to technical system lags behind, weak data bandwidth capabilities, and poor mobility, it is difficult to meet the development requirements of industry private networks. To help private network users solve the above problems, narrowband Digital cluster technology has clearly evolved to a broadband multimedia Cluster Based on LTE, the TD-LTE-based broadband multimedia digital cluster solution is favored by u
Before reading this article, it is recommended to take a look at the post "LTE-TDD HARQ (1)-upstream HARQ timing" to better understand the content of this article.The main contents of this article include:(1) What is the Phich channel and what is its role?(2) How to uniquely identify a Phich channel(3) What is the content of the Phich channel corresponding to the reg actual mapping?(4) Location of the Phich channel1. What is the Phich channelPHICH Cha
LTE security vulnerabilities allow hackers to send false emergency alerts
Any electronic technology may have security vulnerabilities, even the mobile network technology itself is no exception. Researchers at the U. S. Pudu University and the University of Iowa have published a report describing the existence of severe security vulnerabilities in the LTE protocol, allowing hackers to launch 10 different at
Multiple access is a multi-address method which is realized by the different code sequences formed by spread spectrum technology. V. LTE (long term Evolution) projectLTE is the evolution of 3G, not a widely misunderstood 4G technology, but a transition between 3G and 4G technology, is the global standard of 3.9G, which improves the 3G air access technology, using OFDM and MIMO as the only standard for their wireless network evolution.LTE provides a p
In LTE, each cell has 64 preamble codes, so how do these preamble sequences preamble sequences generated? This article is intended to illustrate the process of generating a sequence of preamble codes.The set of preamble sequences consists of the root sequence and the cyclic shift sequence generated by the root sequence, which is divided into two large steps:(1) Generate a Zc (zadoff-chu) root sequence xu (n), as a datum sequence(2) Cyclic shift of the
LTE user documentation(if there are inappropriate places, please correct me!) )9 PHY Error ModelThe physical error model consists of a data error model and a downlink control error model, both of which are activated by default. You can use the Ns-3 property system to activate, specifically:Config::setdefault ("ns3::ltespectrumphy::ctrlerrormodelenabled", Booleanvalue ( False)); Config::setdefault ("ns3::ltespectrumphy::D ataerrormodelenabled", Boolea
have been doing the LTE physical layer related work, there has been a doubt, in 36.211 the beginning of a chapter defines the size of TS is 1/(15000*2048) s, why define so a strange unit time.Recently, this was related to the FFT/IFFT process.Assuming 20MHz bandwidth, the standard specifies that we use 2048 points to do the FFT process, the FFT process is the time domain, each time domain symbol has 2048 time domain sample, FFT, converted into the fre
Some key LTE technologies in Vernacular
I have never been in touch with the actual LTE equipment because I am working on CDMA, but I have read a lot of theoretical materials, including the red books. I personally feel that Chinese books are not very good yet, it covers a wide range of topics, but there are very few details. If you want to study it in depth, unless you look at the agreement, but how tired t
Although 4G is commercially available for half a year, the base station has poor network coverage and weak mobile phone signals, but there are still situations where the base station cannot be online or make phone calls. However, if the carrier uses a superconducting link system, mobile phone users do not have to worry about this.
Recently, reporters from a third-party detection agencies to a test results report that the use of superconducting lte rf
Network splitter |3g/lte Service collector | Mobile Internet Collector 1, overview | network shunt | 3G/LTE wireless network monitoring is far more complex than the original Internet backbone monitoring, mainly in the following aspects: The System diversity, China Mobile based on TD-SCDMA Technology, China Telecom is based on the CDMA2000 technology standard, and Unicom is based on WCDMA technology. Theref
Recently, Shanghai released the "12th Five-Year Plan" for the development of the communications industry (hereinafter referred to as the "Plan"), proposing that by the end of the "12th Five-Year Plan", the number of mobile phone users would reach 30 million, 3G and LTE accounts for over 70% of users.
According to the plan, by the end of the 12th Five-Year Plan, the number of telephone users in Shanghai reached 38 million, and the number of fixed phon
was opening quickly, which led us to the station, but too late.In the case of slow channel changes, such as indoor or nomadic access services in large cities, it is necessary to use the closed-loop MIMO to further improve the performance of the shampoo.Closed-loop system is the receiving end of the information channel feedback to the transmitter, and then the transmission of data encoding, beamforming or antenna selection and other operations.The feedback method is divided into full feedback or
ICIC:Inter Cell interference coordination, inter-cell interference coordination technology. For cellular network cell throughput is the key limit of the target is the cell disturbance, especially the cell edge users. Because the LTE system supports a frequency multiplexing factor of 1, the meticulous management of inter-cell interference is particularly important.The Icic design guideline is to increase the throughput of edge users without decreasing
Redirection in LTE means that the system uses redirectedcarrierinfo in the rrcconnectionrelease message to indicate that the UE will attempt to reside in the specified system/frequency point after leaving the connection state.LTE supports intra-system redirection and bidirectional inter-system redirectionCommunity redirection is divided into based onMeasurementAndNon-MeasurementU when you select measurement-based redirection, after receiving the measu
UBuntu 14.04 LTE under host name and IP address resolution some related configuration files:/etc/hosts: Host file. Manually configure the mapping between the IP address and the host name. The format is one map bar item per line: /etc/network/interfaces: Host network interface configuration file, both Ifup and Ifdown commands depend on it./ETC/RESOLV.CONF: Name Server (DNS) configuration file, and actually /etc/resolv.conf is a linked file that points
With the development and evolution of mobile network communication systems, 3G mobile communication systems are no longer a distant dream. As China Mobile, China Unicom, and China Telecom increase their 3G network construction scale, a new term comes to our eyes, namely LTE. This article will focus on the differences between the 3G network architecture and the LTE network architecture, and explore the
Adax, industry leader in High-Performance Data grouping, processing, security, and network infrastructure, warned that the current LTE signaling infrastructure is insufficient, it is difficult to meet the next wave of 4G deployment needs. Market research firm Strategy Analytics also pointed out in its predictions that by 2017, the total number of LTE users worldwide will reach 1 billion, this means that all
With the mobile phone mobile internet constantly, has basically completed the traditional 2G to 3G transition, at present, China is vigorously promoting the development of 4G, the recent more promising to release 4G Fdd-lte photos, mobile networks such innovations to the user is faster mobile phone mobile device access to the Internet speed, and more stable signal , which also produced a term for LTE. The
: An SI can contain multiple sib, and multiple si have a common si window length; SIB2 content: Common channel configuration, upstream carrier frequency, bandwidth, Radio Resource, MBSFN (multimedia Broadcast Multicast Services single frequency network), Rach required information SIB3 ... SIB12: Public resources and re-election of various information;
Second, the system message acquisition process the entire system receives the process to need: Obtains the MIB, obtains the Sib type1 the Si infol
calculation of MCS, modulation order, encoding rate, spectral efficiency relationship table
Reference URL: http://4g-lte-world.blogspot.tw/2012/12/transport-block-size-code-rate-protocol.html
Reference URL: http://blog.richliu.com/2013/10/22/1545/
(1) Premises:
Therefore, the efficiency can be simplified to the following formula:
tbs= size of the transfer block (table 7.1.7.2.1-1)
crc= the number of bits that are attached for error checking =24
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.