Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392436
N. Pratas, A. Rodrigues
The third generation partnership project has defined for its 6th release of the universal mobile telecommunications system a new service known as multimedia broadcast multicast service. It satisfies the bandwidth and quality of service requirements of real-time streaming services, by taking advantage on the radio and network interface of the proprieties of a broadcast/multicast system. In this paper we present an analysis on several macro diversity combining schemes, such as selective, maximum ratio, and switched combining in a microcell environment. These schemes take advantage of point to multipoint transmission across the network to reduce the required power, allowing for more bandwidth to be available in the cell/band.
{"title":"Enhancement of MBMS through Macro Diversity Schemes in a Microcell Environment","authors":"N. Pratas, A. Rodrigues","doi":"10.1109/ISWCS.2007.4392436","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392436","url":null,"abstract":"The third generation partnership project has defined for its 6th release of the universal mobile telecommunications system a new service known as multimedia broadcast multicast service. It satisfies the bandwidth and quality of service requirements of real-time streaming services, by taking advantage on the radio and network interface of the proprieties of a broadcast/multicast system. In this paper we present an analysis on several macro diversity combining schemes, such as selective, maximum ratio, and switched combining in a microcell environment. These schemes take advantage of point to multipoint transmission across the network to reduce the required power, allowing for more bandwidth to be available in the cell/band.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123255506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392409
V. Balakrishnan, V. Varadharajan, U. Tupakula, Phillip Lucs
In recent years, several secure routing protocols have been proposed to secure communications among nodes in mobile ad hoc networks. However, they are not tailored to defend against denial of service (DoS) attacks such as flooding and packet drop attacks. This has led to the development of models that target cooperation among nodes. These models either fail to protect against flooding attacks or only defend against greedy nodes that drop packets to save battery resources. The main shortcoming of cooperation models is that they fail to evaluate the trustworthiness for other nodes. In this paper, we propose a Trust Integrated Cooperation Architecture which consists of an obligation-based cooperation model known as fellowship to defend against both flooding and packet drop attacks. In our architecture, fellowship enhances its security decisions through a trust model known as secure MANET routing with trust intrigue (SMRTI). In comparison with related models, SMRTI deploys a novel approach to communicate recommendations such that the deployed approach is free from well-known issues such as honest elicitation, free riding, bias of a recommender, and additional overhead.
{"title":"Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks","authors":"V. Balakrishnan, V. Varadharajan, U. Tupakula, Phillip Lucs","doi":"10.1109/ISWCS.2007.4392409","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392409","url":null,"abstract":"In recent years, several secure routing protocols have been proposed to secure communications among nodes in mobile ad hoc networks. However, they are not tailored to defend against denial of service (DoS) attacks such as flooding and packet drop attacks. This has led to the development of models that target cooperation among nodes. These models either fail to protect against flooding attacks or only defend against greedy nodes that drop packets to save battery resources. The main shortcoming of cooperation models is that they fail to evaluate the trustworthiness for other nodes. In this paper, we propose a Trust Integrated Cooperation Architecture which consists of an obligation-based cooperation model known as fellowship to defend against both flooding and packet drop attacks. In our architecture, fellowship enhances its security decisions through a trust model known as secure MANET routing with trust intrigue (SMRTI). In comparison with related models, SMRTI deploys a novel approach to communicate recommendations such that the deployed approach is free from well-known issues such as honest elicitation, free riding, bias of a recommender, and additional overhead.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392372
M. Bhatnagar, A. Hjørungnes
In this paper, we propose two differential relaying strategies; combined-transmit-relay (C-T-R) and transmit- combined-relay (T-C-R), which could be used by the base- station to transmit data of two users over downlink channels in the two-user cooperative communication network. Differential schemes are used so the users do not require the knowledge of channel gains for decoding of their data. The performance of both the schemes is evaluated for decode-and-forward, selection relaying, and incremental relaying protocols. In the case of decode-and-forward protocol, the performance heavily depends upon the signal to noise ratio of the link between source and relay. We propose an exact probability of error based approach, which can be used to regulate the erroneous relaying of data. Both C-T-R and T-C-R are able to achieve performance gain as compared to the direct transmission differential scheme in the case of selection relaying and incremental relaying protocols at high SNRs. The proposed schemes also perform better than the direct transmission differential scheme.
{"title":"Downlink Cooperative Communication Using Differential Relaying","authors":"M. Bhatnagar, A. Hjørungnes","doi":"10.1109/ISWCS.2007.4392372","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392372","url":null,"abstract":"In this paper, we propose two differential relaying strategies; combined-transmit-relay (C-T-R) and transmit- combined-relay (T-C-R), which could be used by the base- station to transmit data of two users over downlink channels in the two-user cooperative communication network. Differential schemes are used so the users do not require the knowledge of channel gains for decoding of their data. The performance of both the schemes is evaluated for decode-and-forward, selection relaying, and incremental relaying protocols. In the case of decode-and-forward protocol, the performance heavily depends upon the signal to noise ratio of the link between source and relay. We propose an exact probability of error based approach, which can be used to regulate the erroneous relaying of data. Both C-T-R and T-C-R are able to achieve performance gain as compared to the direct transmission differential scheme in the case of selection relaying and incremental relaying protocols at high SNRs. The proposed schemes also perform better than the direct transmission differential scheme.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116812821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392392
Oscar Fresan, Tao Chen, Karri Ranta-aho, T. Ristaniemi
In this paper, the system level optimization of the voice over IP transmission in the HSUPA system, configured with a 10 ms TTI length, is analyzed. The study considers the release 7 improvements to HSUPA, in terms of the DPCCH gating concept. A dynamic activated MAC layer bundling of two VoIP packets in a single frame is proposed and compared against the single packet per frame transmission by means of quasi-static system level simulations.
{"title":"Dynamic Packet Bundling for VoIP Transmission Over Rel'7 HSUPA with 10ms TTI Length","authors":"Oscar Fresan, Tao Chen, Karri Ranta-aho, T. Ristaniemi","doi":"10.1109/ISWCS.2007.4392392","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392392","url":null,"abstract":"In this paper, the system level optimization of the voice over IP transmission in the HSUPA system, configured with a 10 ms TTI length, is analyzed. The study considers the release 7 improvements to HSUPA, in terms of the DPCCH gating concept. A dynamic activated MAC layer bundling of two VoIP packets in a single frame is proposed and compared against the single packet per frame transmission by means of quasi-static system level simulations.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392306
Yan Zhang, Yifan Chen
There are two major contributions in this paper in the context of Orthogonal Frequency Division Multiplexing (OFDM) subcarrier allocation. The first is to perform a tele- traffic queueing analysis for OFDM subcarrier allocation in wireless multimedia networks. In the literature, a variety of issues related to OFDM have been studied. However, the OFDM system performance is rarely investigated. Call connection requests are differentiated into two types: narrow-band and wide-band. For either class of call, the traffic process is characterized as batch arrival because each call may request multiple subcarriers to satisfy its Quality-of-Service (QoS) requirements. The batch size is a random variable following a probability mass function (pmf) with a realistic maximum value. In addition, the service times for various classes are different. Consequently, in OFDM- based broadband wireless multimedia networks, the system are formulated as multiclass multiserver batch arrival queueing systems. The second contribution is the investigation of two call admission control algorithms, the batch blocking scheme and the partial blocking scheme. Formulae are developed for the following significant performance metrics: the probability that a call will be blocked and bandwidth utilization. Numerical investigations are presented to demonstrate the key interaction between key parameters and performance metrics. The analytical model was validated by the simulation results; consequently, it provides an efficient tool for building future-generation broadband wireless access networks.
{"title":"Queueing Analysis of OFDM Subcarrier Allocation in Wireless Multimedia Networks","authors":"Yan Zhang, Yifan Chen","doi":"10.1109/ISWCS.2007.4392306","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392306","url":null,"abstract":"There are two major contributions in this paper in the context of Orthogonal Frequency Division Multiplexing (OFDM) subcarrier allocation. The first is to perform a tele- traffic queueing analysis for OFDM subcarrier allocation in wireless multimedia networks. In the literature, a variety of issues related to OFDM have been studied. However, the OFDM system performance is rarely investigated. Call connection requests are differentiated into two types: narrow-band and wide-band. For either class of call, the traffic process is characterized as batch arrival because each call may request multiple subcarriers to satisfy its Quality-of-Service (QoS) requirements. The batch size is a random variable following a probability mass function (pmf) with a realistic maximum value. In addition, the service times for various classes are different. Consequently, in OFDM- based broadband wireless multimedia networks, the system are formulated as multiclass multiserver batch arrival queueing systems. The second contribution is the investigation of two call admission control algorithms, the batch blocking scheme and the partial blocking scheme. Formulae are developed for the following significant performance metrics: the probability that a call will be blocked and bandwidth utilization. Numerical investigations are presented to demonstrate the key interaction between key parameters and performance metrics. The analytical model was validated by the simulation results; consequently, it provides an efficient tool for building future-generation broadband wireless access networks.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392376
Esam Alnasouri, A. Mitschele-Thiel, Ali Diab
An important challenge for All-IP wireless networks is the development of solutions that jointly provide QoS and mobility. Several approaches have been proposed to support a fast handoff simultaneously with a fast re-reservation of resources. These approaches however do not match the real-time requirements. Transparent QoS-aware mobile IP fast authentication protocol (T-QoMIFA) is proposed to satisfy the requirements of delay sensitive applications. T-QoMIFA integrates ReSource reserVation Protocol (RSVP) with MIFA through introducing a new RSVP object called "mobility object" used to carry the mobility Information. In this paper we present an analytical model to evaluate the performance of T-QoMIFA compared to Hierarchical Mobile RSVP (HMRSVP) with respect to the sum of handoff latency and reservation time, the expected number of dropped packets and the expected number of the best-effort packets sent while reservation is in progress. Movement patterns and dropping of control messages are taken into account in our analysis. Our study shows that T-QoMIFA clearly outperforms HMRSVP. T-QoMIFA achieves a fast handoff and a fast re-reservation of resources. The dropped and the best-effort packets are minimized using T-QoMIFA. Therefore, T-QoMIFA is an efficient protocol even if control messages have been dropped.
{"title":"Comparative Analysis of T-QoMIFA and HMRSVP","authors":"Esam Alnasouri, A. Mitschele-Thiel, Ali Diab","doi":"10.1109/ISWCS.2007.4392376","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392376","url":null,"abstract":"An important challenge for All-IP wireless networks is the development of solutions that jointly provide QoS and mobility. Several approaches have been proposed to support a fast handoff simultaneously with a fast re-reservation of resources. These approaches however do not match the real-time requirements. Transparent QoS-aware mobile IP fast authentication protocol (T-QoMIFA) is proposed to satisfy the requirements of delay sensitive applications. T-QoMIFA integrates ReSource reserVation Protocol (RSVP) with MIFA through introducing a new RSVP object called \"mobility object\" used to carry the mobility Information. In this paper we present an analytical model to evaluate the performance of T-QoMIFA compared to Hierarchical Mobile RSVP (HMRSVP) with respect to the sum of handoff latency and reservation time, the expected number of dropped packets and the expected number of the best-effort packets sent while reservation is in progress. Movement patterns and dropping of control messages are taken into account in our analysis. Our study shows that T-QoMIFA clearly outperforms HMRSVP. T-QoMIFA achieves a fast handoff and a fast re-reservation of resources. The dropped and the best-effort packets are minimized using T-QoMIFA. Therefore, T-QoMIFA is an efficient protocol even if control messages have been dropped.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128698432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392415
Jing Xie, L. Quesada, Yuming Jiang
Mobile ad hoc networking technologies have increasingly been applied to civilian applications, and the requirements of providing better services in mobile ad hoc networks (MANETs) are growing, accordingly. However, the natures of MANET, which are highly dynamic topologies and possibly high bit error rate of links, raise many challenges in developing efficient, reliable and scalable protocols for MANETs. Especially, routing protocols for MANETs are significantly different from traditional routing protocols. In this paper we propose a threshold-based hybrid routing protocol that supports a mobile node to selectively run the routing protocol based on its velocity. In addition, the proposed routing protocol and several typical MANET routing protocols are theoretically analyzed.
{"title":"A Threshold-based Hybrid Routing Protocol for MANET","authors":"Jing Xie, L. Quesada, Yuming Jiang","doi":"10.1109/ISWCS.2007.4392415","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392415","url":null,"abstract":"Mobile ad hoc networking technologies have increasingly been applied to civilian applications, and the requirements of providing better services in mobile ad hoc networks (MANETs) are growing, accordingly. However, the natures of MANET, which are highly dynamic topologies and possibly high bit error rate of links, raise many challenges in developing efficient, reliable and scalable protocols for MANETs. Especially, routing protocols for MANETs are significantly different from traditional routing protocols. In this paper we propose a threshold-based hybrid routing protocol that supports a mobile node to selectively run the routing protocol based on its velocity. In addition, the proposed routing protocol and several typical MANET routing protocols are theoretically analyzed.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"8 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130342808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392365
K. David
The vision of pervasive computing and communication is likely to have a major impact on our lives. The WWRF (Wireless World Research Forum) has summarized this vision by the statement: "7 trillion wireless devices serving 7 billion people by 2017". Following this vision, the goal for new business sectors will be to provide an easy way of creating and deploying different kinds of service environments. This paper introduces the overall system vision with an emphasis on the requirements on and the problem of overall architectures for service execution environments and identifies an architectural approach, the requirements and design guidelines to built service execution environments and related platforms. A special focus will be given on the subjects of context awareness and personalization.
{"title":"System concept and Service Architecture in pervasive environments based on WWRF Requirements","authors":"K. David","doi":"10.1109/ISWCS.2007.4392365","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392365","url":null,"abstract":"The vision of pervasive computing and communication is likely to have a major impact on our lives. The WWRF (Wireless World Research Forum) has summarized this vision by the statement: \"7 trillion wireless devices serving 7 billion people by 2017\". Following this vision, the goal for new business sectors will be to provide an easy way of creating and deploying different kinds of service environments. This paper introduces the overall system vision with an emphasis on the requirements on and the problem of overall architectures for service execution environments and identifies an architectural approach, the requirements and design guidelines to built service execution environments and related platforms. A special focus will be given on the subjects of context awareness and personalization.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392412
P. Lehne, T. Ormhaug, O. Østerbø
The main idea of the OBAN concept is that the future deployment of broadband access lines and wireless LANs will have so much excess capacity, beyond what will be utilized by the host households, that it also can accommodate public wireless access services. The purpose of this paper is to analyse the viability of this idea with respect to wireless coverage in some typical scenarios. A model for estimating coverage in single and triple frequency wireless networks based on IEEE 802.11g WLAN is presented. A model for interference is established distinguishing between two types of interference, one present between near neighbours leading to reduced traffic capacity due to the CSMA/CA protocol of the WLAN, and one physical layer interference which will be present between far neighbours, beyond detection range. This latter co-channel interference (CCI) leads to reduced coverage compared to single cell operations and the effects are investigated here. A method of using these results as input to traffic simulations is shown. The analysis shows that severe range reductions will occur even for low traffic in the network. Results for coverage in % are given for three different scenarios.
{"title":"Coverage Estimations in a WLAN-based Open Broadband Access Network (OBAN)","authors":"P. Lehne, T. Ormhaug, O. Østerbø","doi":"10.1109/ISWCS.2007.4392412","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392412","url":null,"abstract":"The main idea of the OBAN concept is that the future deployment of broadband access lines and wireless LANs will have so much excess capacity, beyond what will be utilized by the host households, that it also can accommodate public wireless access services. The purpose of this paper is to analyse the viability of this idea with respect to wireless coverage in some typical scenarios. A model for estimating coverage in single and triple frequency wireless networks based on IEEE 802.11g WLAN is presented. A model for interference is established distinguishing between two types of interference, one present between near neighbours leading to reduced traffic capacity due to the CSMA/CA protocol of the WLAN, and one physical layer interference which will be present between far neighbours, beyond detection range. This latter co-channel interference (CCI) leads to reduced coverage compared to single cell operations and the effects are investigated here. A method of using these results as input to traffic simulations is shown. The analysis shows that severe range reductions will occur even for low traffic in the network. Results for coverage in % are given for three different scenarios.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129109943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISWCS.2007.4392352
M. Salas-Natera, R. M. Rodríguez-Osorio, L. Haro-Ariet
This paper presents an original contribution for a timing and carrier recovery configuration to be used in the critical receiving conditions of a satellite modem. It is particularly focused for its operation in an antenna array receiver, due to its low complexity and good performance in low SNR and large Doppler frequency scenarios. Results show the possibility to recover frequency offsets of 25000 Hz (DeltafldrT cong 0.3) under SNR of 5 dB, showing a significant improvement as compared to traditional receivers configurations.
{"title":"Analysis of Antenna Array Receivers Configurations for Satellite Earth Station Modems","authors":"M. Salas-Natera, R. M. Rodríguez-Osorio, L. Haro-Ariet","doi":"10.1109/ISWCS.2007.4392352","DOIUrl":"https://doi.org/10.1109/ISWCS.2007.4392352","url":null,"abstract":"This paper presents an original contribution for a timing and carrier recovery configuration to be used in the critical receiving conditions of a satellite modem. It is particularly focused for its operation in an antenna array receiver, due to its low complexity and good performance in low SNR and large Doppler frequency scenarios. Results show the possibility to recover frequency offsets of 25000 Hz (DeltafldrT cong 0.3) under SNR of 5 dB, showing a significant improvement as compared to traditional receivers configurations.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121163590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}