
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
20540-38947-1-PB.pdf
20540-38947-1-PB.pdf20540-38947-1-PB.pdf
20540-38947-1-PB.pdfIjictTeam
 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...villagopi
 
System level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksSystem level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksijwmn
 
Enhanced fractional frequency reuse approach for interference mitigation in f...
Enhanced fractional frequency reuse approach for interference mitigation in f...Enhanced fractional frequency reuse approach for interference mitigation in f...
Enhanced fractional frequency reuse approach for interference mitigation in f...journalBEEI
 
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...ijsc
 
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...ijsc
 
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network Inter-cell Interference Management Technique for Multi-Cell LTE-A Network
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network IJECEIAES
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Random access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellRandom access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellIJECEIAES
 
Interference management in lte downlink networks
Interference management in lte downlink networksInterference management in lte downlink networks
Interference management in lte downlink networksijwmn
 
A bipartite graph based proportional fair scheduling strategy to improve thr...
A bipartite graph based proportional fair scheduling strategy to  improve thr...A bipartite graph based proportional fair scheduling strategy to  improve thr...
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
 
Novel evaluation framework for sensing spread spectrum in cognitive radio
Novel evaluation framework for sensing spread spectrum in cognitive radioNovel evaluation framework for sensing spread spectrum in cognitive radio
Novel evaluation framework for sensing spread spectrum in cognitive radioIJECEIAES
 
Inter-Cell Interference
Inter-Cell InterferenceInter-Cell Interference
Inter-Cell Interferenceijtsrd
 

Similar to Improvements for Uplink Long Term Evolution (UL-LTE) in Heterogeneous Network using Dynamic Spectrum Allocation Technique (20)

RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...
RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...
RADIO RESOURCE MANAGEMENT FOR EICIC, COMP, RELAYING AND BACK-HAULS TECHNIQUES...
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
20540-38947-1-PB.pdf
20540-38947-1-PB.pdf20540-38947-1-PB.pdf
20540-38947-1-PB.pdf
 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
 
System level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networksSystem level simulation for two tier macro femto cellular networks
System level simulation for two tier macro femto cellular networks
 
Enhanced fractional frequency reuse approach for interference mitigation in f...
Enhanced fractional frequency reuse approach for interference mitigation in f...Enhanced fractional frequency reuse approach for interference mitigation in f...
Enhanced fractional frequency reuse approach for interference mitigation in f...
 
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...
AN INTELLIGENT CALL ADMISSION CONTROLLER FOR GUARANTEED QOS IN 4G MOBILE NETW...
 
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Netw...
 
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network Inter-cell Interference Management Technique for Multi-Cell LTE-A Network
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Random access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocellRandom access improvement for M2M communication in LTE-A using femtocell
Random access improvement for M2M communication in LTE-A using femtocell
 
F010214048
F010214048F010214048
F010214048
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
Interference management in lte downlink networks
Interference management in lte downlink networksInterference management in lte downlink networks
Interference management in lte downlink networks
 
A bipartite graph based proportional fair scheduling strategy to improve thr...
A bipartite graph based proportional fair scheduling strategy to  improve thr...A bipartite graph based proportional fair scheduling strategy to  improve thr...
A bipartite graph based proportional fair scheduling strategy to improve thr...
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
 
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...
 
Novel evaluation framework for sensing spread spectrum in cognitive radio
Novel evaluation framework for sensing spread spectrum in cognitive radioNovel evaluation framework for sensing spread spectrum in cognitive radio
Novel evaluation framework for sensing spread spectrum in cognitive radio
 
Inter-Cell Interference
Inter-Cell InterferenceInter-Cell Interference
Inter-Cell Interference
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Improvements for Uplink Long Term Evolution (UL-LTE) in Heterogeneous Network using Dynamic Spectrum Allocation Technique

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 DOI: 10.5121/ijcnc.2022.14602 21 IMPROVEMENTS FOR UPLINK LONG TERM EVOLUTION (UL-LTE) IN HETEROGENEOUS NETWORK USING DYNAMIC SPECTRUM ALLOCATION TECHNIQUE Nurzati Iwani Othman1 , Ahmad Fadzil Ismail1 , Khairayu Badron1 , Wahidah Hashim2 and Sofia Pinardi3 1 Department of Electrical and Computer Engineering, International Islamic University Malaysia, Gombak, Kuala Lumpur, Malaysia 2College of Computer Science & Info Tech, Universiti Tenaga Nasional, Kajang, Selangor, Malaysia 3 Electrical Department, Universitas Muhammadiyah Prof. Dr. Hamka, Jakarta, Indonesia ABSTRACT Several interference mitigation strategies can be used in LTE networks to meet the consumers' increasing need for faster data speeds. Dynamic Spectrum Allocation (DSA), which maintains spectrum in a converged radio system and distributes it across all participating radio terminals, is one of the most promising solutions. However, the fundamental obstacle to achieving increased network capacities is increased inter-cell interference. The aim of this paper is to analyse the effectiveness of a newly proposed DSA technique by comparing its bit error rate (BER) and throughput (TP) with a typical uplink LTE configuration. To maximise throughput in a heterogeneous network, the suggested DSA technique utilises the Nash Bargaining Solution (NBS) scheme, a cooperative game theory that could correlate with the bit error rate. The software tool GNU Radio, which offers signal-processing blocks to develop software- defined radios and signal-processing systems, was used to create the setups. After the simulations were performed, the BER values were recorded and compared, while the TP values were established and computed appropriately. According to the results, the uplink (UL-LTE) architecture with DSA has an improved TP and a lower BER value. As a result, spectral efficiency can also be improved. KEYWORDS Long Term Evolution (LTE), Dynamic Spectrum Allocation (DSA), Single Carrier-Frequency Division Multiple Access (SC-FDMA), Bit Error Rate (BER), Throughput (TP). 1. INTRODUCTION The radio spectrum has become increasingly crowded since the invention of radio communications due to a variety of applications. Such a circumstance undoubtedly contributed to the point at which various users practically used the entire available radio spectrum. In turn, this will cause interference to develop within the network. User equipment (UEs) and diverse base stations (BS), such as macrocell, picocell, and femtocell, are frequently components of heterogeneous networks. Both uplink (UL) and downlink (DL) transmission can be used to communicate between them. Data transmission from the user device (UE) to the BS takes place during the UL communication, and vice versa during the DL communication. These communications occasionally tend to use the same carrier frequencies, which can lead to
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 22 interferences known as cross-tier interference within the network. A network scenario including a macrocell BS, a femtocell BS, macrocell users, and femtocell users is shown in Figure 1. To fulfil the increased demand for high-speed data services, previous researchers suggested that a new network deployment consisting of a normal cellular network and femtocells may be established [1]. Figure 1. UL and DL communication scenario in a heterogeneous network Due to the lower received signal strength from the macrocell, femtocells are typically installed indoors. In turn, by regulating the attenuation when signal transmission flows through walls, interior coverage can be made better. Femtocells also aid in increasing network capacity by decreasing the distance between users and BSs. Researchers have also highlighted how a heterogeneous network can increase capacity, maximise spectrum, lower capital, and operating costs, and enhance the network architecture from the standpoint of the user in addition to these advantages [2]. In a heterogeneous network, macrocells and small cells can be assigned a radio frequency spectrum that is similar [3]. Femtocells, on the other hand, prefer to operate in Closed Subscriber Group (CSG) mode, which only permits a small number of authorised small cell customers to join. As a result, there are coverage gaps within the macrocells known as "black holes," where users who are macro and who are within the femtocells' transmission range but who experience substantial inter-cell interference cannot be served by either device (ICI). This prevents reliable DL transmission, which is why it is known as the victim user equipment (UE). Next-generation heterogeneous network deployments consider operating small cell densification because it is the limiting element for increasing network capacities [4]. Cross-tier interference was found to occur for both the UL and DL segments in propagation scenarios involving macrocells and femtocells [5]. Numerous ways had been presented to reduce this interference, including those reported in [6] and [7]. These tactics have been created to increase the effectiveness of heterogeneous networks when compared to those stated in [8] and [9]. However, there are still several issues with these methods, and neither do they completely remove the interference, nor do they demonstrate any appreciable effects. Manufacturers of femtocells have expressed their opinion about selecting what may be regarded as the optimal mitigation strategy to be implemented into the "enhanced" femtocell design configuration since
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 23 time is of the essence. A viable mitigation method that can reduce the aforementioned cross-tier interference is urgently needed. The rest of the papers are organized as follows: Section 2 discusses the related works discussing interference mitigation techniques, the implemented DSA technique using GNU Radio software, section 3 details LTE configuration simulation setups for typical and DSA UL-LTE and throughput calculation expressions, section 4 presents the results and discussions and lastly, section 5 summarizes the conclusion. 2. RELATED WORKS Currently being studied are a wide variety of interference mitigation strategies. A method based on time domain muting (TDM) that uses symbol efficiency (SE) and projected cell load circumstances as metrics to determine the muting ratio of resources has been suggested [10]. To verify the projected higher throughput performances, system-level simulation was carried out. The dynamic cross-tier interference coordination mechanism (D-CTIC) was established and only used when the interfered user equipment is unsure of its quality-of-service constraint, according to research on the Spectral Efficiency and Management of Cross-Tier Interference in a Femtocell Network [11]. As a result, a higher cell spectral efficiency can be attained by tolerating some cross-tier interference. Additionally, a soft frequency reuse strategy was created, which makes the promise that it will reduce interference while increasing cell throughput [12]. The plan was created when the user equipment detected significant interference from femtocells that were nearby. In addition, earlier researchers have suggested a technique for managing interference that involved single-hop, multi-hop, and multi-way network setups. The investigation revealed several issues, including inter-cell interference, out-of-cell interference, and more [13]. Table 1 shows the Comparison of Different Interference Mitigation Techniques. Table 1. Comparison of various techniques for mitigating interference Author(s) name and year Technique Description Advantages Disadvantages Singh, R., et. al., 2014 Resource partitioning [10] Suggests tiny cells’ muting Provide users of macrocells with greater service quality by reducing holes in their macrocell coverage The spectrum efficiency factor, which can increase throughput, is not taken into account Zhou, F. et. al., 2013 D-CTIC [11] Utilized once the interfering UE is unable to maintain its effectiveness. Maximizes spectrum efficiency Due to its exclusive concentration on femtocells, it is unsuitable for heterogeneous networks Khandare, R., 2015 CASFR method [12] When a UE acknowledges significant interference from nearby femtocells, the scheme is formed Decreases interference, which enhances the cell's throughput The spectral efficiency factor is neglected Sirhan, N. N. and Martinez- Multi-Agent Q- Learning (MAQL) Produces collaborative and Maximizes spectrum Lack of heterogeneity factor
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 24 Ramon, M., 2022 [14] competitive scheduling algorithm efficiency Cheng,H., 2014 Dynamic spectrum allocation [15] Utilize the fluctuating traffic of various wireless network systems Maximizes spectrum efficiency Requires the additional study to determine how well the DSA design performs The Dynamic Spectrum Allocation (DSA) technique, another interference mitigation method, has undergone extensive research for a variety of implementations. Researchers have hypothesised that the DSA scheme might guarantee the equity of the spectrum allocation by taking the economic element, spectrum use, and restricting the incidence of inter-system interference correspondingly [16]. The concept of the throughput maximization factor, which is crucial for mitigating interference, was left out of the study. Additionally, for cluster-based cognitive radio ad hoc networks, other researchers presented a novel cross-layer DSA that permits the improvement of throughput, power consumption, and packet transmission latency. By grouping the networks into clusters according to the power level of the nodes, the current speed, and the availability of the spectrum, the proposed strategy was put into practise [17]. 3. THE IMPLEMENTED DSA TECHNIQUE USING GNU RADIO SOFTWARE The Nash Bargaining Solution algorithm, which is also known as the DSA algorithm, was used in earlier research [15] and has been enhanced in this study. The improvement made in this algorithm is that the algorithm is simplified so that it promotes low complexity in circuitry which can conserve the bandwidth of a network. It is assumed that the UEs sends the request notification which is low data transmissions to the BS during UL communication. The entire bandwidth is consumed by one symbol at a time because the data modulation of the UL connection stipulates that the signal is to be transmitted in serial mode. As a result, the allocation of subcarriers is not considered for UL transmission. Figure 2 shows the flow chart for the BS's inclusion of packet allocation and recognition. The BS's scheduler, which controls packet release, dynamic resource allocation, and detection of UEs, is its central processing unit. First off, the BS offers a buffer where the identifier (ID) and message type (MT) of the active UEs can be placed. When the UE's ID appears in the buffer, the BS will transmit a notification or data to the UE.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 25 Figure 2. The flow chart of the scheduler of the BS Table 2 displays the various message formats for packets sent from UEs. Table 2. The MTs sent between UE and BS. MT UE BS 0 Request BS notifies UE 1 UE notifies BS Transmission of data 2 UE notifies BS of the end of transmission BS notifies UE of the end of transmission From Table 2, it is understood that MT 0 specifies that the packet is being requested by the UE, whereas type 1 specifies that the packet is a confirmation that the UE has received the notification from the BS and lastly, type 2 specifies that the packet is an acknowledgement that the data transmission has been completed. End
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 26 4. LTE CONFIGURATION SIMULATION SETUPS 4.1. Typical Uplink LTE (UL-LTE) Configuration For UL setup in LTE, the Single Carrier-Frequency Division Multiple Access (SC-FDMA) modulation is utilised. It combines OFDM's resistance to multipath with the low peak-to-average power ratio (PAPR or PAR) of single carrier techniques. Figure 3 and Figure 4 respectively depict the flow diagram of the UL-LTE configuration for the modulator and demodulator. The upper portion of Figure 3 depicts the data packets' mapping for transmission whereas SC- FDMA transmission is implemented in the lower portion. Because SC-FDMA is utilised as the multiplexing technique, this setup is regarded as an UL-LTE configuration. Data are generated by the Random Source block and sent to the stream blocks, where they are transformed into stream data. Later, the header and payload bits of the stream data are separated, and they are sent via the Chunks to Symbols blocks to be transformed into symbols. They are then translated into symbols and sent to the SC-FDMA Carrier Allocator block, where the parallelization of the original resultant data was accomplished. The system then carried out subcarrier mapping and allocated the frequency domain data symbols to the larger subcarrier group before passing them through to FFT and SC-FDMA Interleaver. The Cyclic Prefix block is then applied to the pre-OFDM symbols to cancel the Inter-Symbol Interference (ISI). Figure 3. The modulation of UL-LTE setup with SC-FDMA
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 27 Figure 4. The demodulation of UL-LTE setup SC-FDMA Figure 4 depicts the assembled demodulator portion of the setup. Through the Schmidl and Cox OFDM Sync block, the SC algorithm was implemented in this arrangement. The processing of the received data is carried out by the Header / Payload demultiplexer. The first channel taps are calculated by the Channel Estimator and are then transmitted via tags to the others. other programming blocks such as the SC-FDMA Frame Equalizer, SC-FDMA De-interleaver, and SC-FDMA Packet Header Parser are implemented in the process of receiving and equalising the reception. The Payload stream was then converted into Payload IQ for demodulation, which is shown in the lower portion, by passing via the FFT, Symbol choice, and OFDM Serializer blocks. The Error Rate block was also used to determine the bit error rate of the flow graph when the configuration was actuated by interference, which was created by the Noise Source block.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 28 4.2. Uplink LTE (UL-LTE) Configuration incorporating DSA (DSA UL-LTE) Figure 5. Flow graph of DSA UL-LTE configuration with SC-FDMA modulator
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 29 Figure 6. Flow graph of DSA UL-LTE configuration with SC-FDMA demodulator The blocks used in the flow graph for the DSA UL-LTE configuration are essentially the same as those used for the typical UL-LTE configuration. The source block is the only difference; in a typical design, this source block generates a random set of data. The UE Core block serves as the data source for the flow graph that incorporates DSA. As a result, the DSA UL-LTE setup operates very identically to the one without DSA implementation. Figure 5 and Figure 6 both depict the flow graphs for the modulator and demodulator components of the DSAUL-LTE setup. 4.3. Throughput Calculation The following formula is used to determine the throughput for both the standard LTE configuration and the UL configuration with DSA implementation. The set of formulas used to determine capacity and the Signal-to-Interference Plus Noise Ratio (SINR) were modified from previously conducted research [18]. Based on the constraints of the laboratory, some parameter values in these calculations were assumed. The parameters for the typical UL-LTE configuration
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 30 and the configuration with DSA implementation are listed in Table 3. The building is assumed to be a single-story structure, which accounts for the absence of any penetrated floors. Table 3. Assumptions for the mathematical expressions. Description Value Transmitter and receiver distance dTX-RX [m] 20 Factor of outshadowing, out [dB] 10 Number of penetrated floors, n 0 According to Table 3, dTX-RX represents the separation between the transmitter and receiver, and out represents the outshadowing factor, which has a Gaussian distribution with a mean and standard deviation of zero. Equation (1) below, where is the subcarrier assignment and Cm,n is the capacity of the serving macrocell, expresses the total system throughput, TX. 𝑇𝑋 = ∑ ∑ đ›œđ‘„,𝑛. đ¶đ‘„,𝑛 𝑁 𝑋 (1) The capacity formula was depicted from [9] and is expressed in Equation (2) below, đ¶đ‘š,𝑛 = ∆𝑓. log2(1 + đ‘Žđ›Ÿđ‘š,𝑛) (2) where đ›Ÿđ‘š,𝑛 is the total SINR for the system and 𝑎 = −1.5 ln(5đ”đžđ‘…). 5. RESULT AND DISCUSSION 5.1. Generated Waveform and BER values for Typical UL-LTE Configuration and DSA UL-LTE Configuration Table 4. Generated Waveform and BER values Type of configuration Typical UL-LTE DSA UL-LTE Waveform BER (%) 0.5 0.1 Table 4 displays the generated signals and BER values for both configurations with the noise amplitudes set to 1. Both configurations’ signals have unique forms that are easily distinguished. When compared to a signal with DSA implementation, the signal produced for the usual LTE configuration demonstrates that it has higher peaks. The interference for the conventional LTE design is also stated to be more than it is for DSA deployment.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 31 Figure 7. Comparison of BER values for typical UL-LTE and DSA UL-LTE configurations Figure 7 compares the UL communication BER values between the typical UL-LTE configuration and the DSA UL-LTE configuration. The figure shows that, with a very high difference of at least 0.35 percent, the value of BER of the DSA UL-LTE configuration is always lower than that of the typical UL-LTE configuration when the noise amplitude spans from 1 to 10. Furthermore, it is also clear that the BER values for the typical UL-LTE arrangement remain constant at 0.5. For a typical UL-LTE arrangement, there are no significant differences in the BER values, and the readings appear to be nearly static when the noise amplitude is changed from 1 to 10. When compared to the case with DSA UL-LTE, it is clear that the BER values increase for noise amplitudes between 1 and 4 and decrease only slightly for noise amplitudes above 5. When the noise amplitude is set to 6, it then gradually increases once again. Up until the noise amplitude reaches 10, the pattern persists. Therefore, it can be concluded that the range of noise amplitudes affects the DSA UL-LTE configuration but not the BER values of the typical LTE setup. As can be seen, the typical UL-LTE configuration has far larger BER values than the DSA UL-LTE design. The regression line for the DSA UL-LTE configuration is shown in Figure 8. The benefit of modelling BER as a function of noise amplitude is that it will allow future researchers to test the efficacy of DSA UL-LTE configurations by simply inserting their preferred noise amplitudes into the model, from which the BER value can be obtained. To compare the differences between the typical UL-LTE and the DSA UL-LTE configuration, the root mean squared error (RMSE) for both configurations will first be determined. The comparison of the RMSE values is done using the BER data gathered from the simulations.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 32 Figure 8. Regression Line for DSA UL-LTE Configuration Equation 3 illustrates the BER model derived for the DSA UL-LTE configuration as a function of noise amplitude. BDSA UL-LTE = 0.004N + 0.11 (3) where BUL-LTE is the throughput and N is the noise amplitude. Figure 9 depicts the throughput graph comparing typical UL-LTE configuration with DSA UL- LTE configuration. When the noise amplitude is between 1 and 10, it can be shown that for the typical UL-LTE arrangement, the graph nearly maintains a straight horizontal line. The graph displays a smooth curve for the DSA UL-LTE setup when the noise amplitude is between 1 and 10. The typical UL-LTE configuration's throughputs are not significantly impacted by the range of noise amplitudes because the throughput values are nearly constant. Additionally, the throughput figures for DSA UL-LTE configurations are consistently higher than those for the typical UL-LTE setup. Moreover, it can be seen that the throughput for the DSA UL-LTE setup decreases as the noise amplitude increases. Figure 9. Comparison of throughputs for typical UL-LTE configuration and DSA UL-LTE y = 0.0044x + 0.1119 RÂČ = 0.7415 0.00 0.02 0.04 0.06 0.08 0.10 0.12 0.14 0.16 0.18 0 2 4 6 8 10 12 BER (%) Noise Amplitude REGRESSION LINE FOR UPLINK LTE CONFIGURATION WITH DSA (BER VS NOISE AMPLITUDE)
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 33 Equation 4 illustrates the throughput model for the DSA UL-LTE configuration as a function of noise amplitude. TDSA UL-LTE = -1.54N + 124985 (4) where TUL-LTE is the throughput for DSA UL-LTE and N is the value of noise amplitude. 6. CONCLUSION The LTE design has been proven to offer higher throughput than a heterogeneous network setup without the DSA implementation. The simulation results provided evidence in favor of the proposition that interference in a heterogeneous network can be successfully decreased. The TP values were established and calculated per the BER values, which were recorded and compared. According to the results, the DSA UL-LTE architecture has an improved TP and a lower BER value. To increase spectral efficiency, interferences must be minimized, and system throughput must be maximized. In the very near future, it is also intended to pursue empirical inquiry involving implementation using USRP hardware. Given the limitations of the lab, the experimental design will be based on the hypotheses developed in this study. The outcomes can show that the system is hardware compatible and thus usable in real-world applications. CONFLICTS OF INTEREST All authors declare no conflicts of interest. ACKNOWLEDGEMENTS The authors acknowledge the Research Management Centre (RMC) of the International Islamic University Malaysia (IIUM) and the Malaysian Ministry of Education (MOHE) for the financial support during the research. The research output is part of the deliverables for the research funded under IIUM’s Research University Initiatives, (P-RIGS18-005-0005) by International Islamic University Malaysia to sponsor this research in the creation of novel theories and concepts. REFERENCES [1] Gomez, J.S., Vasseur, A., Vergne, A., Martins, P., Decreusefond, L. & Chen, W., (2015) “A CaseStudy on Regularity In Cellular Network Deployment” IEEE Wireless Communication Letters, 4(4):1-1. [2] Hasan, M. K., Ismail, A. F., Abdalla, A. H., Abdullah, K., Ramli, H. A. M., Islam, S. & Badron, K., (2014) “Self-Organizing Joint Sensing and Power Allocation Scheme (SJSPA) to Coordinate Cross- Tier Interference for LTE-A Heterogeneous Network” IEEE 2nd International Symposium on Telecommunication Technologies (ISTT). [3] Kien Vu., Sungoh Kwon and Sangchul Oh., (2015) “Cooperative Interference Mitigation Algorithm in Heterogeneous Networks” IEICE Transactions on Communications [4] Stanislaus Iwelski, Erfan Majeed, Zijian Bai, Guido H. Bruck & Peter Jung., (2015) “Cooperative Interference Mitigation in Heterogeneous LTE Networks” IEEE Wireless Communications and Networking Conference (WCNC 2015) - Track 1: PHY and Fundamentals. [5] Guo, Y., Yang, Q., Liu, J. & Kwak, K. S. (2016) “Cross-Layer Rate Control and Resource Allocation in Spectrum-Sharing OFDMA Small Cell Networks with Delay Constraints” IEEE Transactions on Vehicular Technology. [6] Hasan, M.K., Chuah, T.C., El-Saleh, A.A., Shafiq, M., Shaikh, S.A., Islam, S. and Krichen, M., (2021) “Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks” Computer Communications, 180, pp.328-337.
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 34 [7] Hasan, M.K., Ismail, A.F., Islam, S., Hashim, W., Ahmed, M.M. and Memon, I., (2019) “A novel HGBBDSA-CTI approach for subcarrier allocation in heterogeneous network” Telecommunication Systems, 70(2), pp.245-262. [8] Hasan, M.K., Ismail, A.F., Islam, S., Hashim, W. and Pandey, B., (2017) “Dynamic spectrum allocation scheme for heterogeneous network” Wireless Personal Communications, 95(2), pp.299- 315. [9] Othman, N. I., Ismail, A. F., Hasan, M. K., Badron. K. & Hashim, W. (2018) “Throughput Analysis on Dynamic Spectrum Allocation Technique to Mitigate Interference on LTE Heterogeneous Network” In International Journal of Control and Automation, Vol. 11, No. 4 (2018), pp.95-104 [10] Singh, R., Mishra, S. & Murthy, C. S. R., (2014) “A Multi-tier Cooperative Resource Partitioning Technique for Interference Mitigation in Heterogeneous Cellular Networks” International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks, WiOpt– 2014 [11] Zhou, F., Wang, B., Wang, W., Zhang, Y., Lei, M. & Jiang, L. (2013) “Analysis of Spectral Efficiency and Management of Cross-Tier Interference in Femtocell Network” IEEE 78th Vehicular Technology Conference (VTC Fall), [12] Dimple Chaudhari & Reshma Khandare, (2016) “Intercell Interference and Cross-Tier Interference Mitigation in LTE based Femtocell Network using 'CASFR' Scheme”International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2. [13] Lee, N & Heath Jr, R. W., (2016) “Advanced Interference Management Technique: Potentials and Limitations” IEEE Wireless Communications. [14] Sirhan, N. N. and Martinez-Ramon, M., (2022) “Cognitive Radio Resource Scheduling Using Multi- Agent Q-Learning For LTE” International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.2, March 2022 [15] Cheng, H., (2014) “Implementation of Dynamic Resource Allocation for LTE System using GNU Radio” A Thesis submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Master of Science Electrical and Computer Engineering. [16] Robert, V. N. J. and Vidya, K., (2021) “A comparative study of cooperative and non-cooperative game model for overlay spectrum access in multihop cognitive radio networks” AIP Conference Proceedings 2336, 050008. [17] Zareei, M., Muzahidul Islam, A. K. M., Mansoor, N. & Baharun, S., (2015) “Dynamic Spectrum Allocation for Cognitive Radio Ad Hoc Network” Proceedings of 3rd International Conference on Advances in Electrical Engineering. [18] Bouras, C., Kokkinos, V., Papazois, A. & Tseliou, G., (2013) “Fractional Frequency Reuse in Integrated Femtocell/Macrocell Environments” 11th International Conference, WWIC 2013, pp229- 240. AUTHORS Nurzati Iwani Othman graduated in 2014 B. Eng and 2018 in MSc from the International Islamic University Malaysia (IIUM). She is currently pursuing her Ph.D. in Communication Engineering in IIUM. Her research interests are in 5G wireless communication that involves interference mitigation methods, game theory, dynamic spectrum allocation and 5G network design. She can be contacted at email: nurzati.iwani90@yahoo.com Ahmad Fadzil Ismail is currently a lecturer at Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia (IIUM). He completed his bachelor degree studies in Electrical Engineering at Gannon University, Pennsylvania, USA with Cum Laude Latin honors. He holds MSc and PhD from University of Essex, UK and University of Bath, UK, respectively. His research interests include development of active and passive target tracking algorithms, radio frequency and wireless systems and microwave. He can be contacted at email: af_ismail@iium.edu.my
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.6, November 2022 35 Khairayu Badron obtained her BEng (2006), Msc (2011) and Ph.D (2016) from International Islamic University Malaysia (IIUM). She is currently one of the faculty members of Faculty of Engineering, IIUM, and recently commenced her research areas in Radar and Radiometry research, quantifying propagation effects on microwave and millimetre wave links. Khairayu is a professional member of IEEE, IEM, BEM and MTSFB. She has published and co-authored more than 30 papers in International Journals as well as Conferences on subjects relating to rain attenuation in the tropical regions. She can be contacted at email: khairayu@iium.edu.my Wahidah Hashim has been with the College of Computing and Informatics UNITEN, as an Associate Professor, since 2015. Apart from her active research in wireless systems, she has been involved in developing Malaysian technical specifications, standards, and guidelines for wireless devices. Her projects are related to measuring and assessing signal quality, Unmanned Aerial systems (UAS) as well as vegetation analysis for the transmission corridor. She has published nearly 130 publications and filed several patents on her research findings. She is the recipient of Newton Ungku Omar – Leaders in Innovation Fellowship by Royal Academy Engineering UK and the recipient of the Fulbright U.S. – ASEAN visiting scholar programme in collaboration with the University of Houston – Victoria, Texas, USA. Sofia Pinardi obtained her doctorate in 2021 from IIUM (International Islamic University Malaysia), master's degree in 2001 from the University of Indonesia, and bachelor’s degree in 1992 from ISTN (Institute Sains and Technology National).Telecommunications as her major field of expertise and specialized in wireless communication, OFDM and wavelet system for 5G. She is currently a lecturer at the University of Muhammadiyah Prof. Dr. Hamka in Jakarta, Indonesia. She can be contacted at email: sofiapinardi@uhamka.ac.id