Professional Documents
Culture Documents
Paper Published
Paper Published
*2 PRASHANT BHATI (Assistant professor of electronics and communication Department, Patel College of
science and technology / RGPV University, India
bhati.prashant22@gmail.com
ABSTRACT I .INTRODUCTION
The telecommunication industry has been developing Wireless is a spectrum of opportunities. IEEE 802.16
at a very fast rate. In this era the telecom industry is is a family of Wireless Broadband Network. The
expected to grow more as demand increases for 802.16 family of standards is officially called
higher generation wireless network applications as a WirelessMAN in IEEE. The IEEE 802.16 standard is
cost effective solutions. This paper presents the based on the Wireless Metropolitan Area Network
performance enhancement of the WiMAX system (WMAN). It supports multiple frequency allocations
(Worldwide Interoperability for Microwave Access) from 2-66GHz.WiMAX is one of the various areas of
by using MIMO Technique and Zero Forcing research that is started with 802.16 on developing its
performance of WiMAX system for different wireless access (BWA) systems ,e.g. IEEE 802.16
modulation technique by using MIMO Technique and standard [1] is WiMAX (Worldwide interoperability
Zero Forcing Equalizer. The performance is for Microwave Access), that defines the physical
improved by using multiple antennas at transmitting (PHY) and medium access control (MAC) layers and
and receiving side. At last text is transmitted and, makes several possible configurations available along
Keywords: WiMAX, OFDM, Equalizer, LMS, RLS expected to deliver broadband access services to
provides extensible security. IEEE 802.16 standard 2.2 MAC Common Part Sublayer(MAC CPS)
gives strong support for authentication, key
The second sub-layer is Common Part Sub-layer
management, encryption and decryption
(CPS), which is tightly integrated with the security
II. IEEE 802.16 Protocol Architecture: sub-layer. This layer defines the rules and
mechanisms for system access, bandwidth allocation
and connection management. It also defines functions
like scheduling, connection control and automatic
repeat request. The core MAC layer provides packet
fragmentation, ARQ and QOS.
The IEEE 802.16 protocol architecture has two main secure distribution of the key negotiations from the
layers: the Medium Access Control (MAC) layer and Base Station (BS) to the Subscriber Station (SS).
T
cos(2 nft ) cos(2 mft )dt 0; n m
interface. the principle of OFDMA consists of
different users who share the Fast Fourier Transform 0
(1)
(FFT) space. The architecture is based on a scalable
sub-channelization structure with variable FFT sizes Discrete Time
according to the channel bandwidth. It is expected
that Mobile WiMAX with MIMO will be able to
carry approximately 4x more traffic than today’s 3G N 1 2 kn 2 kn
networks. MIMO technology constitutes a 0
cos(
N
) cos
N
0; n m
breakthrough in wireless communication design.
(2)
Orthogonal Frequency Division
Multiplexing(OFDM) The carriers of an OFDM are sinusoids that meet this
In recent years Orthogonal Frequency Division requirement because each one is a multiple of
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
received with error by using error correcting code. information and code words of convolutional codes
This technique used to enhance data reliability. It are of infinite length, and therefore they are mostly
introduced redundant data, called error correcting referred to as information and code sequence.
code, prior to data transmission or storage. FEC Space Time Block Coding
provides the receiver with the ability to correct errors
Space-time coding is a method used in multiple
without a reverse channel to request the
antenna systems to not only increase the reliability of
retransmission of data. Forward error correcting code
the communication link, but also increase its
is further divide in two groups which are as follows.
throughput. This is accomplished by encoding
1) Block code.
multiple streams of data across the spatial domain
2) Convolution code.
(i.e., antennas) and across the time domain. Space-
Block Code:
Time Codes (STCs) have been implemented in
Block codes operate on a block of bits. block codes" cellular communications as well as in wireless local
are error correcting code that acts on a block of k bits area networks. Space time coding is performed in
input data to produce n bits of output data (n,k).Block both spatial and temporal domain introducing
codes are referred to as (n, k) codes. A block of k redundancy between signals transmitted from various
information bits are coded to become a block of n antennas at various time periods. It can achieve
bits. transmit diversity and antenna gain over spatially
n=k + r where r is the number of parity bits. k is the Space Time Block Code (STBC): Space-time block
number of information. codes operate on block of input symbols, producing a
Convolution Code matrix output whose columns represent time and
Convolution codes were first mentioned by Elias in rows represent antennas. The space-time coding
1955. They can be seen as an attempt to generate the scheme, is essentially a joint design of coding,
random codes that were successfully used by modulation, transmit and receive diversity. A space–
Shannon. time block code is defined by a transmission
Convolution codes differ from block codes in that the matrix G. The entries of the matrix G are linear
encoder contains memory and the n encoder outputs
combinations of the variables and
at any given time unit depend not only on the k inputs
their conjugates. The number of transmission
at that time unit but also on m previous input blocks.
antennas is n, and we usually use it to separate
An (n, k, m) convolutional code can be implemented
different codes from each other. For example,
with a k-input, n-output linear sequential circuit with
represents a code which utilizes two transmit
input memory m. typically, n and k are small integers
antennas and is defined by,
with k < n, but the memory order m must be made
large to achieve low error probabilities. The
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
Alamouti Encoding: To introduce Space Time Causes of multipath include atmospheric ducting,
Block Codes, The Alamouti code is most commonly ionosphere reflection and refraction, and reflection
used. A simple transmit diversity scheme which from water bodies and terrestrial objects such as
improves the signal quality at the receiver on one side mountains and buildings. The effects of multipath
of the link by simple processing across two transmit include constructive and destructive interference, and
antennas at the opposite end. This is a very special phase shifting of the signal. This causes Rayleigh
STBC. It is the only orthogonal STBC that achieves fading.
rate-1.only STBC can achieve its full diversity gain Rician Fading
without needing to sacrifice its data rate.
A difference between Rayleigh fading and Rician
fading is that there is no dominant component in
Fading in Wireless Channel
Rayleigh fading channels. If a channel has a fixed
Fading is deviation of the attenuation that a carrier-
LOS component, the received signal equals the
modulated telecommunication signal experiences
superposition of a complex Gaussian component and
over certain propagation media. The radio waves
a LOS component. The signal envelope in this case is
transmitted from the BS, arrive at the MS after
considered to be a Rician distribution
reflection, diffraction and scattering from the natural
Psc = Probability of symbol-error per carrier
and man-made objects situated between the BS and
the MS. The incoming radio waves arriving from
Noise and Interference
different directions have different propagation delays.
These multipath components, having randomly
Bit Error Rate: The bit error rate ratio (BER) is the
distributed amplitudes, phases and angles of arrival,
number of bit errors divided by the total number of
at the receiver antenna causing the received signal to
transferred bits during a time interval.
distort or fade. Thus, fading is the rapid fluctuations
in the amplitude phase and the multipath delays of a
Signal-to-Noise Ratio (SNR):SNR is defined as the
radio signal over a short period of time.
ratio between signal power to noise power and it is
The Flat Rayleigh Fading Channel Model normally expressed in decibel (dB). The
mathematical
Rayleigh fading is caused by multipath reception. In
expression of SNR is;
wireless telecommunications, multipath is the
propagation phenomenon that results in radio signals
reaching the receiving antenna by two or more paths.
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
FEC Encoding or
Data Randomization Modulation Serial to
Convolution
Generation Parallel
coding
Noise
Derandomization BER
Calculation
Figure 3: Basic Simulation Model for WiMAX System using MIMO Technique
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
For Performance analysis of WiMAX system for Subcarrier. IFFT is useful for OFDM because it
different modulation scheme by using MIMO generates samples of a waveform with frequency
technique firstly we generate the stream of binary component satisfying orthogonality condition.
data, then perform the randomization process, which CYCLIC PREFIX, In OFDMA to enable the
works on a bit by bit basis. The purpose of the multiple access sub channels are used which are
scrambled data which is obtained from the random formed by grouping the data subcarriers. Number of
data generator is to convert long sequences of O's or different sub channels is allocated to the particular
1's in a random sequence to improve the coding user in order to send & receive data. There are two
performance. The main component of the data parts in one OFDMA symbol in time domain. The
randomization is a Pseudo Random Binary Sequence cyclic prefix (CP) time &useful symbol time. CP is
generator which is implemented using Linear used to remove the effect of ISI & ICI in multipath
Feedback Shift Register. Next step is to pass the scenario.CP is the copy of the last part of the OFDM
obtained data through Forward Error Correction symbol which is appended in the front of the
block using convolution coding[4]. convolution code transmitted OFDM symbol . The length of CP or
introduces redundant bits into the data stream through guard time interval must be chosen such that it is
the use of linear shift register. The convolution longer than the maximum delay spread of the
Modulation is the fundamental components of a Shows the block diagram of the transmitter module in
digital communication system. Modulation is the MIMO system based on the Alamouti code. The
binary bits enter a modulator and are converted into
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
“symbols”. These “symbols” are represented by Different demodulation techniques may be applied at
complex numbers and they are fed into the Alamouti the receiver. In MIMO schemes used in the IEEE
encoder. The Alamouti encoder maps the symbols 802.16(WiMAX)two mandatory profiles has
onto the transmitter by using the above mentioned specified, space-time code (STC) and spatial
matrix defined by (1). In this matrix, the rows multiplexing (SM). the space–time code (STC) is
represent the transmit antennas, and columns based on “Alamouti A algorithm” which we have
represent the time. The elements of the matrix define used here for transmit diversity [56]. This code
the symbols that to be transmitted from a particular achieves a diversity order that is equal to twice the
antenna. The Alamouti code works with a pairs of number of antennas at the receiver.
symbols at a time. It takes two time periods to
After Demodulation removal of zero padding and
transmit the two symbols.[55]
derandomization of data take place, the original data
received at the receiver on which BER is calculated.
This is the last part of the process in which the BER
vs SNR graphs for MIMO"OFDM with WiMAX
System using Alamouti Algorithm with Space Time
Coding are presented for Rayleigh fading channel.
V. PERFORMANCE ANALYSIS
The behavior of the WiMAX System based on
MIMO"OFDM Technique under different
Figure4:MIMO Transmitter (using Alamauti
environments is studied and the effects of increasing
code)
the order of the modulation on the BER performance
AWGN noise is added as a channel. AT the receiver
of the system are presented. Zero Forcing
inverse operation of transmitter takes place.
equalization is used decoding the coded data symbols
Zero Forcing Equalizer is used at the receiver to
at the receiver side. Results are shown in the form of
bringing down the intersymbol interference (ISI) The
SNR vs. BER plot for different modulations and
Zero-Forcing Equalizer applies the inverse of the
different channels. The analysis has been done for
channel frequency response to the received signal, to
wireless fading channels namely Rayleigh Channel.
restore the signal after the channel. The proposed
Lastly the performance is evaluated by transmitting
equalizer provides ISI-free communications over the
theTextData. Results are presented for different
IS I MIMO channels without a long guard period.
antenna configurations over different fading channels
By Performing a FFT on the received samples after
using different modulation levels. This performance
the cyclic prefix is discarded, the periodic
is basically analyzed using two criterions namely:
convolution is transformed into multiplication.
A R DIGITECH
International Journal Of Engineering, Education And Technology (ARDIJEET)
www.ardigitech.in ISSN 2320-883X
1. BER Analysis
BER Analysis
In this section BER analysis of WiMAX system is
done for different order of Modulation levels. The
analysis of the system using M"PSK is presented then
same procedure is done for M"QAM. The fading
channels used for this purpose is Rayleigh channels.
A BER measurement for BPSK, QPSK and M’QAM
Figure6: BER Vs SNR PLOT of 2X2 MIMO
is shown by Figures with code rates 1/2 respectively.
VI. CONCLUSION
techniques for 1/2 code rate. Simulation results show [5] Analysis of Mobile WiMAX Security:
that even with only one selected antenna at the Vulnerabilities and Solutions by Tao Han, Ning
receiver, performances in terms of BER still Zhang, Kaiming Liu, Bihua Tang, Yuan'an Liu
satisfactory. On increasing the no. of transmitting [6] Performance Evaluation of IEEE STD 802.16d
antennas and receiving antennas there is an Transceiver Mrunal P. Pathak, S. A. Shirsat
improvement in , the spectral efficiency , and also
[7] WimaxTechnology Performance Enhancement
better BER values can be obtained. Results show that
Using Phy Layer with Turbo Coding *Shaik
by using MIMO technique, bit error rate for all
Avaes Mohsin,**Kilaru Kalyan, # Suresh
modulation techniques are improved. The zero
Angadi
forcing equalize mitigates the effect of the wireless
[8] Performance Evaluation of IEEE 802.16e
channel and allows subsequent symbol demodulation.
(Mobile WiMAX) in OFDM Physical Layer
Equalization is often used in wireless communication
[9] A review on QOS for wireless network using
to mitigate the effects of Inter Symbol Interference
WiMAX IEEE 802.16 Standard.
(ISI) and noise. It increases its applications in this
[10] Signal Processing Requirements for
modern era that is highly beneficial according to the
WiMAX (802.16e) Base Station M SHAKEEL
demand.
BAIG
REFERENCES [11] http://www.atdi.com/pdf/WP_mobile_WiM
[1] Performance Enhancement of Wimax system AX_ICStelecom.pdf
equalizer using Adaptive Equalizer by 1Anita [12] Gaussian and Flat Rayleigh Fading Channel
Garhwal, 2 Partha Pratim Bhattacharya VOL. 3, Influences on PAPR Distribution in
NO. 4, April 2012. MIMO- OFDM Systems
[2] Experimental Evaluation of IEEE 802.16 [13] BER Comparison of Rayleigh Fading,
WiMAX Performances at 2.5 GHz Band Rician Fading and AWGN Channel using
Annalisa Durantini RadioLabs, Consorzio Chaotic Communication based MIMO-OFDM
University’s Industrial Laboratory di Radio System
communication Rome. [14] Wireless Communications, By Andreas F.
[3] Comparative Study of Various Handover Molisch
Scenarios in WiMAX Network by Chandan [15] Introduction to Binary Convolutional Codes
Gupta. by Yunghsiang S. Han
[4] WiMAX Security – A Formal Analysis using [16] Convolutional Coding & Viterbi Algorithm,
Scyther tool Kahya Noudjoud, Debbah Adel and byEr Liu -16.11.2004
Nacira Ghoualmi