SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008




                     CONTROL SYSTEM TO REDUCE ADJACENT
                        INTERFERENCE IN BASE STATIONS

                               EDGAR ALEJANDRO ANDRADE GONZÁLEZ
                                        SILVIA RODRÍGUEZ CARPIO
                                           MARIO REYES AYALA
                                     JOSÉ ALFREDO TIRADO MÉNDEZ
                                            Electronic Department
                              Metropolitan Autonomous University-Azcapotzalco
                      Ave. St Pablo # 180, Col. Reynosa Tamaulipas, México City, México
                                               CINVESTAV-IPN
                                                   MÉXICO


Abstract: - This paper shows a control system to reduce adjacent interference in a cellular environment keeping the
longest distance between channels used by the handsets. This control system change dynamically the resources
(forward and reverse channel) allocated to all the users of the cellular system in order to maintain less interference in
the channels (adjacent interference).


Key-Words: - Cellular, Adjacent Interference, Channel, Base Station, Dynamical Allocation.

1 Introduction                                                        It is important to have prototype tools to emulate the
  The big growing of the wireless devices in                        cellular communication systems for educational
radiocommunication systems and high transmission                    application in order to improve the knowledge process
rates gives as a result the need to do an optimal                   of the communication system analysis.
management of the spectrum and also gives as a
consequence that the electronic devices operates with               2 Design of the control system
wide bandwidth.                                                       The control system consists in three blocks: the
  In the cellular systems, several unwanted factors                 Personal Computer, the microcontroller and the logic
appear like fading, co-channel interference, adjacent-              for the control of the VCOs (voltage control
channel interference, etc. The use of a limited                     oscillator). The VCOs has a bandwidth range from 760
spectrum in the communication system makes more                     MHz to 870 MHz.
difficult to management it maintaining the less
interference between the users.
  One of the worst unwanted effects is the adjacent
channel interference, which is generated when a signal
interferes the bandwidth of another channel nearby.
  There are several techniques to reduce adjacent
channel interference, like filters with high order, using
the feedforward structure in power amplifiers,
modulation techniques, etc. [1][2].
  In this paper, we show an algorithm to reduce the
adjacent channel interference in the base station                                       Fig. 1 Control system
maintaining the longest distance between channels
anytime. This control system allocates the channels to                In the personal computer, the algorithm for the
the users maintaining the best conditions into the base             allocation of the frequencies is programmed. Also, this
station to gives a good performance reducing the                    software application establishes the communication
adjacent channel interference reassigned all the                    with the microcontroller ATMEGA8535 through the
channel of the users. With this application the students            serial port.
can check the management of the channels for the                      The information interchanging between them are
users while they are in moving into a cell.                         related with the code for the users (consist of three



        ISSN: 1790-5117                                       456                                ISBN: 978-960-6766-84-8
12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008




bits), the code for the channels (consist of three bits)            communication service. Then, after that the system
and the flags for the disconnection or establishment of             analyzes if there are channels available or not; if there
the service for a specific user (one bit), with a specific          is at least one of them, then it proceeds to allocate the
structure of the data as we can see in the frame below.             channel with the longest distance between that user
                                                                    and the others in the system.
                                                                      The second task is if the user wants to finish the
                                                                    communication, in that case, the channel assigned to
                                                                    the user is released in order to be used by other user in
                                                                    the next establish of service.

                                                                    3.1 Algorithm to establish the communication
                    Fig. 2 Data Frame
                                                                      After we check that there are available channels in
                                                                    the system, it proceeds to assign the channel which has
  The microcontroller has three ports, one port for                 the maximum distance between the channels occupied
serial communication to receive the data to the                     and the new one (request).
configuration of the frequencies depending of the user                To achieve this goal, we have a data base of the
code and the channel code, one port to select the user              channels with the maximum distance between them
and the channel transmit the resulting code to the                  and we select the channel according to the availability
codecs and finally, one port for the gain control of the            in that moment. The way that the channels are
power amplifiers in the RF transmission block of the                allocated to the users (for example for eight users) is
base station. This last function was not showed in this             showed in the table 1 and table 2.
paper.
  The last block consists in logic for decoding the user
and channel and also using a Digital to Analog                                       Order of         Channel
Converter (DAC) to choose the channel desired in the                                Allocation
VCO for a specific user.                                                                1                 1
                                                                                        2                 8
3 Design of the Algorithm                                                               3                 4
  We show the algorithm explanation with eight users                                    4                 6
and eight different channels. The sequence of the
process to allocate channels to the users is based in the
                                                                                        5                 2
following flow chart.                                                                   6                 7
                                                                                        7                 5
                                                                                        8                 3
                                                                             Table 1 Allocation showing the maximum
                                                                                     distance between channels

                                                                    Where:


                                                                                  Channels         Frequencies
                                                                                                      MHz
                                                                                       1               760
                                                                                       2              775.7
                                                                                       3              791.4
                                                                                       4              807.1
                 Fig. 3 Algorithm general                                              5              822.8
                                                                                       6              838.5
  The process to initiate the choosing of the channels
of the users, it starts when there is an event of a user,                              7              854.2
which asks for the resources of the system in order to                                 8               870
establish the communication or leave the                                           Table 2 Channels frequencies



        ISSN: 1790-5117                                       457                                ISBN: 978-960-6766-84-8
12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008




3.1 Algorithm to finish the communication
  This algorithm frees the channel of the user selected,
but only if the user is using the last channel assigned;
this means that it is not necessary to reassign all the
channels of the rest of the users that are using
resources of the system, because all of them maintain
the longest distance between themselves [3].
  In general way, when a user wants to leave the
channel assigned to him; and this user it is not the last
one (assigned), then we have to rearranged all of the
channels allocated to the users occupying the place of
the user disconnected in order as the users enter to the
system to ask for a channel after the user involve,
giving as result, the channel allocation showing the
longest distance between themselves [3].

4 Conclusion
  This system control for the management of the
resources of the system (reverse channels and forward
channels) shows a dynamical control, maintaining all
the time the users arrive asking for resources or
leaving the communication, the longest distance
between their frequencies assigned (channels)
reducing the adjacent channel interference. We are
working in control of the gain in the amplifiers (low
noise amplifier and power amplifier) with the same
system using the same frame but with the 7th bit of the
frame; we use this prototype for educational purposes.
Finally, this management of the channels improves the
performance of the duplexer in FDM communication
systems.

References:

[1] P. García, A. Valdovinos et all, “Método de
Equilibrado basado en Algoritmos Genéticos e un
Esquema de Linealización Feedforward” Spain
[2] H. Hammuda, “Cellular Mobile Radio Systems:
Designing Systems for Capacity Optimization”, 1997
[3] S. Rodríguez, “Bloque de Radiofrecuencia para
Transmisión de una Estación Base”, Thesis, México,
2008




        ISSN: 1790-5117                                       458                                ISBN: 978-960-6766-84-8

Contenu connexe

Tendances

Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd Iaetsd
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationseSAT Publishing House
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECSURESHA V
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Editor IJARCET
 
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATION
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONA DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATION
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONcscpconf
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...inventionjournals
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
 

Tendances (16)

Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mac
MacMac
Mac
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATION
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONA DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATION
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATION
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 

En vedette

7104040050 m
7104040050 m7104040050 m
7104040050 mHery Xips
 
Infrared Remote Controlled Devices
Infrared Remote Controlled DevicesInfrared Remote Controlled Devices
Infrared Remote Controlled DevicesNarayan Jaiswal
 
Belajar membuat data base
Belajar membuat data baseBelajar membuat data base
Belajar membuat data baseandre_2
 
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavrPrayogy Pangestu
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontrollerbabak danyal
 
MICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONMICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONJahir Hussain
 
Panduan Ms access 2007 lengkap
Panduan Ms access 2007 lengkapPanduan Ms access 2007 lengkap
Panduan Ms access 2007 lengkapALI FIKRI
 
Micro controller based projects
Micro controller based projectsMicro controller based projects
Micro controller based projectsFajar Isnanto
 
How to Embrace Change at Work
How to Embrace Change at WorkHow to Embrace Change at Work
How to Embrace Change at WorkLinkedIn
 

En vedette (13)

7104040050 m
7104040050 m7104040050 m
7104040050 m
 
Presentation1
Presentation1Presentation1
Presentation1
 
6 modul avr
6 modul avr6 modul avr
6 modul avr
 
Avr and arm
Avr and armAvr and arm
Avr and arm
 
Infrared Remote Controlled Devices
Infrared Remote Controlled DevicesInfrared Remote Controlled Devices
Infrared Remote Controlled Devices
 
Belajar membuat data base
Belajar membuat data baseBelajar membuat data base
Belajar membuat data base
 
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr
97674720 buku-mikrokontroler-atmega8535-dengan-codevisionavr
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontroller
 
MICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONMICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATION
 
02. membuat database
02. membuat database02. membuat database
02. membuat database
 
Panduan Ms access 2007 lengkap
Panduan Ms access 2007 lengkapPanduan Ms access 2007 lengkap
Panduan Ms access 2007 lengkap
 
Micro controller based projects
Micro controller based projectsMicro controller based projects
Micro controller based projects
 
How to Embrace Change at Work
How to Embrace Change at WorkHow to Embrace Change at Work
How to Embrace Change at Work
 

Similaire à 70 com

Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET Journal
 
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...IJTET Journal
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
An efficient reconfigurable geographic routing congestion control algorithm f...
An efficient reconfigurable geographic routing congestion control algorithm f...An efficient reconfigurable geographic routing congestion control algorithm f...
An efficient reconfigurable geographic routing congestion control algorithm f...IJECEIAES
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Meenakshi Devi
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
 

Similaire à 70 com (20)

Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
40120140503011
4012014050301140120140503011
40120140503011
 
An efficient reconfigurable geographic routing congestion control algorithm f...
An efficient reconfigurable geographic routing congestion control algorithm f...An efficient reconfigurable geographic routing congestion control algorithm f...
An efficient reconfigurable geographic routing congestion control algorithm f...
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
29 88-96
29 88-9629 88-96
29 88-96
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMA
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

70 com

  • 1. 12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008 CONTROL SYSTEM TO REDUCE ADJACENT INTERFERENCE IN BASE STATIONS EDGAR ALEJANDRO ANDRADE GONZÁLEZ SILVIA RODRÍGUEZ CARPIO MARIO REYES AYALA JOSÉ ALFREDO TIRADO MÉNDEZ Electronic Department Metropolitan Autonomous University-Azcapotzalco Ave. St Pablo # 180, Col. Reynosa Tamaulipas, México City, México CINVESTAV-IPN MÉXICO Abstract: - This paper shows a control system to reduce adjacent interference in a cellular environment keeping the longest distance between channels used by the handsets. This control system change dynamically the resources (forward and reverse channel) allocated to all the users of the cellular system in order to maintain less interference in the channels (adjacent interference). Key-Words: - Cellular, Adjacent Interference, Channel, Base Station, Dynamical Allocation. 1 Introduction It is important to have prototype tools to emulate the The big growing of the wireless devices in cellular communication systems for educational radiocommunication systems and high transmission application in order to improve the knowledge process rates gives as a result the need to do an optimal of the communication system analysis. management of the spectrum and also gives as a consequence that the electronic devices operates with 2 Design of the control system wide bandwidth. The control system consists in three blocks: the In the cellular systems, several unwanted factors Personal Computer, the microcontroller and the logic appear like fading, co-channel interference, adjacent- for the control of the VCOs (voltage control channel interference, etc. The use of a limited oscillator). The VCOs has a bandwidth range from 760 spectrum in the communication system makes more MHz to 870 MHz. difficult to management it maintaining the less interference between the users. One of the worst unwanted effects is the adjacent channel interference, which is generated when a signal interferes the bandwidth of another channel nearby. There are several techniques to reduce adjacent channel interference, like filters with high order, using the feedforward structure in power amplifiers, modulation techniques, etc. [1][2]. In this paper, we show an algorithm to reduce the adjacent channel interference in the base station Fig. 1 Control system maintaining the longest distance between channels anytime. This control system allocates the channels to In the personal computer, the algorithm for the the users maintaining the best conditions into the base allocation of the frequencies is programmed. Also, this station to gives a good performance reducing the software application establishes the communication adjacent channel interference reassigned all the with the microcontroller ATMEGA8535 through the channel of the users. With this application the students serial port. can check the management of the channels for the The information interchanging between them are users while they are in moving into a cell. related with the code for the users (consist of three ISSN: 1790-5117 456 ISBN: 978-960-6766-84-8
  • 2. 12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008 bits), the code for the channels (consist of three bits) communication service. Then, after that the system and the flags for the disconnection or establishment of analyzes if there are channels available or not; if there the service for a specific user (one bit), with a specific is at least one of them, then it proceeds to allocate the structure of the data as we can see in the frame below. channel with the longest distance between that user and the others in the system. The second task is if the user wants to finish the communication, in that case, the channel assigned to the user is released in order to be used by other user in the next establish of service. 3.1 Algorithm to establish the communication Fig. 2 Data Frame After we check that there are available channels in the system, it proceeds to assign the channel which has The microcontroller has three ports, one port for the maximum distance between the channels occupied serial communication to receive the data to the and the new one (request). configuration of the frequencies depending of the user To achieve this goal, we have a data base of the code and the channel code, one port to select the user channels with the maximum distance between them and the channel transmit the resulting code to the and we select the channel according to the availability codecs and finally, one port for the gain control of the in that moment. The way that the channels are power amplifiers in the RF transmission block of the allocated to the users (for example for eight users) is base station. This last function was not showed in this showed in the table 1 and table 2. paper. The last block consists in logic for decoding the user and channel and also using a Digital to Analog Order of Channel Converter (DAC) to choose the channel desired in the Allocation VCO for a specific user. 1 1 2 8 3 Design of the Algorithm 3 4 We show the algorithm explanation with eight users 4 6 and eight different channels. The sequence of the process to allocate channels to the users is based in the 5 2 following flow chart. 6 7 7 5 8 3 Table 1 Allocation showing the maximum distance between channels Where: Channels Frequencies MHz 1 760 2 775.7 3 791.4 4 807.1 Fig. 3 Algorithm general 5 822.8 6 838.5 The process to initiate the choosing of the channels of the users, it starts when there is an event of a user, 7 854.2 which asks for the resources of the system in order to 8 870 establish the communication or leave the Table 2 Channels frequencies ISSN: 1790-5117 457 ISBN: 978-960-6766-84-8
  • 3. 12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, 2008 3.1 Algorithm to finish the communication This algorithm frees the channel of the user selected, but only if the user is using the last channel assigned; this means that it is not necessary to reassign all the channels of the rest of the users that are using resources of the system, because all of them maintain the longest distance between themselves [3]. In general way, when a user wants to leave the channel assigned to him; and this user it is not the last one (assigned), then we have to rearranged all of the channels allocated to the users occupying the place of the user disconnected in order as the users enter to the system to ask for a channel after the user involve, giving as result, the channel allocation showing the longest distance between themselves [3]. 4 Conclusion This system control for the management of the resources of the system (reverse channels and forward channels) shows a dynamical control, maintaining all the time the users arrive asking for resources or leaving the communication, the longest distance between their frequencies assigned (channels) reducing the adjacent channel interference. We are working in control of the gain in the amplifiers (low noise amplifier and power amplifier) with the same system using the same frame but with the 7th bit of the frame; we use this prototype for educational purposes. Finally, this management of the channels improves the performance of the duplexer in FDM communication systems. References: [1] P. García, A. Valdovinos et all, “Método de Equilibrado basado en Algoritmos Genéticos e un Esquema de Linealización Feedforward” Spain [2] H. Hammuda, “Cellular Mobile Radio Systems: Designing Systems for Capacity Optimization”, 1997 [3] S. Rodríguez, “Bloque de Radiofrecuencia para Transmisión de una Estación Base”, Thesis, México, 2008 ISSN: 1790-5117 458 ISBN: 978-960-6766-84-8