to children, women and men through the Internet, computers and CDROMs, email, audio and video teleconferencing, video or television broadcasts and radio. Students and other learners can access the content directly. Teachers can develop their skills and knowledge. Telecommunications help to deliver quality content across wide geographical area. Educating and training youth is one of the major responsibilities of government. Education has always been a foundation for economic and social development. Countries have the opportunity to develop their intellectual capital, and it will become increasingly necessary for all nations to invest wisely to educate and train their citizens, of all ages. Investments in education and learning are crucial. Wise investments that utilize the power and reach of the information and communication technologies available can help to achieve the goal of universal access to education. Information can now travel to any part of the world, across a city or nation, in the same time and at the same cost.
Список литературы:
1. Английский язык для технических вузов: учеб. пособие / В.А. Радо-вель - М. : Дашков и Ко, 2010. - 444 с.
2. Innovation in Telecommunications [Электронный ресурс]. - Режим доступа: http://cyber.law.harvard.edu/commonsbasedresearch/sites/commonsbased-research/images/Telecommunications.pdf.
3. Telecommunications & Education - The Regency Foundation [Электронный ресурс]. - Режим доступа: www.regency.org/t_in_act/pdf/english/edu-cate.pdf.
BLIND DETECTION IN A NONCOHERENT ASYNCHRONOUS DHA FH OFDMA SYSTEM1
© Osipov D.S.*, Seitkulov Ye.N.*
Institute for Information Transmission Problems RAS (Kharkevich Institute),
Moscow
L.N. Gumilyov Eurasian National University, Kazahstan, Astana
In this paper the problem of designing a blind detection technique for a noncoherent DHA FH OFDMA system is considered. Two decision making strategies are introduced. The performance of the proposed strategies in terms of the maximum possible transmission rate is evaluated via simulation for the typical urban model from the 3GPP LTE standard.
1 Dmitry Osipov has been supported by the RFBR grant 12-07-31035
* Старший научный сотрудник лаборатории Информационных технологий передачи, анализа и защиты информации Института проблем передачи информации им. А.А. Харкевича РАН, кандидат технических наук.
* Директор НИИ Информационной безопасности и криптологии, кандидат физико-математических наук.
Introduction
Dynamic Hopset Allocation Frequency Hopping OFDMA (DHA FH OFDMA) has been initially proposed in [1]. Since then a number of modifications has been considered. Noncoherent DHA FH OFDMA with threshold reception seems the most promising one since it is much less vulnerable to multitone jamming than the conventional FH OFDMA. However in [1] it has been assumed that all the signals from all users have the same power at the receiver side and the received signal is affected only by multiple access interference (i.e. signals transmitted by the other users) and additive white Gaussian noise. Although such an assumption simplifies the analytical treatment of the system in question (nevertheless this problem remains a cumbersome one) it is true only for a system with ideal channel state information (CSI) at the transmitter. Moreover, the maximum power of the transmitted signal is to be sufficient to ensure the desired power of the signal at the receiver side no matter how low the transfer ratio of the subchannel in use is. However, in real life applications the power of the transmitter is limited and ideal CSI is not available at the transmitter side (in fact ideal CSI is not available at the receiver side as well). Therefore although the aforementioned assumption can be considered as the first step in the analytical treatment of the system under consideration it doesn't clarify the perspective of the implementation of the aforesaid technique in real-life applications. This paper deals with the problem of proposing a modification of the classical DHA FH OFDMA model with noncoherent threshold reception with the aim of designing a jamming-proof system that need not use CSI knowledge and power control. In what follows several system models complying with the aforesaid requirements will be proposed.
Blind detection: decision making and performance criterion
In what follows two detection strategies will be considered. Within the scope of the first detection strategy the receiver chooses the greatest power subchannel and accepts the symbol corresponding to it (let us further on refer to this strategy as Strategy 1 (ST1)). Within the scope of the second detection strategy we will assume that the output of a certain subchannel corresponds to the signal sent by an active user only if it is k times greater than the background noise power. Therefore the value Pt = kN (where k is the threshold coefficient value and N is the background noise power) is a threshold enabling us to use the reception rule stated in [1]: «if decision crossing is detected in only one subchannel a symbol corresponding to it is accepted. Otherwise an erasure decision is taken». Let us further on refer to this strategy as Strategy 2 (ST2).
Let us now consider the aforementioned decision procedure in information theory terms. From the information theory point of view a DHA FH OFDMA system using decision strategy 2 is just a q-ary discrete channel with erasures. In order to find the channel capacity of this channel we shall use the following technique: the channel under consideration (let us designate it by C0) will be represented as a
serial concatenation of a q-ary discrete symmetric channel (let us designate it by C1) and a q-ary erasure channel (let us designate it by C2). Note that since C1 and C2 are independent the probability of error Pe that describes C1 is given by:
p
P e =
1 - Px
The channel capacity of channel C1 is given by:
Ce = log2 q +
(
+
((
1
\V
л (
1—
1 - Px
log2
1—
1-P
x У /
1 - P:
-log2
1 - p
x у у
T2^ iog2 (q -1) 1-P
(1)
therefore the channel capacity of the channel CO is given by Cc = Ce(1 - px) (see [2]) and therefore:
C =((1 - Px) log2 q)+ (1 - Pe ) log2
1 --
Pe l0g2
' Pe ^
1 - Px
1 - Px
-(Pe l0g2 (q - 1))
(2)
Note that both px and pe depend on the number of active users K, the overall number of subchannels available to the active users Q, the number of subchannels allocated to each user q, SNR and the value of the threshold coefficient k. Thus if all the parameters but the last one are fixed it is reasonable to choose k that maximizes Cc. The obtained value Rm is the maximum possible transmission rate (MPTR) of reliable data transmission (the term «reliable» has the same meaning here as in [3]) in the system under consideration and is given by:
Rm = max (Cc (pe (k), px (k)))
As for the decision strategy 1 the resulting system is just a q-ary discrete symmetric channel with probability of errorpe. Thus its channel capacity is given by:
Cc = !og2 q + ((1 - Pe ) !°g2 (1 - Pe )) + (Pe l0g2 (Pe )) " (Pe l0g2 (9 " l))
Note that in this case Cc coincides with Rm.
Unfortunately probabilities of error and erasure depend on the distribution of the subchannels' transfer ratios. Thus the effectiveness of the proposed strategies can be evaluated only by means of simulation.
e
e
V
Simulation
An asynchronous DHA FH OFDMA system with noncoherent reception is considered. We assume that the overall number of subchannels is 4096, which means that Q = 3276 are available to the active users. Each user is allocated q=2 subchannels at a time. The channel in use is assumed to correspond to the typical urban channel model from the 3GPP LTE standard. The speed of each user is randomly chosen from the array V = [40, 50, ..., 200] km/h. As has already been mentioned, we assume that all transmissions are uncoordinated and no power control is used. The background noise level is to be described by the SNR which P
is given by SNR = 10log10 where Pt is the transmitted signal's power and N is
the average noise power. In our simulation we shall use SNR = 15 dB. Hereinafter we shall consider two cases. In the first case the number of active users is K = 100. In the second case we shall assume K = 200.
A twofold increase of the number of active users can be interpreted in two ways. On the one hand, it can be interpreted as a result of the authorized users' activity. Therefore our analysis enables us to evaluate the robustness of the detection procedures in question. On the other hand, a twofold increase of the number of active users can be interpreted as a result of jamming. In this case the intruder imitates the other users' activity by sending additional signals similar to those of the authorized users (this strategy is very simple and convenient for the intruder since it complicates still more the task of distinguishing between the signals sent by the intruder and those transmitted by the authorized users.) Thus if we use this interpretation we assume that the transmission power available to the intruder is 100 times greater than that available to the authorized user. In Fig. 1 the dependences of value Cc (in bits per OFDM frame) for the second reception strategy on the value of the threshold coefficient are given. Values of Cc corresponding to the first strategy are also presented in Fig. 1. Points of the curves corresponding to the Rm values for the second strategy are indicated by the respective text marks (note that the values of Cc and Rm coincide for the first strategy).
As is shown in Fig. 1, in the second case threshold coefficient k = 5 corresponds to the maximum value of Cc, which means that k = 5 is this parameter's optimal value for the example under consideration. Note that a twofold increase of the number of active users results in the decrease of Rm by 0,07 bits per OFDM for both strategies. However, if the threshold coefficient is chosen in a proper way Strategy 2 is far more promising (since it ensures higher MPTR values). Therefore in what follows we shall consider only Strategy 2. In fact the performance degradation caused by the system load increase (either caused by the authorized users' activity or by multitone jamming) is moderate.
Now let us consider transponder jamming. Apparently the impact of the transponder jammer on the system performance depends on the signals' fraction the jammer is able to detect. Hereinafter a borderline case will be considered: we
shall assume that the jammer can detect all the signals transmitted by all the authorized users. As the jammer detects a certain signal it sends a signal similar (i.e. having the same bandwidth and power) to the one used by the authorized user via the respective subchannel (note that it is practically impossible for the jammer to generate a signal antipodal to the one transmitted by the authorized user. Therefore in what follows we shall assume that the signal sent by the jammer has a random, uniformly distributed phase.) Thus, the jammer transmission power is more than 100 times higher than that of the authorized user. However the signals transmitted by the jammer are affected by attenuation just like those transmitted by the authorized users. The simulation results are presented in Fig. 2.
2. 0.6 I
0.55
R = m 00
-M--—» -
---ST1,K=100 -----ST1,K=200 —x— ST2, K=100 —•—ST2, K=200
35 4 45 5
threshold coefficient value
Fig. 1. Simulation results for the proposed strategies and various numbers
of active users
Fig. 2. Simulation results for various jamming strategies
As can be seen from Fig. 2, the maximum possible transmission rate of the active user increases if the signal is jammed by the transponder receiver. This result can be easily interpreted since the average power of the received signal grows if more than one user transmits in the same subchannel. Therefore we can conclude that the DHA FH OFDMA system using the proposed Strategy 2 is well protected from transponder jamming and can be considered most promising for implementation in real-life systems.
Conclusions
Hereinabove the problem of designing a detection technique that need not use CSI knowledge and power control and is well protected from both authorized and unauthorized users' activity has been considered. Simulation results show that reasonable choice of the threshold coefficient makes the resulting detector both jamming-proof and robust. Thus system models using this modified strategy can be considered promising candidates for possible implementation in real-life systems.
References:
1. Zyablov VV, Osipov D.S. On the optimum choice of a threshold in a frequency hopping OFDMA system // Problems of Information Transmission. -2008. - Vol. 44, No. 2. - Р. 91-99.
2. Verdu S., Weissman T. The Information Lost in Erasures // IEEE Transactions On Information Theory. - IEEE, USA, 2008. - Vol. 54, #11. - Р. 5030-5058.
3. Gallager R.G Information Theory and Reliable Communication. - John Wiley & Sons, Chichester, UK. 1968.
ОБОСНОВАНИЕ ВЫБОРА ПРЕДПОЧТЕНИЙ ПРИ АЛЬТЕРНАТИВНОЙ ДИНАМИЧЕСКОЙ ПОШАГОВОЙ МАРШРУТИЗАЦИИ И ВОЗМОЖНОСТИ ЕЁ РАЗВИТИЯ
© Саид Мохаммед Мукред*
Московского государственного университета путей сообщения (МИИТ),
г. Москва
Приводится сравнительная оценка пропускной способности беспроводной сети при исползовании альтернативной и безальтернативной маршрутизации. Развиваются идеи ранее опубликованной работы.
WI-FI - это современная беспроводная технология передачи цифровых данных по радиоканалам. Аббревиатура Wi-Fi (Wireless Fidelity) в точном
* Аспирант кафедры «Вычислительные системы и сети».