Abstract
The beamforming used in TD-LTE systems is a somewhat more complex proposition. Eigenvalue-based beamforming (EBB) is based on Singular value decomposition. It’s included short-term BF and Long-term BF two methods and applied in different channel knowledge. In this paper, firstly, it described short-term BF algorithm, especially focused on the method how to apply for OFDM and TD-LTE system. And then make a SW designing implementation for short-term BF, too. It is involved in some basic idea of implementation, SRS combiner and MAC layer designing. Finally, the paper gives the detailed simulation for different performance index and gets some technical conclusion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gaudes, C.C., Santamaria, I., Via, J., Masgrau, E., Sese, T.: Roubust array beamforming with sidelobe control, using support vector machines. IEEE Trans. Sig. Proc. 55(2), 654–672 (2007)
Li, J., Stoica, P., Wang, Z.: On robust Capon beamforming and diagonal loading. IEEE Trans. Sig. Proc. 51(7), 1502–1514 (2003)
Li, G., Yan, G., Ning, L.: A fast convergence DOA estimation algorithm. In: International Conference in Communications and Networking in China 2006 (CHINACOM 2006), Beijing, China, October 25-27 (2006)
Singh, H., Singh, S.: Smart-802.11b MAC protocol for use with smart antennas. In: IEEE International Conference on Communications (ICC 2004), Paris, France, June 20-24, vol. 6, pp. 2684–2688 (2004)
Zhao, R., Yu, F., Yang, L.: Relay-Assisted Cooperative Communication Networks. ZTE Communications 6(3), 21–23 (2008)
3GPP R1-090193. Aspects of Joint Processing in Downlink CoMP (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, X., Jin, W. (2012). Short-Term BF Research on TD-LTE System. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_100
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_100
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)