Presented virtually by Andy Sutton, Principal Network Architect, BT Technology on 06 Aug 2020.
Andy provides an update and review of the transformational plans, capabilities and outcomes from 5G deployments in the UK. 5G networks are already enabling a step change in the range and capability of innovative applications from IoT to robotics. That pace of change is due to accelerate as 5G moves from its initial enhanced mobile broadband phase to deliver ultra-reliable and low latency communications along with massive machine type connectivity.
*** SHARED WITH PERMISSION ***
Presented virtually by Andy Sutton, Principal Network Architect, BT Technology on 06 Aug 2020.
Andy provides an update and review of the transformational plans, capabilities and outcomes from 5G deployments in the UK. 5G networks are already enabling a step change in the range and capability of innovative applications from IoT to robotics. That pace of change is due to accelerate as 5G moves from its initial enhanced mobile broadband phase to deliver ultra-reliable and low latency communications along with massive machine type connectivity.
*** SHARED WITH PERMISSION ***
Comparison Static ICIC and Adaptive ICIC on TD-LTERay KHASTUR
The subscriber on the cell edge will have bad experience due to impact of this co-channel interference. There is function of SFR (Soft Frequency Reuse) in LTE-TDD that is manipulated BW into several cell edge style. On Genex U-Net we can use this feature to minimize of inter cell interference, we can chose static ICIC or adaptive ICIC based on field condition.
CDMA PRL issue investigation: Network operator A can detect ARFCN from operat...Ray KHASTUR
Because ARFCN of two operator are sharing use due to policy from government. Operator A only input one index table acquisition all ARFCN in HDR channel list, Operator B have 3 table index acquisition that different in each region.
PRL Operator A:
* Index Table 1 HDR (37, 78, 119, 160, 201, 242, 283, 324 and 1019)
PRL Operator B:
*Index Table 1 HDR (283)
*Index Table 3 HDR (1019 and 37)
*Index Table 5 HDR (1019)
From explanation above we can see that operator A will scanning all ARFCN that available in surrounding area which is suitable in Index Table 1 Operator A, that's why Operator A can detect Operator B channel list in all region.
Topics covered in this presentation:
Radio & Microwave Communication.
2. Spectrum Management.
3. Digital Microwave Systems.
4. Fading and measures to counter Fading effect.
5. Digital Microwave link – Performance Objectives.
6. Modulation Methods.
7. A word about BWA
8. Other wireless communication Applications
At present, the global information age has arrived, the total amount of data has exploded, and people's demand for data and information is increasing. The birth of LTE is to continuously optimize wireless communication technology to meet customers' higher requirements for wireless communication.
LTE is a long-term evolution of the UMTS technical standard formulated by the 3GPP organization, in 2004 The project was formally established and launched at the 3GPP Toronto meeting in December.
LTE is a wireless data communication technology standard. The current goal of LTE is to use new technologies and modulation methods to improve the data transmission capacity and data transmission speed of wireless networks, such as new digital signal processing (DSP) technologies, which were mostly proposed around 2000.
The long-term goal of LTE is to simplify and redesign the network architecture to make it an IP-based network, which will help reduce potential undesirable factors in the 3G transition.
LTE technology mainly has two mainstream modes, TDD and FDD, and the two modes have their own characteristics. Among them, FDD-LTE is widely used internationally, while TD-LTE is more common in my country.
The LTE (Long Term Evolution) project is an evolution of 3G, a transition between 3G and 4G technologies, and a global standard of 3.9G.
It has improved and enhanced the 3G air access technology, using OFDM and MIMO as the only standard for its wireless network evolution. It provides a peak rate of 100 Mbit/s for downlink and 50 Mbit/s for uplink under a 20MHz spectrum bandwidth, which improves the performance of cell-edge users, increases cell capacity, and reduces system delay.
In order to better understand LTE, we have listed 41 basic knowledge of LTE for your reference.
Performance of modeling wireless networks in realistic environmentCSCJournals
A wireless network is realized by mobile devices which communicate over radio channels. Since, experiments of real life problem with real devices are very difficult, simulation is used very often. Among many other important properties that have to be defined for simulative experiments, the mobility model and the radio propagation model have to be selected carefully. Both have strong impact on the performance of mobile wireless networks, e.g., the performance of routing protocols varies with these models. There are many mobility and radio propagation models proposed in literature. Each of them was developed with different objectives and is not suited for every physical scenario. The radio propagation models used in common wireless network simulators, in general researcher consider simple radio propagation models and neglect obstacles in the propagation environment. In this paper, we study the performance of wireless networks simulation by consider different Radio propagation models with considering obstacles in the propagation environment. In this paper we analyzed the performance of wireless networks by OPNET Modeler .In this paper we quantify the parameters such as throughput, packet received attenuation.
Smart Autonomous Mobile detector RobotPunit Tiwari
SMART AUTONOMOUS MOBILE DETECTOR ROBOT
-This device can notice the use of GSM mobile phone in mobile restricted areas such as Examination hall or confidential rooms etc.
-It is just like a sniffer mobile that can sense the activity of mobile phone from a distance of 5 meters or more.
Smart Autonomous Mobile detector RobotPunit Tiwari
SMART AUTONOMOUS MOBILE DETECTOR ROBOT
-This device can notice the use of GSM mobile phone in mobile restricted areas such as Examination hall or confidential rooms etc..
-It is just like a sniffer mobile that can sense the activity of mobile phone from a distance of 5 meters or more.
it is basically a model for wheelchair.for physically handicapped persons it will be very useful.the robot uses a accelerometer sensor for the movement of the robot, so that sensor is installed on the transmitter section and the thing you should wear on your arm.on the receiver side microcontroller is present which will decode the data.
Intends to discuss about new data centric environment challenges due tsunami data traffic in mobile broadband and how industry is being prepared to address all of these changes.
Presentation railtel (railway communication infra company) by jmv lpsMahesh Chandra Manav
Indian Railways RITES ,RAILTEL, IRCON ,RVNL ,Metro Rail Project ,DFCC Ltd ,Indian Rail Port Corporation Ltd, Indian Rail Warehose Ltd ,India Rail Station Development Corportaion Ltd ,Kalindi Rail Corporation Ltd , India First Bullet Train
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Cosmetic shop management system project report.pdf
TDD & FDD Interference on TD-LTE B Network
1. IMPROVING THE MOBILE EXPERIENCE WORLDWIDE
R.T.W.P Investigation Region M
Ray Khastur
2. 2
1. Overview
2. Border Site Monitoring
3. Investigation Highest RTWP Site
4. OSS Monitoring
5. Summary
Agenda
Ray Khastur
3. 3
Out-Band Emission
Study Case on Region M
TD-LTE
15M
WiMAX
5M
WiMAX
5M
WiMAX
5M
External
Source-FDD
Local ISP
Spurious Emission from Left Side Band Spurious Emission from WiMAX Spurious Emission from LTE
Ray Khastur
4. 4
Overview : Suspect External Interference from Local ISP
The Local Internet Service Provider in M region is detected
also use Band 2300 to 2400 as their allocation also (illegal).
Because on Indonesia Communication and Information
Minister already allocated Band 2.3 GHz only use for
Broadband Wireless Access operator such as First Media,
Berca, Internux, Indosat M2, Telkom and Jasnita as the
winner of bidding spectrum allocation owner ship in specific
region.
One wireless device that many ISP used is MikroTik wireless
communication that can arrange the frequency randomly
based on time.
So between day time and night time they can shifted their
frequency to be undetected on specific location. The reason
is to manipulated scanning activity from BWA operator and
also the government institution.
Ray Khastur
5. 5
Overview : MikroTik Wireless Communication System 2.3 GHz
http://www.itelite.net/offer.php?n=69&lang=en
http://www.itelite.net/offer.php?n=80&lang=en
Ray Khastur
6. 6
Overview: Existing TDD Configuration
UL = 18 Symbols = 1851.43 usDL = 29 Symbols = 2982.86 us UL = 18 Symbols = 1851.43 us
TTG = 105.715us RTG=60us
WiMAX 16e
29:18
DL
ULDL DwPTS(10 os)
TD- LTE 3:1
SSP : 10:2:2
UpPTS(2 OS)
TUD
DL DL
Interference Interference
Interference WiMAX
to TD-LTE
Interference TD-LTE
to WiMAX
To determine TDD Interference from Intra LTE:
•The power receiving strength for the first UL subframes 0 and 6 is used to differentiate TDD long-distance
interference.
•The power receiving strength for the last UL subframes 0 and 12 is used to differentiate interference
caused by GPS clock loss.
In current condition due to there are two kind of external interference (WiMAX and Local ISP), From above
picture showing All UL Symbol of LTE System will have suffered tdd interference from WiMAX Operator. And
also the MikroTik transmiter will also interferer DL and UL every time due to use FDD Technology.
Ray Khastur
8. Ray Khastur 8
Border Site of Monitoring: Border 1
Border 1 on the North City of M, we can see the direction of Interference is coming from South area.
9. 9
Border Site of Monitoring: Border 2
Border 2 on the Center City of M, we can see the direction of Interference is facing to the marked area and
also there are terrestrial link pattern that connecting west M to the inner city
Ray Khastur
10. 10
Border Site of Monitoring: Border 3
Border 3 on the South City of M, we can see the direction of Interference is going to the Border 2 area.
Ray Khastur
11. 11
Border Site of Monitoring: Border 4
Border 4 on the East City of M, we can see the direction of Interference is going to the Border 2 area.
Ray Khastur
16. 16
OSS Monitoring : 31131
UL and DL Throughput can’t reach the peak performance
even there is only few subscriber.
Ray Khastur
17. 17
OSS Monitoring : 31601
UL and DL Throughput can’t reach the peak performance
even there is only few subscriber.
18. 18
• There are two kinds of external source on M Region, from WiMAX Operator (TDD Technology) and also
from Local ISP with Wireless MikroTik (FDD Technology). On current situation our huge interferer is
coming from Local ISP than WiMAX Operator. Strongly recommended to solve Local ISP problem need
to be clear.
• Interference issue will affected with many KPI for achieve the target and also have bad user experience
perspective with B Operator LTE Services. (Attach Detach, RRC, eRAB, Service Drop Rate, Intra Freq
HOSR, Latency {Attach Time Delay and Ping} and and Throughput as well)
• With adjacent Band Frequency with WiMAX operator, proper TDD Ratio configuration need to be set up
properly to prevent any TDD Interference and also TDD Ratio configuration will determine the
Throughput achieved.
Summary