WiMAX Modeling Techniques and Applications PDF
WiMAX Modeling Techniques and Applications PDF
Borisagar
Rohit M. Thanki
WiMAX
Modeling:
Techniques and
Applications
WiMAX Modeling: Techniques and Applications
Bhavin S. Sedani • Komal R. Borisagar
Rohit M. Thanki
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
v
vi Preface
It has been a fun writing this book. My task has been easier, and the final version of
the book is considerably better because of the help we have received. Acknowledging
that help is itself a pleasure. We would extend many thanks to all persons whose
assistance helped achieve the final version of this book. This book is a Ph.D. research
work and extension work of Dr. Bhavin Sedani, submitted to the Department of
Electronics and Communication Engineering, Shri Jagdishprasad Jhabarmal
Tibrewala University (JJTU), Jhunjhunu, Rajasthan in 2012. The authors are
indebted to numerous colleagues for valuable suggestions during the entire period
of the manuscript preparation. We would also like to thank the publishers at Springer,
in particular Mary James, senior publishing editor/CS Springer, for their helpful
guidance and encouragement during the creation of this book.
vii
Contents
ix
x Contents
Index������������������������������������������������������������������������������������������������������������������ 115
List of Figures
xiii
xiv List of Figures
xvii
About the Authors
xix
xx About the Authors
This part portrays the exceptionally fundamental data of wireless system modeling
which has been utilized for real data applications. A model is a disentangled show
of the genuine framework planned for comprehension. Regardless of whether a
model is a decent model or not relies upon the dimension to which it encourages the
comprehension of the fundamental idea. Since all models are rearrangements of the
real world, there is dependably an exchange off about what dimension of stuff is
incorporated into the model. Simulation model should be reasonable fit for the
understanding of the concepts which designer wants to demonstrate. Model should
have sufficient number of concept blocks as well it should be self explanatory to
justify flow of the process.
5HDO6FHQDULR 6LPXODWLRQEDVHG0RGHOLQJ
5HDO:RUOG(QWLW\ %DVH0RGHO
6WXG\%HKDYLRXULQ
0RGHO
([SHULPHQWDO&RQWH[W
EDVHG7RROV
ZLWKLQ&RQWH[W
6\VWHPV
([SHULPHQWDOZLWKLQ
&RQWH[W 0RGHO0
9LUWXDO([SHULPHQW
9DOLGDWLRQ
([SHULPHQW2EVHUYHG 6LPXODWLRQ
'DWD 5HVXOWV
0RGHOLQJDQG6LPXODWLRQ
3URFHVV
Figure 1.1 demonstrates the proportionality between the real-time system and its
prototype model displaying. Here it can be seen that by building up the model of a
particular system, the virtual reality be accomplished. Fundamentally, the model is
comparable to a virtual framework that is considered as a genuine element. For a
continuous framework, the conduct can be determined by performing constant tests
over it and its result can be seen as its reaction to specific information. Presently for
any rising innovation which has been made sense of still on paper, the ongoing
experimentation is absurd in the underlying phase of structuring. For that issue, the
displaying would be the most appropriate model to investigate its conduct to a great-
est degree. By developing the model of a system and performing simulation of it is
more or less analogous to the experimentation performed in a real time system. In
the event that the model satisfies every single imaginable detail, if the determined
reproduction results surmised towards the test consequences of a framework then
the model is said to have unsurpassed legitimacy and its yield results are viewed as
practically same to that of the constant framework.
A simulation is the utilization of a model in such a means that it operates on time
or space to compress it, thus facilitating one to make out the interactions that would
not otherwise be clear because of their separation in time or space. It typically refers
1.2 WiMAX System and Various Design Technique of It 3
to a computerized translation of the model that is run over time to grasp the implica-
tions of the outlined interactions. Simulations are typically unvarying in their style.
Here model is prepared and simulated to showcase given concept. Simulated model
has been prepared conceptual block wise. Each block performs iterations as per
requirement and pass over data in proper matrix to next block and all together stipu-
late output is generated. Simulation model gives actual idea of the real background
and in that scenario how system may affect output that can be predicted virtually in
the model.
Modeling and simulation are a method for developing grade of understanding of
the interface of the elements of a system as well input output relationship shows
performance of the system as a whole. The dimension of understanding which
might be created by means of this procedure is only from time to time feasible
through some other procedure. It is the utilization of models, including emulators,
prototypes, simulators, and stimulators to develop data as a basis for making super-
visory or technical decisions. The utilization of modeling and simulation inside
engineering is all around perceived. Simulation technology belongs to the toolset of
engineers of all application domains and has been incorporated into the body of data
of engineering management. Modeling and simulation give complete idea regarding
effect of present environment through which signal is going to pass. Moreover, it
also gives detail idea of utilized frame work for all testing without implementing it
in the hardware form [1].
&HOOXODU7HFKQRORJ\(YROXWLRQ
*
* * * * *
:L0$;
&RYHUDJH$UHD
H
G
:LUHOHVV7HFKQRORJ\
(YROXWLRQ J
D
E
7LPH
receiver in a time delayed fashion. These signals endure frequency selective fading
because of the multi-path propagation impacts. At the point when a carrier is uti-
lized to convey high information rates, which introduces enough delay and causes
inter-symbol interferences by spreading symbols. Now in the situation of a single
carrier modulation, this sort of engendering limits the information rates that can be
utilized in Non-Line-Of-Sight (NLOS) situations. The technique of OFDM depends
on the utilization of a large number of carrier’s symbols spread in predefined band-
width, with every carrier being modulated by a proportionately lower information
rate than would be the situation with the single carrier transmission scenario. OFDM
system hypothetically saves the bandwidth about 50% and gives a vigorous trans-
mission strategy for NLOS situations.
There are two key wonders of wireless communication system that makes the issue
challenging and intriguing. First is the phenomenon of fading: the varieties in the
phase as well as time variation of the channel strengths due to the small-scale effect
of multipath fading, as well as larger scale effects such as path loss via distance
attenuation, shadowing, refraction or reflections by obstacles. Second, not at all like
in the wired communication where every transmitter-recipient pair can frequently
be recognized as an isolated point-to-point interface, wireless clients impart over
the air range and there is interference between them in wireless communication.
The interference can be between transmitters speaking with the single receiver,
between sign from a single transmitter to multiple receivers or between various
transmitter-receiver sets [3].
The WiMAX systems structure a significant piece of the wireless rollout of the
future generation systems. They additionally give a substitution to major wired
extensions of broadcast services, broadcast content feeder networks, and news-
gathering networks accessible today by improving them with the new broadband
highlights. Thusly, the WiMAX might be viewed as the last mile solution furnishing
extremely high information rate alongside huge inclusion zone.
These days, different wireless administrators are currently looking for WiMAX
innovation as the filling span between the current cellular framework and the future
interest of high-speed communication with lower bit error rate. In general, WiMAX
is arranged with the customary method for single transmitter and receiver antenna;
however, it cannot actually frame the state of 4G technology. Now is the point at
which the capability of WiMAX to grow an entirely new age of utilizations is at its
prime. As talked about in the starting situation of the WiMAX framework, the most
extreme research work is done in Single Input Single Output WiMAX system physi-
cal layer model and maximum data throughput received accordingly. However, in the
present situation, during the period of real-time voice or image transmission through
1.4 Motivation and Important Points Covered in the Book 7
WiMAX framework, the accessible bit error rate and signal to noise ratio and conse-
quently the capacity of system are serious limitations for the implementation. So, in
the 4G transmission system, link reliability and maximum data throughput are the
need for transmitting the real-time voice as well as the image information at high
speed. Implementation of various antenna diversity techniques along with OFDM
technique is one of the promising solutions for this. So, it is very important to design
WiMAX system available for real-time data transmission (such as image and speech)
to achieve the lower bit error rates, higher signal to noise ratio, and higher system
capacity.
These days, life does not appear to be doable without wireless systems in either
structure. Wireless technologies will not be limited only for the mobile communica-
tion system but it will cover almost all the sectors such as various industries, semi-
conductor vendors, various manufacturing firms and many more. Next generation,
technologies will reach not only for cell phones but also it will reach to almost all
industries which are connected with wireless transmission. Huge demand for wire-
less based services such as to carry video and other rich content services and IoT
(internet of things) based services are the major push towards the race to next gen-
eration technology. To fulfill these major objectives, next generation technology
will provide large broadband speed, ultrareliable connectivity, and ultralow latency
for minimum delay in the communication. Wireless is becoming the leader in com-
munication choices among users as justified from Fig. 1.3 which depicts the growth
of wireless communication on the scale of time in terms of generations. It is not
anymore, a backup solution for nomadic travelers but really a mind-set normally
*HQHUDWLRQDQG$SSOLFDWLRQV
'7+&DESH
,379
,379:HE
0RELOH
:L0$;
79DQG
+'79
7HUUHVWULDO &DEOH79
7RZHU DQG'7+ *
*
*
*
7LPH
used everywhere even when the wired communications are possible. Wireless
access has been accessible to us for a long time now. It’s most obvious indication
that it is in the form of remote LANs and the Wi-Fi hotspots. Usage of Wi-Fi and
wireless LANS are with PCs, PDAs and different gadgets in the various premises in
certain distance.
The clients can peruse the web; make VoIP calls utilizing programming, for
example, Skype, get to mail, or transfer pictures and recordings from computerized
cameras. They can likewise watch the video by gushing from any of the video
sources or downloading video files. The guarantee for broadband portable
administrations keeps on developing. Normally, rapid broadband arrangements
depend on wired-get to advances, for example, computerized endorser line (DSL).
This kind of arrangement is not anything but difficult to send in remote rustic
regions, and besides, it needs support for terminal versatility. Likewise, the continu-
ous advancement in the utilization of remote systems has prompted the prerequisite
for the structure of new present-day correspondence systems with higher limit and
lower mistake rate. The media transmission industry is likewise updating, with a
necessity for a more prominent scope of administrations, for example, video gather-
ings, or applications with sight and sound substance. The expanded reliance on PC
organizing and the internetwork has brought about a bigger interest for associations
with be distributed whenever, prompting an expansion in the prerequisites for more
noteworthy limit and extremely dependable broadband wireless communication
systems.
Presently in the cutting edge for wireless communication, portable terminals will
face mass information administration. Along these lines, the signal procedure in the
portable terminal is expected to economize power, while high spectrum efficiency
and network reliability should be ensured in the meantime. For this issue, new
advancements with high throughput with less requirement on bandwidth have been
planned. In actuality, the prerequisites on bandwidth and spectrum availability are
unending.
Thus, the different firms associated with the area of wireless communication
faces troubles to satisfy the necessity of transfer speed for effective and exact trans-
mission and reception. Additionally, the issues of time-varying nature of channels,
for example, fading and multipath, put the confinement on the performance of high
information rate with good quality of service. The demands for greater capacity,
high reliability as well as accuracy are the prime imperatives for the anticipated ages
of the wireless systems, for example, Wi-Fi, WiMAX, and so on.
The book displayed a presentation examination of the latest wireless system
innovations, for example, WiMAX alongside its physical layer working which
depends on the Orthogonal Frequency Division Multiplexing (OFDM) technique.
In spite of being an almost 50-year-old idea, it is just in the most recent decade that
OFDM turns into the decision of the modem in wireless applications. One of the
biggest advantages of an OFDM is the capacity to change over dispersive broad-
band channels into parallel narrowband sub-channels, in this manner essentially
simplifying equalization at the receiving end. The fundamental OFDM method
1.5 Organization of Book 9
The present section talks about the fundamental comprehension of modeling and
simulation of system alongside a review of WiMAX framework using antenna
diversity techniques and Alamouti coding method. The remaining chapters talk
about the modeling and simulation of WiMAX framework dependent on IEEE
802.16 standard and software implementation of various antenna diversity tech-
niques in it.
10 1 Introduction to WiMAX System
References
1. Petrone, G., & Cammarata, G. (2008). Recent advances in modelling and simulation. Vienna:
I-Tech Education and Publishing.
2. Yarali, A., Mbula, B., & Tumula, A. (2007, March). WiMAX: A key to bridging the digital
divide. In Proceedings 2007 IEEE SoutheastCon (pp. 159–164). IEEE.
3. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge:
Cambridge university press.
Chapter 2
WiMAX Introduction and Modeling
2.1 Introduction
%XVLQHVV 3RUWDEOH$FFHVV
3HUVSHFWLYH 'HYLFH
:L0$;
7RZHU
,(((
%URDGEDQG
+RWVSRW%DFNKDXO
$FFHVV
and bypass the medium access control layer by designing a new one. Unlike these
proprietary solutions, WiMAX’s standardized approach offers economies of scale
to vendors of wireless broadband products, significantly reducing costs and making
the technology more accessible. Many companies that were offering proprietary
solutions, however, have participated in the WiMAX forum and now offer WiMAX-
based solutions. WiMAX can be used in disaster recovery scenes where the wired
networks have broken down. Similarly, WiMAX can be used as backup links for
broken wired links. Additionally, WiMAX will represent a serious competitor to 3G
cellular systems as high-speed mobile data applications will be achieved with the
802.16e specification [2]. The main operators have concentrated their interests and
efforts on the future applications of this new technology. The WiMAX forum cre-
ated in April 2002 is a no-profit organization that groups companies promoting the
broadband access based on the wireless communication standard, point to multi-
point IEEE 802.16 for Metropolitan Area Network. WiMAX forum activities aim to:
• Support the standardization process of IEEE 802.16 for MAN
• Select and promote some of the WiMAX profiles defined in the 802.16
• Certificate the interoperability between WiMAX equipment of different
suppliers
• Make WiMAX a universally accepted technology
Several corporations that were providing proprietary solutions, however, have
participated within the WiMAX forum and currently supply WiMAX based mostly
solutions. WiMAX are often employed in disaster recovery scenes wherever the
wired networks have counteracted. Similarly, WiMAX are often used as backup
links for broken wired links. The WiMAX forum created in Apr 2002, could be a
no-profit organization that teams corporations promoting the broadband access
2.3 WiMAX Standards 15
'DWD5DWH
0ESV
:L0$; &RYHUDJH
± 0ESV
0ESV
&RYHUDJH
:L)L &RYHUDJH &HOOXODU&RYHUDJH
$UHD
work was advancing under the IEEE 802.16 advisory group which developed
benchmarks for wireless MANs. The IEEE 802.16 standard was firstly specified to
address correspondences with direct visibility in the frequency band from 10 to
66 GHz. Because of the way that NLOS transmissions are troublesome when
imparting at high frequencies, the correction 802.16a was determined for working
in a lower frequency band, somewhere in the range of 2 and 11 GHz [4].
The IEEE 802.16d determination is a variety of the fixed standard (IEEE 802.16a)
with main benefit of improving the power utilization of the cell phones. Standards
for fixed WiMAX (IEEE 802.16-2004) were announced in 2004, trailed by mobile
WiMAX (IEEE 802.16e) in 2005. Then again, the IEEE 802.16e standard is a cor-
rection to the 802.16-2004 base determination with the aim of targeting the mobile
market by adding portability. WiMAX standard-based items are intended to work
with IEEE 802.16-2004 as well as with the IEEE 802.16e in particular. While the
2.4 Technical Overview of WiMAX Standards 17
or subscribers’ station (SS) may start the transmission on the channel. To accom-
plish synchronization during the transmission-gathering process, an aggregate of 48
overhead bits condensed in Table 2.2 are included alongside the data frame as a
preamble.
The “CI” bit specifies the presence of a CRC code for the error checking task.
“CID” forms the 16-bit data for determining the connection. “EC” bit justifies
whether the data is encrypted or not. “HCS” and “HT” specify the characteristic of
the header field. “LEN” shows the length of whole MAC PDU. The last field “Type”
describes the subheader.
The IEEE 802.16-2004 standard characterizes three distinctive PHYs that can be
utilized related to the MAC layer to give a reliable end-to-end link. This PHY layer
characterizes the accompanying determinations:
1. Randomizer: Randomization is the primary procedure done in the physical
layer after the data packet is gotten from the MAC layer. Randomizer drives on
a bit by bit premise. Each burst in transmitter and receiver is randomized. The
reason for the scrambled data is to change over long arrangements of 0’s or 1’s
in its irregular grouping to improve the coding performance. The primary seg-
ment of the data randomization is a pseudo random binary sequence generator.
This generator is implemented by utilizing a linear feedback shift register.
2.5 Important Features of WiMAX Standards 19
The important features of WiMAX standards are pointed out as per below:
1. OFDM Based Physical Layer: The WiMAX physical layer depends on OFDM,
which is an exquisite and viable strategy for defeating multipath distortion.
2. Very High Peak Data Rates: WiMAX is equipped for supporting high informa-
tion rates. Truth be told, the peak PHY information rate can be as high as 70 Mbps
when working utilizing a 20 MHz wide spectrum.
20 2 WiMAX Introduction and Modeling
The WiMAX transmitter contains mostly two layers activity. One is the MAC layer
for the different security algorithms and second is the physical layer which is the
inside purpose of this book. Figure 2.6 demonstrates the snapshot of WiMAX trans-
mitter framework which includes the input information unit as a piece of MAC layer
and randomizer, series of coders, QAM as a coder, and OFDM unit as parts of the
physical layer.
This unit essentially goes about as a data generator unit which is exceedingly
required for the virtual transmission of information through the WiMAX system. As
appeared in Fig. 2.7, the random integer block creates the double integer informa-
tion data with the measurement (29 × 1) which would be changed over (232 × 1) bits
by integer to bit converter that would be combined with 46 overhead bits plus two
reserved bits possessed by the MAC layer of the WiMAX system. MAC layer man-
ages the security algorithms. In Fig. 2.7, the header arrangement of MAC informa-
tion is additionally demonstrated where every single field is described by their
distinct function and length. Prior to transmission of data bits, the information
would be appended with 48 bits as a piece of MAC header for the security purposes.
At that point after the processing of bit stream of dimension (280 × 1) as a transmit
2.6 Traditional WiMAX System Modeling 23
>@
+HDGHU7\SH
>@
(QFU\SWLRQ&RQWURO
>@
>@
3D\ORDG7\SH
7BGDWD
>@ >@
5HVHUYHG
>@
&5&,QGLFDWRU
>@ >@
>@
>@
(QFU\SWLRQ.H\6HTXHQFH
>@
5HVHUYHG
>@
>@
/HQJWKRI3DFNHW
>@
>@
&RQHFWLRQ,GHQWLILHU
>@
>@
+HDGHU&KHFN6HTXHQFH
,QWHJHUWR%LW >@
>@ >@ &RQYHUWHU
5DQGRP
,QWHJHU
9HFWRU
&RQFDWHQDWH
7B5DQGP]HU
>@
2.6.1.2 Randomizer
The role of the source in the WiMAX framework is played by the unit known as
randomizer. The data bits must be randomized before the process of real-time trans-
mission. The randomization procedure is utilized to limit the likelihood of transmis-
sions of non-modulated subcarriers. Figures 2.8 and 2.9 demonstrate the PN
sequence instatement alongside the structure of actual randomizer in the WiMAX
framework model, respectively. The procedure of randomization is performed on
each burst of information on the downlink and uplink, and on every allocation of an
information block.
For this situation, rather than performing out a randomization procedure, a binary
source that produces arbitrary groupings, i.e., random sequency of bits, is utilized.
24 2 WiMAX Introduction and Modeling
6HTXHQFHLQLWLDOL]DWLRQ
5DQGRPL]HGGDWD
'DWDLQSXW
316HTXHQFH >@
31BEHJLQ
*HQHUDWRU >@
>@ >@
>@ >@ ;25 3DG
>@ >@
,Q /RJLFDO 2XW
=HUR3DG
2SHUDWRU
31B;RUHG 31B;RUSDG
>@ >@
The quantity of bits that are created is indicated to outline based and is determined
from the packet size required in every circumstance. The bundle size relies upon the
quantity of transmitted OFDM images and the general coding rate of the frame-
work, just as the tweak letters in order. The flood of downlink parcels will be ran-
domized by modulo-2 expansion of the information with the yield of pseudo random
binary sequence generator. Here, the size of the information bit produced is 280 bits
in the PRBS. Towards the start of each burst, the PRBS register is cleared and the
seed estimation of 100101010000000 is stacked. Pseudo random binary sequence
generator creates a profoundly arbitrary code and it is used for making the informa-
tion excessively extremely random so just the similar sequence can decode the code;
some other unauthentic client cannot get a handle on the data after the information
has been converged with this code. The seed worth can be utilized to calculate the
randomization bits, which are consolidated in an XOR activity with the serialized
2.6 Traditional WiMAX System Modeling 25
bit stream of each burst. These (280 × 1) bits are padded with 8 zero bits for the
further procedure of encoding and modulation.
have been additionally prepared to inner coding through the block of convolution
encoder that has been clarified in the following subsection.
After the completion of RS encoding procedure, the data bits are additional encoded
by a binary convolutional encoder, which has a native rate of 5/6 and a constraint
length of 7. Now in this case, the generator polynomials used to derive its two out-
put code bits represented as X and Y are defined in the following expressions:
G1 = 17OCT forX
G 2 = 133OCT forY
A convolutional encoder receives information of length k0 bits and produces
codewords of n0 bits. Generally, it is designed of a shift register of L segments,
where L denotes the constraint length. Figure 2.11 represents the construction of the
inner convolution code.
Here as the native rate of the coder has been chosen as 5/6, so by applying input
(320 × 1), the output of (640 × 1) has been observed. These (640 × 1) bits are given
to the block of “puncture vector” which gives output as (384 × 1). Puncturing is the
process of systematically deleting bits from the output stream of a low rate encoder
in order to reduce the amount of data to be transmitted, thus forming a high-rate
code. The bits are deleted according to a perforation matrix, where a “zero” means
a discarded bit. The process of puncturing is used to create the variable coding rates
needed to provide various error protection levels to the users of the system. The dif-
ferent rates that can be used are rate 1/2, rate 2/3, rate 3/4, and rate 5/6. The punctur-
ing vectors for these rates are given in Table 2.3. This punctured output has been
modulated by quadrature amplitude modulation block.
2.6 Traditional WiMAX System Modeling 27
*HQHUDO >@
>@ >@ %LWWR,QWHJHU >@ >@ >@
%ORFN *HQHUDO X .
,QWHUOHDYHU &RQYHUWHU >@ >@ >@ >@
,Q 4$0 2XW
When the sign has been coded, it enters the modulation block. All wireless com-
munication frameworks utilize a modulation scheme to map coded bits to a struc-
ture that can be successfully transmitted over the wireless channel. In this manner,
the bits are mapped to a subcarrier amplitude and phase, which is represented by a
complex In-phase and Quadrature-phase (IQ) vector. The IQ plot for a modulation
scheme demonstrates the transmitted vector for all information word blends. Gray
coding is a technique for this designation so that adjacent points in the constellation
only differ by a single bit. This coding technique helps to minimize the overall bit
error rate as it reduces the chance of different bit errors producing from a single
symbol error.
Figure 2.12 demonstrates the essential structure of quadrature amplitude modu-
lation (QAM) technique which includes various no. of blocks that can process inte-
ger type of data only. Before changing over the approaching double bits (384 × 1)
into the integer value (192 × 1) with the end goal of quadrature amplitude modula-
tion, the bits are experienced through the way towards interleaving. This block of a
framework can also be projected as a piece of the encoder sequence.
Information interleaving is commonly used to scatter error bursts and, in this
manner, reduce the error focus to be remedied to expand the efficiency of FEC by
spreading burst error presented by the transmission channel over a longer time. At
the point when the block of errors is consistently experienced, around then the
impacts of errors can be limited by the way towards interleaving where the data in
form of the matrix will be manipulated by interchanging lines into segments, i.e.,
rows into column and the other way around. Interleaving is ordinarily executed by
utilizing a two-dimensional array buffer to such an extent that the information enters
the buffer in lines, which indicate the number of interleaving levels, and after that,
it is read out in specific columns. The outcome is that a burst error in the channel
subsequent to interleaving becomes few scarcely spaced single symbol errors,
which are more easily correctable.
28 2 WiMAX Introduction and Modeling
N tcb
N columns = (2.1)
N rows
The second step consists of a block interleaver. It rearranges the elements of its
input according to an index vector. This vector is defined as:
N tcb −1
i iN rows
I= ∑ s s + mod i + N tcb − ,s + 1
N tcb
(2.2)
i =0
In this case, Ntcb describes the total number of coded bits, Ntcb = Ncpc × Ntx is a
data, Ncpc describes the number of coded bits per subcarrier, and s = Ncpc/2.
MATLAB logic behind the implementation for this presented work is as
per below:
D E
WiMAX specifications for the 256-point FFT OFDM PHY layer characterize three
kinds of subcarriers; information, pilot, and null, as appeared in Fig. 2.14. Two
hundred of the complete 256 subcarriers are utilized for information and pilot sub-
carriers, 8 of which are pilots forever spaced all through the OFDM range. The
remaining 192 carriers take up the information subcarriers. The remainders of the
potential carriers are set aside for guard bands and removal of the center frequency
subcarrier. Once the information from the source is mapped into QAM symbols, the
OFDM symbols must be developed. An OFDM image is made by 192 information
subcarriers, 8 pilot subcarriers, 1 zero DC subcarrier, and 55 guard carriers which is
equivalent to 256 that can be adequately envisioned from the inner structure of
OFDM obstruct as appeared in Fig. 2.14.
It tends to be seen from the Simulink preview of OFDM internal structure which
has the (192 × 1) whole numbers from the QAM have been connected to the multi-
port selector block where different lines would be chosen as a type of output vectors
30 2 WiMAX Introduction and Modeling
with the measurements (24 × 1) and (12 × 1). Alongside this vector of measurement
(192 × 1), some no. of guard subcarriers are embedded to the following block of
network concatenator. Figure 2.15 contains the structure of OFDM symbols where
(28 × 1) lower frequency guard subcarriers and (27 × 1) higher frequency subcarri-
ers are included with information bits. Eventually the structure of OFDM symbol is
the mix of information carriers, guard bands, and DC just as pilot carriers.
So as to develop an OFDM symbol, a procedure to revise these carriers is
required. With this reason, the assembler block is embedded in the simulator. It
completes this task in two stages by first embedding the pilot tones and the zero DC
subcarrier between information with a procedure of vertical concatenation, and
after that affixing the training symbols towards the start of each burst in a horizontal
manner, as appeared in Fig. 2.16.
The procedure referenced as the arrangement of OFDM symbol has been exe-
cuted in this given work. Here the block matrix is with 21 contributions with dimen-
sion of (256 × 1) that incorporates 192 information subcarriers, 8 pilot carrier, 1 dc
subcarrier and remaining 55 are zero subcarriers annexed towards the end of the
2.6 Traditional WiMAX System Modeling 31
3LORW
&DUULRUV
=HUR'& I
7UDLQLQJVVHTXHQFHV 2)'06\PEROV
'DWD
'&
*XDUGV,QWHUYDO
cited structure, and guard bands are also inserted to enable the natural decay of the
signal. The entire structure is demonstrated in Fig. 2.17.
Here the concatenation is picked to be 1 in light of the fact that the input arrays
are getting concatenated vertically. For horizontal concatenation, it needs to pick 2.
The (256 × 1) subcarriers are given to the IFFT block which is utilized to deliver a
time domain signal, as the symbols acquired after modulation can be viewed as the
amplitudes of a specific scope of sinusoids. This implies that every one of the dis-
crete samples before applying the IFFT algorithm relates to an individual subcarrier.
Besides ensuring the orthogonality of the OFDM subcarriers, the IFFT shows to a
rapid path for modulating these subcarriers in parallel, and along these lines, the
utilization of multiple modulators and demodulators which spend a lot of time and
resources to perform this operation is avoided. Before doing the IFFT operation in
the test system, i.e., simulator, the subcarriers are rearranged. For this introduced
work, the 256-point IFFT has been picked by the gotten information subcarriers.
Figure 2.18 demonstrates the subcarrier structure that enters the IFFT block after
performing the above-mentioned rearrangement. As found in Fig. 2.18, zero subcar-
riers are kept in the focal point of the structure.
The output vector of the IFFT block has been connected to the “U-Y selector”
block which chooses the approaching subcarrier sequence and includes some addi-
tional stream that is known as a cyclic prefix. The vigor of any OFDM transmission
32 2 WiMAX Introduction and Modeling
CP
Tg Tb
Tsym
Tsym = Tb + Tg (2.3)
In above equation, Tsym is the OFDM symbol time, where Tb is the useful symbol
time and Tg shows the CP time.
The parameter G characterizes the proportion of the CP length to the helpful
symbol time. When wiping out ISI, it must be considered that the CP must be longer
than the dispersion of the channel. In addition, it ought to be as small as conceivable
since it costs vitality to the transmitter. Hence, G is generally under 1/4 which can
be justified from the index vector choice of the model parameter. As it very well
may be seen from the snapshot preview of the “U-Y selector,” the input data dimen-
sion is (256 × 1) and the output data dimension is (320 × 1) which shows the expan-
sion of 64 bits as a cyclic prefix. This can be set in the “index vector” parameter of
the “U-Y selector” block. Consequently, it very well may be said that with respect
to an effective data stream of (256 × 1), the cyclic prefix amount is 64, for example,
¼ of the effective data. The OFDM modulated (320 × 1) subcarriers have been
essentially transmitted through the communication medium signified as “WiMAX
Channel” in this model, which has been examined in the following subsection.
2.6 Traditional WiMAX System Modeling 33
The most significant unit of any communication framework is the link layer that
associates transmitter and receiver unit, for example, wireless communication chan-
nel. In wireless communication framework channel assumes the most basic role that
is the reason why modeling of channel and decision of appropriate channel is the
exceedingly attractive assignment. For the situation where transmitter and receiver
both are effective however the natural condition is not ideal then the productive
capacity cannot be performed by the framework. Along these lines, to build up the
model for such a communication framework, the prime objective ought to be
towards determination and modeling of the wireless communication channel.
Here, the fundamental modeling of the WiMAX framework has been finished by
considering the ideal AWGN channel which is appeared in Fig. 2.20 by expecting
that the signal to noise ratio stays constant all through the long channel. This is the
genuine piece of the WiMAX modeling whereby setting the various estimations of
required channel SNR, the impact of BER can be determined. The significant devel-
opment of this examination work is the varieties in the determination of channel
types just as modeling of multipath structure inside the channel in a manner to
improve the system capacity as well as the reduction in bit error rate. Figure 2.21
demonstrates is the snapshot of the function block showing the channel parameters?
The output of the WiMAX system channel is the similar no. of subcarriers, i.e.,
(320 × 1), which are received by the multiple blocks of the WiMAX system receiver.
The subsequent subsection details the WiMAX receiver blocks.
Fig. 2.20 Simulation
model for WiMAX channel ,Q
>@
$:*1
>@
$:*1B'DWD
>@
>@
2XW
34 2 WiMAX Introduction and Modeling
The WiMAX receiver essentially carries out the reverse operation as the transmitter
as well as channel estimation necessary to reveal the unknown channel coefficients.
This section usually carries out the reverse task to reconstruct the transmitted infor-
mation bits. Figure 2.22 shows the snapshot of the WiMAX receiver. Further, the
subsequent subsection indicates the block by block explanation.
The modulated and coded data got from the WiMAX channel are received through
the reception antenna with or without diversity over which the OFDM demodula-
tion would be performed. The primary block of OFDM demodulator is
FFT. Figure 2.23 demonstrates the fundamental structure of the OFDM demodulator.
The precise process which is done in OFDM demodulator have been performed
in this segment example
2.6 Traditional WiMAX System Modeling 35
As these are in the form of conjugate numbers, they ought to be connected to the
math function represented as “u bar” block. From that, the 192 subcarriers are con-
nected to the procedure of demapping where through denormalization process the
192 integer complex quantities of a structure
0.7071 + 0.7071i
0.7071 − 0.7071i
−0.7071 + 0.7071i
−0.7071 − 0.7071i
get changed into a matrix of 192 complexes number with the algebraic summation
of real component and imaginary component in a form of
These 192 double integers as a blend of real and imaginary segments are com-
bined as (192 × 1) whole numbers by the MATLAB directions which are finally
changed over into 384 bits (for 4-QAM) by the block of integer to bit converter.
These (384 × 1) bits are additionally given to the last procedure of WiMAX receiver
system, for example, sequence of decoding by methods for convolution decoder and
RS decoder.
The Viterbi decoder decodes the convolutional coded information and diminishes
the computational burden by exploiting the exceptional structure of the trellis code.
Another favorable position is its multifaceted nature, which is not a component of
the quantity of symbols that make the codeword sequence. Figure 2.25 shows the
essential design of the Viterbi decoder.
The Viterbi calculation performs approximate most extreme probability decod-
ing. It involves calculating a measure of likeness or separation between the received
signal at a time and all the trellis ways entering each state in the meantime. The
algorithm works by expelling those trellis ways from the thought that could not pos-
sibly be candidates for the maximum likelihood choice. At the point when two ways
2.6 Traditional WiMAX System Modeling 37
enter in same state, the one that has the best metric is picked as the “surviving” way.
The determination of the distinctive “surviving” ways is performed for every one of
the states. The decoder proceeds thusly to progress advance deeper into the trellis
making decisions by eliminating the least likely paths. The early dismissal of
unlikely path is the way that decreases the complexity. The goal of selecting the
optimum path can be communicated equivalently as choosing the codeword with
the maximum likelihood metric, or as choosing the codeword with the base separa-
tion metric.
Here as appeared in the depiction of Viterbi decoder, the mix of numerous blocks
plays out the precise invert function to that of the convolution encoder. At the trans-
mitter side, the “block interleaver” was the part of QAM modulator while here at the
recipient side, in place of QAM demodulator, the invert of interleaving, for exam-
ple, block de-interleaving has been performed by sub-block of Viterbi decoder
which reorders the grouping of (384 × 1) bits. The de-interleaver revamps the bits
from each burst in the right path by requesting them sequentially as before the inter-
leaving procedure. The yield of (384 × 1) bits is given to the block of “insert zero.”
The block named “Insert Zeros” manages the task of reversing the procedure per-
formed by the “Puncture” block. As recently clarified in the transmitter section, the
puncturing procedure comprises of erasing bits from a stream. The receiver does not
know the estimation of the erased bits but rather it can know their situation from the
puncturing vectors. Along these lines, zeros are utilized to fill the relating hollows
of the stream so as to get a similar code rate as before playing out the puncturing
process. It again changes over approaching (384 × 1) bits into (640 × 1) bits which
are connected to Viterbi decoder block for performing convolution decoding and
lastly creates bit vector of size (320 × 1). Now the convolutionally decoded data is
given to the external decoding by RS decoder logic and that logic has been incorpo-
rated into the accompanying subsection.
The final part of the WiMAX system decoding process is the Reed–Solomon decod-
ing shown in following Fig. 2.26. It carries out the required operations to decode the
signal, and get, in the end, the original information transmitted by the transmit-
ter source.
38 2 WiMAX Introduction and Modeling
2.6.3.5 De-randomizer
This block of the receiver as shown in following Fig. 2.27 restores the original trans-
mitted information bits back and these information bits are applied as one of the
inputs of bit error rate calculator for identifing the performance of the overall
WiMAX framework.
Now (288 × 1) bits have been passed via “U-Y selector” block to take away the
additional zeros that have been padded at the WiMAX transmitter side. So the out-
put would be (280 × 1) bits that have been XORed with the stream produced by PN
sequence generator (same as transmitter) block to get back the original information.
Figure 2.28 shows the basic logic of the output block. The (280 × 1) bits have been
given to the bit to integer block to produce (35 × 1) integers which have been termi-
nated right now in this traditional model of WiMAX framework. But in real-time
2.6 Traditional WiMAX System Modeling 39
>@ >@
8 < >@
>@ ;25
,Q >@ >@
2XW
6HOHFWRU
;25B5;
>@
316HTXHQFH >@
*HQHUDWRU
893QB6HTXHQFH
>@
31B6HTXHQFHB5;
>@
Fig. 2.28 Simulation
>@ %LWWR,QWHJHU >@
model for output data &RQYHUWHU
>@
5[B'DWD
>@
This is the block of the WiMAX model demonstrated in Fig. 2.29 whose yield deter-
mines the computations of BER values. The justification behind the realization of
this block is to compare the stream of bits got from the last block of the receiver
with the input bit stream and get the proportion of erroneous bits to the total no. of
transmitted bits. This block takes two input information sources, one is the contribu-
tion of randomizer with (280 × 1) information carriers and the other is the output of
de-randomizer with the equivalent no. of data, for example, (280 × 1). The diagrams
of BER v/s referenced SNR will legitimize the framework execution regarding
capacity and precision.
By considering the above examined principal parts of traditional WiMAX frame-
work modeling, the following section of the chapter manages one of the advance-
ments of the introduced work, for example, modeling of WiMAX transceiver
40 2 WiMAX Introduction and Modeling
%(5
'$7$B7; 7[
(UURU5DWH %LW/RVV
&DOFXODWLRQ
'$7$B5; 5[ 7RWDO%LWV
noise ratio. Figure 2.30 demonstrates the snapshot of the traditional WiMAX model
with random data after the MATLAB simulation. Each and every block of the whole
framework has been specified with their input-output data status at individual ports.
In this case, the simulation has been performed and presented by considering
the two different values of the wireless channel with SNR = 20 dB and
SNR = 27 dB. Again, the rest of the other parameters have been set constant as
shown in following Table 2.4.
By setting every one of these parameters, the impact of channel SNR over the
framework performance is shown as the simulation results about terms of the mag-
nitude spectrum and bit error rate with reference to total transmitted bits for the
output from the transmitter. Again, by the assessment of WiMAX framework in an
above referenced way, one can pass judgment on the decision of optimized block
parameters for the best WiMAX framework where it is required to set the ideal
estimations of square parameters for ongoing investigation by transmitting actual
image rather than arbitrary information.
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.31 Input QAM symbols of WiMAX system for channel with SNR = 20 dB
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.32 Output QAM symbols of WiMAX system for channel with SNR = 20 dB
Fig. 2.33 BER calculation of WiMAX system for channel with SNR = 20 dB
2.7 Testing of Traditional WiMAX System Model 43
The near investigation among information and out bits of the WiMAX model can
be numerically demonstrated by the utility of BER calculator appeared in Fig. 2.33.
As can be seen from the snapshot of the BER calculator appeared in Fig. 2.33, it
very well may be seen that under 20 dB channel SNR, 250,003 bits are getting
ruined while transmitting 526,680 bits. Along these lines, the BER of the WiMAX
system would come around 0.47 which is nearly exceptionally huge worth and sys-
tem performance can be viewed as very poor.
The past subsection demonstrates that exhibition of WiMAX framework for the
channel with SNR = 20 dB is exceptionally poor. Therefore, the performance of the
WiMAX framework is expanded by utilizing a channel with higher channel SNR
value. In this area, testing of a model for the channel with SNR = 27 dB is shown
and talked about. The graphs for input information and output information appeared
in Figs. 2.34, 2.35, and 2.36 have been determined by setting channel
SNR = 27 dB. When contrasted with input QAM symbols, the output QAM sym-
bols are scattered in an amount which is truly not as much as that of if there should
arise an occurrence of channel SNR equivalent to 20 dB. Additionally, the estima-
tions of BER calculator likewise legitimizes the improvement in BER as out of
526,680 bits, just 2468 bits are getting lost that outcomes in the BER of around
0.0046 as it were.
In this case, the improvement in BER is due to the fact that at very low SNR the
symbols are not easy to recognize. Finally, one can conclude that the WiMAX
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.34 Input QAM symbols of WiMAX system for channel with SNR = 27 dB
44 2 WiMAX Introduction and Modeling
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.35 Output QAM symbols of WiMAX system for channel with SNR = 27 dB
Fig. 2.36 BER calculation of WiMAX system for channel with SNR = 27 dB
system throughput is directly proportional to the SNR of the efficient wireless chan-
nel provided that the remaining parameters of the WiMAX transmitter and WiMAX
receiver block must remain at the same value.
2.8 M
odeling of Traditional WiMAX System
for Transmission of Real-Time Image
The key difference among the traditional model of WiMAX system discussed in
the earlier section and this model is the presence of two blocks, i.e., “image input”
block and “image output” block, through which image information samples from
MATLAB workspace are obtained at consecutive sample times and the matrix is
shown in form of the image, respectively. Here as an image input 256 × 256 leaf
image shown in following Fig. 2.38 has been taken whose 29 samples are succes-
sively taken at an interval of 1/29 so as to make this model compatible with the
traditional model of WiMAX which passes data in matrix form only.
Figure 2.39 shows the scattered diagram of input QAM symbols that looks very
decent, i.e., steady state position in their placement before transmission. After trans-
mission through the wireless channel, these data symbols fluctuate in their position
due to the channel disturbances which will be pointed by a disturbance in the out-
put image.
As examined already in the traditional model, whatever function the random
integer block was performing, here it is performed by the input information sub-
block of the image input block as appeared in the snapshot of Fig. 2.40. Through the
MATLAB command: Image input_data = uint8(reshape(test_img, 256∗256,1))
image of the measurement (256 × 256) would be fetched and sampled in terms of
29 sample consecutively which are then changed over into (232 × 1) bits by means
of integer to bit converter. At that point after these (232 × 1) bits are joined with
error controlling, checking and synchronization bits which will as a whole form the
information of (280 × 1) bits that are additionally prepared through indistinguishable
46 2 WiMAX Introduction and Modeling
=D[LV
<D[LV
[D[LV
Fig. 2.38 Input image of WiMAX system model for real-time image transmission
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.40 Input image data with MAC layer standards for WiMAX system
,Q
>×1@ >@ 'HOD\ >@ >@ 0DWUL[
X7 X7
>×1@ /LQH 9LHZHU
has been displayed by “matrix viewer” sub-block. To explain the MATLAB logic at
the back of “image input” block, the methodology has been prepared as follows.
Program Flow
Step 1: Read the input image from a specific file.
Step 2: Resizing the image in 256 × 256 size matrix and send to the image in the viewer.
Step 3: Rearrange the 256 × 256 size matrix into 65,536 × 1 single array matrix for serial pixel
transmission.
Step 4: At receiver, convert 65,536 × 1 matrix into 256 × 256 size matrix and send to image out
the viewer.
%LWWR,QWHJHU %XIIHU
&RQYHUWHU
Fig. 2.42 Output data for WiMAX system for real-time image transmission
The randomizer joins the approaching (280 × 1) bits with the arbitrary PN
sequence bits by methods for XORing and produces output of (288 × 1) matrix that
has been gone through the cascading of RS encoder and convolution encoder as
examined as of now in traditional WiMAX model whose last output is bit sequence
of (384 × 1) bits. Further, the encoded information have been modulated by QAM
block and connected to the procedure of OFDM modulation that at long last give
output in terms of (320 × 1) integer subcarriers which are the complex no. formed
by real and imaginary components that have experienced through the way towards
interleaving, complex conjugation, the inclusion of a cyclic prefix, and so forth. The
information of (320 × 1) would be gone through the WiMAX channel. Channel
reaction on the data results in degradation of information by means errors relying
upon SNR of the channel.
Usually reverse operation of transmitter is done by the receiver and signal is
reconstructed again. This model is differing mainly by one block at output side as
compares to traditional model, i.e., “image output” block. The rest of the blocks,
i.e., OFDM demodulation, QAM demodulation, convolution decoding, RS decod-
ing, and de-randomization, have processed over the data in the same fashion to that
discussed in the traditional WiMAX model. After the above all processes, the “out-
put image” block, the last block of the WiMAX receiver acquires (280 × 1) bits
which have been further processed through the multiple blocks as explained in the
snapshot Fig. 2.42.
The received incoming (280 × 1) bits are further under medication and process
through “U-Y selector” block which extract the extra 48 bits that have been added
at the transmitter side for security, synchronization, and error checking purpose.
The out (232 × 1) bits are converted into (29 × 1) integer stream which were not
terminated here as with the case of traditional WiMAX modeling with random
input-output data but they have been given to buffer which gives output a matrix of
(256 × 1) that has been further processed through the block of “output image viewer”
to generate the original image back for the comparative analysis purpose. The inter-
nal logic of “output image viewer” block has been explained in Fig. 2.43.
Here through two-stage matrix transposition process and delay output image
with the dimension of (256 × 256) has been constructed. This has been explained in
terms of program flow as shown below.
Program Flow
Step 1: At receiver, convert 65,536 × 1 matrix into 256 × 256 size matrix.
Step 2: Resizing the image in 256 × 256 size matrix and send to image out the viewer.
2.8 Modeling of Traditional WiMAX System for Transmission of Real-Time Image 49
,Q
>@ >@ >@
>@ 'HOD\ 0DWUL[
X7 X7
>@ /LQH 9LHZHU
Fig. 2.44 Simulation model for traditional WiMAX system for real-time image transmission
According to the logic developed by program flow WiMAX model with the
transmission of the real-time image signal has been simulated. The output image
can be obtained which will be compared with the original input image signal to
reduce the performance of the WiMAX system.
One of the main uniqueness of this presented work is the real-time transmission
of the image rather than random data through the traditional model of
WiMAX. Obtained result for the real-time data is satisfactory. Figure 2.44 shows
the snapshot of the updated WiMAX model with real-time image transmission after
the MATLAB simulation. Each and every block of the whole system has been speci-
fied with their input-output data status at individual ports. To evaluate the system
performance in terms of BER, all the block parameters have been set at the optimum
values as experimented and analyzed in the previous section except channel
SNR. Here the simulation of traditional WiMAX system for real time image trans-
mission has been performed by taking channel with SNR = 28 dB in model.
The snapshots of Figs. 2.45, 2.46, and 2.47 indicate scattering diagram of output
OFDM symbols, output image, and BER calculator, respectively, of the WiMAX
model for real-time image transmission. Here the 256 × 256 input image gets
50 2 WiMAX Introduction and Modeling
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 2.45 Output QAM symbols of WiMAX system model for real-time image transmission
=D[LV
<D[LV
;D[LV
Fig. 2.46 Output image of WiMAX system model for real-time image transmission
Fig. 2.47 BER calculation of WiMAX system model for real-time image transmission
References 51
converted into a data matrix of (280 × 1) and then after encountering various pro-
cesses of modulation and encoding when transmitted through the WiMAX channel
having SNR equal to 25 dB, the output image gets disturbances in terms of noise at
the receiver side. The above phenomenon can be very well observed by comparing
input and output images as well as their constellation diagrams. The fact is also sup-
ported by a reading of BER calculator where by transmitting 635,880 bits, 1304 bits
are lost during transmission and because of that BER is 0.002.
It can be clearly observed by comparing the output image with the original image
that by increasing channel SNR, thereby the reading of BER calculator has been
improved. The total bit loss is of just 1304 bits with respect to same no. of 635,880
transmitted bits as compared to case 1.
Here again, the similar conclusion can be derived that wireless system perfor-
mance is highly SNR dependent of wireless channel, i.e., what amount of distur-
bance applied by the channel on data which is flowing through the channel. To
improve the performance of the system, higher value of SNR should be achieved by
its not feasible solution every time because it can be achieved by increasing signal
strength of transmitted signal. To overcome this limitation, various antenna diver-
sity algorithms should be used in the WiMAX system with data and image at the
lower value of channel SNR which has been analyzed, simulated, and proved in the
next chapters.
References
1. Yarali, A., & Rahman, S. (2008, May). WiMAX Broadband Wireless Access Technology:
Services, architecture and deployment models. In 2008 Canadian Conference on Electrical
and Computer Engineering (pp. 000077–000082). IEEE.
2. Saeed, R. A., Mabrouk, A. A., Mukherjee, A., Falcone, F., & Wong, K. D. (2010). WiMAX,
LTE, and WiFi interworking. Journal of Computer Networks and Communications, 2010, 1–2.
3. Liangshan, M., & Dongyan, J. (2005). The competition and cooperation of WiMAX, WLAN
and 3G. Mobile Technology, Applications & Systems. In The 2nd International Conference.
4. Kumar, A. (2014). Mobile broadcasting with WiMAX: Principles, technology, and applica-
tions. London: CRC Press.
Chapter 3
Various Techniques for WiMAX System
Modeling
3.1 Introduction
The main purpose of this book is to produce the WiMAX system along with the
implementation of various antenna diversity techniques coupled with Alamouti
scheme in it to improve the capacity of the system without changing the bandwidth
requirement of system. Nowadays no hardware is produced without positive con-
cern of strong simulation tool on the high-speed computer.
The purpose of this chapter is to explain some steps in bridging the gaps between
system and hardware level simulation supported MATLAB. The goal is to be able
to directly see the impact of component utility and design along with its internal
structure and its effect on system level performance measures. The motivation to
describe this chapter is to design wireless communication system with the various
implementation of antenna diversity systems, and also the performance of that on
the given system in terms of the bit error rate (BER) or another Quality-of-Service
(QoS) measure.
This chapter is principally divided into three major parts. In the initial part intro-
duction of various diversity techniques. The second half is restricted to one of the
foremost promising and widely used space diversity systems with its advantages
and design to existing communication system. Last phase describes various coding
and flow of implementation of various diversity techniques, i.e., single input multi-
ple output (SIMO), multiple input single output (MISO), and multiple input multi-
ple output (MIMO) along with its critical comparative analysis by taking many
parameters under consideration has been administered so final outcome in the form
of BER and system capability.
In wireless communication, radio waves traveling along different paths arrive at the
receiver at different times with random phases and combine constructively or
destructively as shown in Fig. 3.1.
In the wireless link, different signal will travel with different type of channels.
Some channel forms direct line of sight path, and other path components are due to
various obstacles in the channel. Because of that obstacles, signal needs to travel
through the various paths towards the receiver. Because of various paths in the wire-
less channel, delay is different. Different delay in the component generates phase
delay among them. Vector summation would be carried out to find out resultant
signal at the receiver. Figure 3.2 shows vector combination of that.
7UDQVPLW
$UUD\
5HIOHFWRUV
5HFHLYH
6FDWWHUHUV $UUD\
Fig. 3.2 Multipath
components of wave
propagation
3.2 Diversity Techniques 55
When two or more multipath components are arrived at the receiver with the
same access delay at the same time, the received signal is the vectorial addition of
two multipath signals. Let’s assume that two signals S1 and S2 arrive at the same
time at the receiver and R is the combined signal at the receiver.
The actual outcome is a frequent variation in the amplitude of the received signal
in a very small period of time or distance traveled known as fading. At the same
time, the large-scale average path loss leftovers constant. Diversity takes advantage
of multipath propagation to strengthen the signal. Conventionally, the design of
wireless systems has been focused on increasing the reliability of the air interface;
in this context, fading and interference are viewed as nuisances that are to be coun-
tered. Recent focus has shifted more towards increasing the spectral efficiency;
associated with this shift is a new point of view that fading can be viewed as an
opportunity to be exploited.
While dealing with the multipath environment, the individual signal path arriving
at the receiver faces independent or highly uncorrelated fading. This means that when
a particular signal path is in a fade there may be another signal path not in any fade.
This phenomenon of independent fading in various paths can be exploited as an
advantage to achieve improved performance in wireless communication provided that
out of multiple paths, at least one path can be obtained with minimum distortion and
maximum signal strength. This phenomenon leads towards the concept of diversity
which can dramatically improve the performance over fading channels.
In practice, diversity systems can be applied in space, frequency, or time domains.
Diversity over time can be obtained via coding and interleaving: information is
coded and the coded symbols are dispersed over time in different coherence periods,
so that different parts of the codewords experience independent fades. Analogously,
one can also exploit diversity over frequency if the channel is frequency selective.
In a channel with multiple transmit or receive antennas spaced sufficiently far
enough, diversity can be obtained over space as well. In a cellular network, macro-
diversity can be exploited by the fact that the signal from a mobile can be received
at two base stations. Since diversity is such an important resource, a wireless system
typically uses several types of diversity. The following subsections illustrate the
various types of diversity systems.
Time diversity means transmitting identical messages in different time slots as shown
in Fig. 3.3. This yields two unrelated signals at the receiving finish. A similar informa-
tion is repeatedly transmitted at totally different time slots with the hope that they are
going to suffer fading effect in individual channel at different level and therefore the
receiver will club them properly to generate the strengthened signal at last.
56 3 Various Techniques for WiMAX System Modeling
OKO
*HQHUDO6WUXFWXUH
,QWHUOHDYLQJ6WUXFWXUH
Time division multiple access schemes are relied on the principal of time diver-
sity which is widely used in GSM structure. Frequency division duplex system is
used in GSM and uses two 25 MHz bands. Forward as well as reversed channel uses
25 MHz for assigning channels. The GSM bands are at 890–915 MHz (uplink) and
at 935–960 MHz (downlink). Each traffic channel uses 200 KHz for data transmis-
sion and each channel is divided into 8 time slots in time division fashion. The data
of each user are sent over time slots of length 577 μs and the time slots of the 8 users
together form a frame of length 4.615 ms [1]. GSM generates 20 ms frame of
encoded data. Other data is processed by convolution encoder with ½ rate and
finally 456 bits are prepared at different level of encoding. To get benefit of time
diversity, coded bits are rearranged and interleaved across eight time slots given to
that user in specified manner. Graphically process is explained in Fig. 3.3.
For simplicity, let us consider a flat fading channel has been taken. Transmitted
data is codeword x = [x1…xL]t of length L symbols and the received signal is given by:
yl = hl ⋅ xl + wl (3.2)
where l = 1, 2, …, L.
Ideal interleaving is considered so that consecutive symbols x′ are transmitted
sufficiently far apart in time, and it can be assumed that the hl’s are not dependent.
L parameter can be identified as numbers of diversity branches. w0, …,wl are ran-
dom variables and are taken as the additive noises.
Main motive of block interleaving is to reduce burst errors occurred while trans-
mission of signal in noisy channel. In the WiMAX system also, this type of block
interleaving scheme is used to improve signal quality after reception. In the p revious
chapter, it has been demonstrated that physical layer of WiMAX uses this kind of
interleaving and time diversity advantages can be taken perfectly.
3.2 Diversity Techniques 57
To analyze the concept of frequency diversity, consider first the one-shot communi-
cation situation when one symbol x[0] is sent at time = 0, and no symbols are trans-
mitted after that. The receiver observes
y [l ] = hl [l ] ⋅ x [ 0 ] + w [l ] (3.3)
where l = 0, 1, 3, …, L.
Channel has been assumed with response of finite number of taps L, then the
delayed replicas of the signal are providing L branches of diversity in detecting x[0]
since the tap gains hl[l] are assumed to be independent. This diversity is known as
frequency diversity as this diversity is achieved by the ability of resolving the multi-
paths at the receiver due to the wideband nature of the channel. A straightforward
communication scheme can be established on the above concept by sending an
information symbol every L symbol time. The highest diversity gain of L can be
obtained at a cost of transmitting one symbol at every delay spread but this scheme
results in wasteful degree of freedom. This scheme is analogous to the repetition of
codes used for both time and spatial diversity purpose in which one information
symbol is repeated L times. In this arrangement if symbols are transmitted more
frequently then intersymbol interference occurs. Now the issue is how to deal with
intersymbol interchange while at the same time exploiting the inherent frequency
diversity in the channel. Mainly three common approaches to deal with mentioned
problem are per as below:
• Single Carrier Systems with Equalization: ISI can be controlled at some level
by using linear and nonlinear processing at the receiver. Optimal ML detection
of the transmitted symbols can be implemented using the Viterbi algorithm.
Viterbi algorithm only can be used when a smaller number of taps are there in the
system else it increases exponentially. Alternatively, linear equalizers attempt to
detect the current symbol while linearly suppressing the interference from the
other symbols.
• Direct Sequence Spread Spectrum: This method represents that information
symbols are modulated by a pseudo-noise sequence and transmitted over a band-
width W much larger than the data rate. As the symbol rate is very low, ISI can
be reduced and receiver structure can be simpler. Although this leads to an inef-
ficient utilization of the total degrees of freedom in the system from the perspec-
tive of one user, this scheme allows multiple users to share the total degrees of
freedom, with users appearing as pseudo noise to each other.
• Multi-carrier Systems: In this method, transmit pre-coding is prepared to con-
vert the ISI channel into a set of non-interfering, orthogonal subcarriers, each
experiencing narrowband flat fading. Diversity can be obtained by coding across
the symbols in different sub-carriers. This method is also called Discrete Multi-
Tone (DMT) or Orthogonal Frequency Division Multiplexing (OFDM).
58 3 Various Techniques for WiMAX System Modeling
D E F
Fig. 3.4 Antenna diversity systems (a) SIMO, (b) MISO, (c) MIMO
To implement time diversity, interleaving and coding of data set over several coher-
ence time periods are necessary. When there is a specified delay constraint and/or
the coherence time is large, this may not be possible. In this case, other forms of
diversity, i.e., antenna diversity or space diversity, have to be obtained. Figure 3.4a–c
show various types of antenna diversity systems. Two kinds of space diversity help
to improve system and its capacity named Tx-Diversity and Rx-Diversity. Tx-Diversity
uses multiple transmit antennas which are implemented for the signal transmission
which in turn results in Multiple Input Single Output (MISO) diversity (n × 1 sys-
tem) while Rx-Diversity uses multiple receive antennas which are implemented for
the signal reception which in turn results in Single Input Multiple Output (SIMO)
(1 × n system). Channels with multiple transmit and multiple receive antennas so-
called Multiple Input Multiple Output (MIMO) (n × n) channels provide even more
potential.
Antenna diversity, or spatial diversity, can be obtained by placing multiple anten-
nas at the transmitter and/or the receiver. The antenna separation is decided by local
scattering environment along with carrier frequency values. In most of the cases,
mobiles are nearer to ground level with many scatters around, so that the channel
de-correlates over shorter spatial distances, and typical antenna separation of the
half to one carrier wavelength is proper. Larger antenna separation of several to 10’s
of wavelengths is required for the base stations on high tower. Following section
describes various features and parameters of antenna diversity system with critical
performance analysis point of view in context with real environment.
The idea behind antenna diversity is that if the antennas are spaced sufficiently way
apart, they fade severally. By invariably choosing the antenna with the most effec-
tive channel, or (better) combining the two with applicable weights, the chance of
3.3 Various Antenna Diversity Systems 59
poor reception (signal outage) is dramatically reduced. Diversity will increase the
average amplitude, which successively improves capability. Though the capability
increase is considerably less with diversity than if spatial multiplexing was used, it
is, in general, additional strong and may be used at lower signal to noise ratios. A
very efficient approach for achieving space diversity at the transmitter, while not
knowing response of the channel at the transmitter, is termed space-time coding,
i.e., Alamouti coding. Before approaching the various antenna diversity systems, it
is quite necessary to grasp the normal antenna systems together with its
limitations.
Figure 3.5 shows the conventional antenna system with single transmitter and single
receiver antenna known as SISO system. The advanced antenna arrangement is
based on the principle of antenna diversity. In the starting stages, the different mod-
ulation schemes like coherent BPS, coherent QPSK, coherent 4-PAM, and coherent
16 QAM were there in which error probability reduces very slowly and is propor-
tional to 1/SNR. All mentioned techniques were not used the principle of antenna
diversity. They all were single antenna system at both end of communication sys-
tem. However, diversity can be taken in such situation by implementing the OFDM
technique in the form of frequency diversity while transmitting symbols. In these
techniques, poor performance may be there as strength of the signal is decided by
one path only.
Basically, it is experimented that bit error rate (BER) performance of such a
system is decided only on channel SNRs. In this situation, there is a significant
probability that taken path may be affected with highest amount of fading and inter-
ference. Such systems can be designed better by introducing a greater number of
antennas in the transmitting side and/or receiver side. As Shannon theorem says, in
any given channel corrupted by an additive white Gaussian noise at a level of SNR
the capacity can be calculated as follows.
7[ 5[
where C is the Shannon limits on channel capacity, SNR is signal to noise ratio, and
B is the bandwidth of the channel.
It can be concluded that theoretically capacity increases as the bandwidth or
SNR is increased which is not a feasible case beyond certain limits. Therefore, to
increase the capacity, a diversity mechanism is implemented on the transmitter and
receiver side. The following sections illustrate the same mechanism [1].
The basic step towards diversity is to implement single input multiple output
(SIMO) system configuration, which implies one transmit and two receive anten-
nas. This is shown in Fig. 3.6. For example, a base station with one transmit and two
receive antennas would be a SIMO system (1 × N system).
In a flat fading channel with 1 transmit antenna and 2 (N) receive antennas, the
channel model is as follows:
yl [ m ] = hl [ m ] ⋅ x [ m ] + wl [ m ] (3.5)
where l = 1, 2, …, N, and the noise wl[m] is independent across the antennas.
System would like to detect x[1] based on y1[1], … yN[1]. If the antennas are
spaced sufficiently far apart, then it can be assumed that the gains hl[1] are indepen-
dent Rayleigh, and we get a diversity gain of N. For SIMO system, with N = 2
receiving antennas for our case, the channel capacity can be given by:
7[ 5[
One more step towards diversity principle is to implement two transmit antennas
and one receive antenna. This configuration is called multiple inputs single output
(MISO) system which is shown in Fig. 3.7. For example, a base station with two
transmit and one receive antennas would be MISO (M × 1 system).
M transmit antennas and one receive antenna is common to all downlink of a
cellular system since it is often cheaper to have multiple antennas at the base station
than to having multiple antennas at every handset. It is easy to get a diversity gain
of M: simply transmit the same symbol over the M different antennas during M
symbol times. The channel capacity of the MISO system is given by:
7[ 5[
3.3.3.1 M
athematical Modeling of MISO System Using Alamouti Coding
Scheme
Most efficient approach to exploit diversity is space-time coding (STC) given by the
Multiple Input Single Output and Multiple Input Multiple Output. It is used to
obtain gains due to spatial diversity via multiple transmit and receive antennas. One
popular representation of these codes is the Alamouti scheme for two transmit
antennas. STC coding is used to improve the performance of the MISO system.
Main focus is the utilization of multipath effects in order to achieve very high spec-
tral efficiencies. With this motive, the principal aim of the space-time coding lies in
the design of 2D signal matrices which is prepared for the transmission during a
specified time period on a number of antennas. By this way, redundancy in space
can be increased through the addition of multiple antennas, enabling us to exploit
diversity in the spatial dimension, as well as obtaining a coding gain. Therefore, the
transmit diversity plays an integral role in the STC design. Alamouti introduced a
very simple scheme of space-time block coding (STBC) allowing transmissions
from two antennas with the same data rate as on a single antenna [3].
The Alamouti algorithm uses the space and the time domain to encode data as
shown in Fig. 3.8, the Alamouti algorithm uses the space and the time domain to
encode data, increasing the performance of the system by coding the signals over
the different transmitter branches. Thus, the Alamouti code achieves high diversity
gain with full data rate as it transmits two symbols in two-time intervals.
In the first time slot, transmit antennas Tx1 and Tx2 are sending symbols s0 and s1,
respectively. In the next time slot, symbols −s1∗ and s0∗ are transmitted, where (·)∗
denotes complex conjugation. Each symbol is multiplied by a factor of a squared
root of 2 in order to achieve a transmitted average power of 1 in each time step.
Furthermore, it is supposed that the channel, which has transmission coefficients h1
and h2, remains constant and frequency flat over the two consecutive time steps. The
received vector, r, is formed by stacking two consecutive received data samples in
time, resulting in
1
r= Sh + n (3.8)
2
,QSXW K 2XWSXW
6 6 6 6
6 1RLVH U U U
$ODPRXWL
5HFHLYHU
&RGLQJ
K
6
6
where r = [r0, r1]T represents the received vector, h = [h0, h1]T is the complex channel
vector, n = [n0, n1]T is the noise at the receiver, and S defines the STC:
S S1
S = 0∗ (3.9)
S1 −S0∗
The vector equation in Eq. (3.8) can be explicit as
1 1
r0 = S0 ⋅ h1 + S1 ⋅ h2 + n0 (3.10)
2 2
−1 1
r1 = S1∗ ⋅ h1 + S0∗ ⋅ h2 + n1 (3.11)
2 2
At the receiver, the vector y of the received signal is formed according to y = [r0,
r1]T, which is equivalent to
1 1
r0 = S0 ⋅ h1 + S1 ⋅ h2 + n0 (3.12)
2 2
1 1
r2∗ = S0 ⋅ h2∗ − S1 ⋅ h1∗ + n1∗ (3.13)
2 2
These both Eqs. (3.11) and (3.13) can be rewritten in a matrix system as specified
in the below equation.
r1 1 h1 h2 S0 n0
∗= ∗ + (3.14)
r2 2 h2 −h1∗ S1 n1∗
The Hermitian of the virtual channel matrix is
h∗ h2
H vH = 1∗ (3.15)
h2 −h1
Finally, the estimated transmitted signal is given by Ŝ = H vH ⋅ y and therefore,
Ŝ0 H 0
r
= H v ∗ (3.16)
S1 r
1
64 3 Various Techniques for WiMAX System Modeling
Sˆ0 S0 n0
= H v ⋅ H v + H v ∗
H
S1 S1 n1
Sˆ0 1 h1 h2 h1 h2 S0 h1∗ h2 n0
∗
= ∗ ⋅ ∗ ⋅
∗ + ∗ ⋅ ∗
S1 2 h2 −h1 h2 −h1 S1 h2 −h1 n1
(3.17)
Sˆ0 1
=
S1 2
( 2
h1 + h2 )
2 1 0 S0 h1∗ n0 + h2 n1∗
∗
0 1 S1 h2 n0 − h1n1
∗
Sˆ0 1 2
= h I 2 S + n
S1 2
Once the corresponding operations for estimating the transmitted signal have
been performed, the result is represented in Eq. (3.17), where
• h2 = |h1|2 + |h2|2 is the power gain of the channel.
• I2 is the 2 × 2 identity matrix.
• S = [S0, S1]Trepresents the transmitted symbols.
h∗ n + h n∗
• n = 1∗ 0 2 1∗ is some modified noise.
h2 n0 − h1n1
MIMO introduces the transmission of two streams using two or more than two spa-
tially separated antennas. The streams are received at the receiver by using spatially
separated antennas. The streams are then separated by using space-time processing,
which forms the core of the MIMO technology. A base station using two transmit
antennas and two receive antennas is referred to as MIMO (n × n). Figure 3.9 shows
the schematic of the MIMO system.
The main attraction of MIMO channels over SISO channels is the various gains
like array, diversity, and the multiplexing. Array gain and diversity gain are also
associated with SIMO and MISO channels [3]. Multiplexing gain, however, is a
7[ 5[
One technique to use 2 × 2 MIMO is to send identical data streams on both the
transmit antennas and use space time coding techniques (STC) to take advantage of
the space and time diversity achieved. The effective SNR seen by the receiver can
be improved by using STC with 2 × 2 and thus permits the use of the highest modu-
lation coding with relatively low FEC. This effectively increases the data transmis-
sion rate. This mode of operation using space-time coding is called MIMO Matrix
A which has been represented by Fig. 3.10.
In an elevated SINR environment, the two transmit antennas can carry independent
data streams by using a technique called spatial multiplexing (SM). Thus, each of
the two streams and the peak data rate handled over the physical layer can go up to
nearly double of a single stream in ideal transmission conditions. The transmission
rate is very high nearer to 50% improvement than a single transmitting antenna even
in characteristic field conditions. This technique of using MIMO (i.e., by using spa-
tial multiplexing) is called MIMO Matrix B that can be viewed from Fig. 3.11.
7[
+I
,QSXW +I
6 6 6 6
6
$ODPRXWL
&RGLQJ 7[
+I
+I
6
6
7[
+I
,QSXW +I
6 6 6 6
$ODPRXWL
&RGLQJ 7[
+I
+I
6
In this book, Matrix A MIMO system model is being implemented for the critical
performance demonstration of transmitter and receiver diversity system and for the
implementation of the antenna diversity system in the WiMAX system.
3.3.4.3 M
athematical Model for MIMO System Using Alamouti Coding
Scheme
As per the theoretical aspect of MIMO given in above sections, one mathematical
model of the MIMO system has been developed and can be visualized from the
inspection of Fig. 3.12.
The received signal from a 2 × 2 Alamouti scheme as depicted from Fig. 3.12 is
∗ ∗ ∗ ∗
r1 ( 2 ) h22 −h12 n1 (1)
3.3 Various Antenna Diversity Systems 67
h11 h21
h12 h22
Hv = ∗ (3.19)
h21 −h11∗
∗ ∗
h22 −h12
Therefore, the Hermitian of the virtual channel matrix is
Sˆ0 1 2
= h I 2 S + n (3.21)
Sˆ 2
1
Equation (3.21) expresses the obtained result for the process of estimating the
transmitted symbols.
• h 2 =|| h1 ||22 + || h2 ||22 =|| h21 ||2 + || h22 ||2 is the power gain of the channel.
• I2 is the 2 × 2 identity matrix.
• S = [S0, S1]Trepresents the transmitted symbols.
h∗ n (1) + h12∗ n0 ( 2 ) + h21n1∗ (1) + h22 n1∗ ( 2 )
• n = 11∗ 0 is some modified noise.
h n (1) + h∗ n ( 2 ) − h n∗ (1) + h n∗ ( 2 )
21 0 22 0 11 1 12 1
In order to take the channel correlation into account, which has a strong impact
on the achievable performance of the system, different spatial channel models are
considered.
Channel capacity of MIMO system with reference to Eqs. (3.6) and (3.7) for SIMO
and MISO respectively, the channel capacity of MIMO system is given by:
Here various channels have been discussed which can be part of the MIMO wireless
transmission. They are as under as per their characteristics.
• Narrowband vs. Wideband: If the channel coherent bandwidth is larger than
the baseband signal, then the channel is called a narrowband channel. It is also
called a flat channel because each transmitted frequency component undergoes
the same fading. The radio channel is considered as wideband channel when
the channel coherent bandwidth is less than the baseband signals. It is some-
times called frequency selective fading channel because each transmitted fre-
quency component undergoes different fading. The channel medium is very
dispersive in a frequency selective fading channel. In this environment, the
received signal suffers from a delayed, distorted, and attenuated version of the
transmitted signal. This generates intersymbol interference (ISI) which results
in decrement in channel performance. In MIMO also two types of channel can
be introduced. First is the wideband channel model which takes propagation
channel as frequency selective which gives different response to various fre-
quency band of transmitted bandwidth. Other channel may assume as the nar-
rowband models which is flat fading channel and therefore the channel has the
same response over the entire system bandwidth.
• Physical vs. Non-physical Models: The MIMO channel models can also be
divided into physical and non-physical models. Some typical parameters are
identified in this channel which include an angle of arrival, the angle of depar-
ture, and time of arrival. However, under many propagation conditions, the
MIMO channels are not well described by a small set of physical parameters, and
this limitation makes difficult to identify and validate the models. Another kind
is non-physical models. They are based on the channel statistical characteristics.
In general, the non-physical models are easy to simulate under which they were
identified as they provide limited propagation characteristics, such as the band-
width, configuration, and aperture of the arrays, and the heights of the transmit
and receive antennas in the measurements.
• Measurement vs. Scattering Models: Another crucial approach to design
MIMO channel is to measure the real MIMO channel responses through real
field measurements. Some important parameters through the reading and mea-
surement of the MIMO channel can be listed from recorded data, and the
MIMO channel can be modeled to have similar statistical characteristics. A
different approach is to assume a model that attempts to capture the channel
characteristics. Such a model can often demonstrate the important character-
istics of the MIMO channel as long as the constructed scattering environment
is acceptable.
3.4 Designing of Antenna Diversity Systems with Alamouti Coding Scheme 69
In this section, the merits and demerits of the MIMO system are described.
• Advantages of MIMO System: Any wireless system is designed with motive to
increase throughput and transmission quality. MIMO systems can take multipath
propagation positively and signal can be strengthened. Multipath random fading
and multipath delay spread can be used to increase throughput. BER can be
improved in MIMO systems without the need to increase bandwidth and/or
power. MIMO improves throughput as well as transmission quality. Diversity is
a technology used in MIMO for this purpose. Multiple antennas can be used to
minimize the effect of fading caused by multipath propagation. When the anten-
nas at the receive side are adequately spaced, then several copies of the transmit-
ted signal are received through different channels and with different fading [4].
Because of multipath propagation, all the components cannot be affected by
deep fading equally. Thus, diversity can improve signal quality.
• One obvious disadvantage of MIMO is that they contain more antennas:
MIMO increases complexity, volume, and hardware costs of the system com-
pared to SISO. MIMO systems are not always beneficial knowing that channel
conditions depend on the radio environment. When there is Line of Sight (LOS),
a higher LOS strength at receive will result in better performance and capacity in
SISO system, while in MIMO systems capacity is reduced with higher LOS
strength. This is beacuse strong contributions from LOS lead to higher correla-
tion among antennas, which reduce the advantage of using a MIMO system.
By considering the all above facts, the following section of the chapter describes
the real-time implementation of antenna diversity algorithms with Alamouti coding
scheme so as to realize the system performance in the presence of diversities by
analyzing relationships between BERs and SNRs.
3.4 D
esigning of Antenna Diversity Systems with Alamouti
Coding Scheme
Fig. 3.13 Generalized
designing flowchart for
antenna diversity system
The implementation steps for SISO antenna diversity system is shown in Fig. 3.14.
For the implementation of this system, various parameters such as no. of transmit-
ting and receiving antennas, input values of data, type of modulation technique, the
order of modulation, and signal to noise ratio need to set as per system requirement.
Here, the M-ary PSK method and Rayleigh are used as a modulation method and
channel, respectively. The values of signal, noise, and channel are generated in
terms of a matrix with the help of MATLAB. For easy understanding of system
working, a small number of user-defined values as input data are used. The same
implementation can be used for a large amount of data.
The development of a system is initiated with the help of MATLAB as per the
description given in Fig. 3.14. Here, ten user-defined symbols as input data are
taken for checking of errors produced at the receiver side due to the wireless com-
munication system. The sample data like 10 symbols or 20 bits are transmitted using
SISO antenna system with single-channel matrix and single noise matrix. These
numerical values are summarized in Table 3.1. With no diversity method, the same
number of symbols are received by receiver with some errors. For analysis purpose,
the channel SNR value is set to fix as 0.75 dB.
During transmission, the channel generates noise in the input symbols/bits which
has been shown by red colored font. Under no diversity scenario, the receiver
receives four correct symbols out of ten transmitted symbols. This indicated that six
symbols are corrupted due to the multipath property of the wireless communication
3.4 Designing of Antenna Diversity Systems with Alamouti Coding Scheme 71
system. It is also indicated that BER is less than SER which happens due to each
symbol has two bits for representation and it might be the case that one bit is cor-
rupted out of two bits. Now, this system is simulated with the help of 10,000 input
bits and obtained BER vs. SNR graph which is shown in Fig. 3.15. This graph gives
real-time data analysis of the SISO system.
As can be seen from Fig. 3.15, in case of no diversity, i.e. using single transmit-
ting and single receiving antenna, initially the BER can be obtained around 0.1 at
lower SNR = 1dB and at higher value of SNR, i.e. at SNR = 21dB, the achievable
BER decreases around 0.02. In fact throughput of the system totally depends on the
channel SNR.
72 3 Various Techniques for WiMAX System Modeling
%(5
615LQG%
Fig. 3.15 BER vs. SNR for SISO antenna diversity system
The implementation steps for SIMO antenna diversity system are shown in Fig. 3.16.
For the implementation of this system, one transmitting antenna and two receiving
antennas along with M-ary modulation method and Rayleigh channel are used.
Here, two noise matrices along with single-channel matrix are generated with the
help of MATLAB. At the receiver side, as per the value of modulation order, sym-
bols are received by the receiver which may be converted in bits for proper analysis.
Finally, the BER and SER are calculated as per received symbols and plot the graph
between BER and SNR. In this system, one transmitting antenna and two receiving
antennas are used. The simulation results of this system are summarized in Table 3.2.
Here, 10 symbols are transmitted and 6 symbols got an error at the receiver side,
which indicates that this system has SER = 0.6 dB, while 9 bits are corrupted out of
20 received bits, which indicates that this system has BER = 0.45 dB.
Now, this system has been implemented for 10,000 input bits and obtained BER
value with different range of SNR. The simulation result for this scenario is realized
in terms of BER vs. SNR graph which is shown in Fig. 3.17. This graph indicates
that using this system, the value of BER is improved for a single communication
channel. For the same input data, the SIMO system provides BER value of 0.45 dB,
while the SISO system provides BER value of 0.55 dB. This situation indicates that
this system provides better performance compared to SISO system.
The implementation steps of MISO antenna diversity system along Alamouti cod-
ing are shown in Fig. 3.18. Here, two transmitting antennas and one receiving
antenna along with random input symbols are taken for analysis of the system. The
Alamouti coding is used where diversity of transmitter is taken place in the system.
3.4 Designing of Antenna Diversity Systems with Alamouti Coding Scheme 73
%(5
615LQG%
Fig. 3.17 BER vs. SNR for SIMO antenna diversity system
74 3 Various Techniques for WiMAX System Modeling
Fig. 3.18 Designing algorithm for MISO antenna diversity system with Alamouti coding
Table 3.3 Simulation results of MISO antenna diversity system with Alamouti coding
Transmission symbols 2 1 1 1 0 0 2 1 3 2 Total no. of
2 1 1 1 0 0 2 1 3 2 symbols: 20
Received symbols 0 1 1 1 0 0 1 0 1 0 Error in received
1 1 1 1 0 0 0 1 0 0 symbols: 9
Matrices values for −1.04429266452263 − 0.0993077287635684i ( −S1∗ ) Alamouti coding
channel technique
−0.696253522655436 + 0.290063644892930i (S0)
−0.696253522655436 − 0.290063644892930i ( S0∗ )
1.04429266452263 – 0.0993077287635684i (S1)
Transmission bits 10 0 0 0 0 0 1 0 1 10 Total bits: 40
1 1 1 0 0 0 1 1
10 0 0 0 0 0 1 0 1 10
1 1 1 0 0 0 1 1
Received bits 0 0 0 0 0 0 0 0 0 0 Error bits: 12
0 1 1 1 0 0 1 0 1 0
0 0 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 1 0 0
SNR 0.75 dB Fix
SER 0.45 dB
BER 0.30 dB
Here, the complex conjugate of input symbols is taken and transmitted with the help
of two antennas. For analysis purpose, signal matrix, two noise matrices which are
complex conjugate, and two channel matrices are generated with the help of
MATLAB. The simulation results of this system are summarized in Table 3.3.
3.4 Designing of Antenna Diversity Systems with Alamouti Coding Scheme 75
%(5
615LQG%
Fig. 3.19 BER vs. SNR for MISO antenna diversity system with Alamouti coding
In this MISO system, 20 symbols are transmitted with the help of two antennas
along with two channel matrices and two noise matrices. The SER of this system is
around 0.45 dB which indicated that 9 symbols are corrupted due to this system out
of 20 input symbols, while BER of this system is 0.3 dB which indicated that 12 bits
got corrupt out of 40 input bits. The BER vs. SNR of this system for 10,000 input
bits is shown in Fig. 3.19. As per seen from this figure, the BER value is very low
like 0.048 at a low value of SNR and decreases around 0.001 at a high value of SNR
such as 21 dB. This indicated that this system performs better than the previous two
systems such as SISO and SIMO.
The implementation steps of MIMO antenna diversity system along Alamouti cod-
ing are shown in Fig. 3.20. Here, two transmitting antennas and two receiving
antennas along with random input symbols are taken for analysis of the system.
Here, the complex conjugate of input symbols is taken and transmitted with the help
of two antennas. For analysis purpose, two signal matrices, two noise matrices
which are complex conjugate, and two channels matrices are generated with the
help of MATLAB. The simulation results of this system are summarized in Table 3.4.
This system uses advantages of SIMO and MISO system to achieve good perfor-
mance and improved BER by utilization of more transmitting antennas and r eceiving
antennas. Here, two types of data such as 20 user-defined symbols or 40 bits and
second applying the same phenomenon to stream of 10,000 bits for taking real time
transmission analogy. As indicated in Table 3.4, only 8 received bits are corrupted
out of 40 bits due to the use of 4 noise matrices and 2 channel matrices. This error
rate is low compared to the other three systems. Also, BER = 0.2 and SER = 0.4 for
this system is good compared to other diversity systems. The graph between BER
76 3 Various Techniques for WiMAX System Modeling
Fig. 3.20 Designing algorithm for MIMO antenna diversity system with Alamouti coding
Table 3.4 Simulation results of MIMO antenna diversity system with Alamouti coding
Transmission 2 1 1 1 0 0 2 1 3 2 Total no. of
symbols 2 1 1 1 0 0 2 1 3 2 symbols: 20
Received symbols 0 1 1 1 0 0 0 1 1 0 Error in received
0 1 1 1 0 0 0 1 1 0 symbols: 8
Matrices values 1.09980602264884 − 0.852422471464323i ( −S1∗ ) Alamouti coding
for channel 0.579729420304971 – 0.615471441657012i(S ) technique
0
%(5
615LQG%
Fig. 3.21 BER vs. SNR for MIMO antenna diversity system with Alamouti coding
vs. SER for real-time data is shown in Fig. 3.21. In this graph, BER value is very
low around 0.04 for the low value of SNR and near to 0 for the high value of SNR
like 21 dB. This is indicated that reliable communication of data can be possible
using this type of system.
This section gives a comparative analysis of various antenna diversity systems. The
performance of systems is compared with the help of BER vs. SNR graph.
Figure 3.22 shows a comparison of the performance of antenna diversity systems in
terms of BER values. For example, at 5 dB of SNR, the BER of the SISO system is
0.08 while BER of SIMO is around 0.04. Similarly, the BER of MISO is around
0.035 for the same SNR value 0f 5 dB. The BER of MIMO is near 0.02 which is low
along with all types of diversity system. This is indicated that MIMO system pro-
vides good performance compared to other diversity systems.
In this section, the basic information regarding of OFDM system along with its
designing is discussed. This system provides a physical platform to build any
WiMAX system. The basic model of a transceiver for OFDM along with its imple-
mentation is also discussed in this section.
78 3 Various Techniques for WiMAX System Modeling
The multi-carrier modulation (MCM) is the main idea behind OFDM, and OFDM
obeys this concept. The basic of MCM is that it divides input bit stream into several
parallel bit streams and they are used for modulation of subcarriers. The concept of
OFDM is shown in Fig. 3.23. In this figure, each subcarrier is separated by guard
band to avoid interference between them. In the receiver side, the bandpass filters
are used to separate these parallel bit streams from the individual subcarriers.
OFDM is a special version of MCM where subcarriers with orthogonal spaced and
overlapping spectrums are used. Here, the bandpass filter is not used due to the
orthogonality property of subcarriers.
The requirement of channel bandwidth can be reduced by the OFDM system
which is clearly seen in Fig. 3.23. The orthogonality of input data streams can be
achieved by applying FFT on it [5]. OFDM provides a high data rate for a large
duration of symbol and eliminates the risk of intersymbol interference based on
channel coherence time.
a
0.12
0.1
0.08
BER
SISO
0.06
SIMO
0.04
0.02
0
1 3 5 7 9 11 13 15 17 19 21
SNR in dB
b
0.12
0.1
0.08
SISO
BER
0.06
MISO
0.04
0.02
0
1 3 5 7 9 11 13 15 17 19 21
SNR in dB
Fig. 3.22 Performance comparison of antenna diversity systems (a) between SISO and SIMO, (b)
between SISO and MISO, (c) between SISO and MIMO, (d) all diversity systems
3.5 Designing of OFDM System 79
c
0.12
0.1
0.08
SISO
0.06
BER
MIMO
0.04
0.02
0
1 3 5 7 9 11 13 15 17 19 21
SNR in dB
d
0.12
0.1
0.08 SISO
BER
SIMO
0.06
MISO
0.04 MIMO
0.02
0
1 3 5 7 9 11 13 15 17 19 21
SNR in dB
Fig. 3.22 (continued)
Ch.1 Ch.2 Ch.3 Ch.4 Ch.5 Ch.6 Ch.7 Ch.8 Ch.9 Ch.10
Frequency
Normal Multi-Carrier Technique
Add
Input Bit N Add
S/P QAM P/S Guard
Stream IFFT C. P.
Band
OFDM Transmitter
OFDM Receiver
The basic block diagram of the OFDM system is shown in Fig. 3.24. The OFDM
transmitter comprises of basic blocks of QAM, IFFT and addition of cyclic prefix to
evaluate the performance. The receiver possesses exactly opposite blocks of the
system. Here, the single to parallel converter is used to convert single input data
stream into the multi-dimensional stream. Then this stream gets modulated with the
help of QAM and passes through the IFFT process. At the end of the transmitter
side, the additional bit is added by cyclic prefix (CP) block to improve the perfor-
mance of the system [5]. At the receiver side, the totally opposite process of trans-
mitter is performed. After receiving that data, total opposite processes of cyclic
prefix removal, FFT, QAM demodulation and parallel to serial conversion will
take place.
3.5.3 A
dvantages, Disadvantages, and Applications
of OFDM System
The OFDM system is mainly used for reducing the effect of ICI and combats the
ISI. There are few advantages of this system which are discussed as per below:
• This system has high spectral efficiency due to overlapping spectrum.
• Simple implementation by fast Fourier Transform.
• The complexity of the receiver system is lower compared to the transmitter
system.
• It can be used for transmission where the high data rate is required.
3.5 Designing of OFDM System 81
This system has some disadvantages which are discussed as per below:
• This system is very sensitive to high changes in times and frequency.
• This system used large no. of subcarriers which increase the power consumption
of system compared to a single carrier system.
OFDM has gained a big interest since the beginning of the 1990s as many of the
implementation difficulties have been overcome. OFDM has been in used or pro-
posed for a number of wired and wireless applications. This is the first commercial
users of this system. This system is also used for transmission of digital video sig-
nals [6]. After that, this system is accepted by worldwide researcher community and
it is used as physical layer architecture for wireless LAN standards such as IEEE
802.11 a/g and IEEE 806.16 [7].
The main purpose of designing of OFDM system is to reduce data rate in subcarrier
system. Hence, when the symbol rate increases then effects due to multipath are
decreased. The insertion of higher valued CP will bring good results against com-
bating multipath effects but at the same time it will increase loss of energy. Therefore,
the tradeoff between these two parameters must be done before designing of OFDM
system. The designing of the OFDM system requires some assumption which is
discussed below:
• Design Requirements for OFDM System
–– Bandwidth: The channel bandwidth has a significant role in designing of
OFDM system. The high bandwidth provides large no. of subcarriers which
reduce the effect of the addition of CP.
–– Bit Rate: This is a no. of bit required as an input data stream.
–– Delay: The value of delay may be calculated by the length of CP and it is
based on system requirement.
–– Value of Doppler: The effect of Doppler shifting must be taken into account
for system designing.
The designing parameters required for OFDM system are discussed below:
• Design Parameters for OFDM System
–– No. of Subcarriers: The large no. of subcarriers reduces the effect of mul-
tipath but increases complexity in synchronization at the receiver side.
–– Duration of Symbol and Length of CP: The suitable value must be chosen
which gives perfect ratio between symbol duration and length of CP.
–– Spacing of Subcarrier: The value of this parameter depends on the available
channel bandwidth and no. of subcarriers.
–– Type of Modulation: The performance requirement will decide the selection
of modulation scheme.
82 3 Various Techniques for WiMAX System Modeling
–– FEC Coding: This coding provides robustness to the system against errors
occurred in channels.
The implementation of OFDM system has been done with the help of MATLAB
software. The steps for implementation of the OFDM system are shown in Fig. 3.25.
For the initialization stage of implementation, first, set the value of symbol rate,
symbol duration, no. of bit required for symbols, and guard band is selected. Based
on these values, the input data stream is generated and after that, the process of the
OFDM system is performed as shown in Fig. 3.24. The data stream is generated
using “MODMAP” command in MATLAB and the orthogonal complex conjugate
of the stream is generated using “AMODCE” command in MATLAB. By consider-
ing specific length of the symbols and length of the guard interval, IFFT of that
stream is taken so as to convert the discrete frequency domain data into discrete time
domain for making it compatible for real time transmission through the wireless
channel.
Figure 3.26 shows the simulation results for the OFDM system with symbol per
frame = 64 and 32, respectively. The time domain graphs in figures show orthogo-
nality property of the system which requires less space and has low interference. It
also indicated that due to orthogonality, the system requires less bandwidth for high
3.5 Designing of OFDM System 83
E
Fig. 3.26 Simulation results for OFDM system with (a) data symbol per frame = 64 and (b) data
symbol per frame = 32
84 3 Various Techniques for WiMAX System Modeling
symbol rate. The system performance also indicated that it provides limited data
rate, a significant amount of ISI and bandwidth saving for a different size of symbols.
References
4.1 M
odeling of WiMAX System Based on Antenna
Diversity System and OFDM System
The complete physical modeling of the WiMAX system is discussed in the previous
chapter. Figure 4.1 shows the modeling of the transmitter section and the receiver
section of the WiMAX system. This system was the implementation with the help
of antenna diversity technique and OFDM. The following points must be a consid-
eration for designing this system.
• Set the values of system parameters such as order of modulation, cyclic prefix,
no. of antennas for the transmitter as well as the receiver, OFDM symbols, and
input data for the processing of the system.
• The random input data is generated using a random number generator and
encoded using FEC coder for the secure transmission of data. After encoding the
data, the block interleaver process is applied to it for reducing errors in it.
• OFDM transmitter transmits this modulated data by taking advantage of orthog-
onality to save bandwidth and reduce ISI effects.
• Now based on used diversity method, this data is transmitted over a wireless
channel using various transmission methods such as different paths or channel
estimation or Alamouti coding.
• At the receiver side, modulated and encoded data is given to OFDM demodulator
and decoder to obtain original value of input random data.
• After obtaining received input random data, the distortion in this data is calcu-
lated with the help of bit error rate by comparing with original input data. Based
on this comparison, the performance of the system will be judged.
The above-mentioned brief points must be thoroughly evaluated to design an effi-
cient WiMAX system. The following subsections have discussed all steps in detail along
with its specification. The designing and modeling flow for transmitter section and
receiver section of the WiMAX system with a wireless channel is explained as follows.
'HILQHYDULRXVLQSXWVOLNHW\SHRIPRGXODWLRQF\FOLFSUHIL[QRRI2)'0V\PEROVUDQJHRI
615VQRRI7UDQVPLWWHUDVZHOODV5HFHLYHU$QWHQQDV
*HQHUDWHWKHUDQGRPGDWDVWUHDPE\LQLWLDWLQJWKHSVHXGR5DQGRP%LQDU\VHTXHQFH
*HQHUDWRU
$SSO\WKHLQQHUDVZHOODVRXWHUFRGLQJRI)(&LHFRPELQDWLRQRIFRQYROXWLRQFRGLQJ 5HHG
6RORPRQFRGLQJRQWKHUDQGRPL]HGGDWDXVLQJ*DORLV3RO\QRPLDO3ULQFLSOH
,QWHUOHDYLQJWKHFRGHGGDWDE\PHDQVRIEORFNLQWHUOHDYHU
'HILQHWKHYDULRXVPRGXODWLRQVFKHPHVVXFKDV436436.4$04$0
4$0$1'4$0
$SSO\2)'0WHFKQLTXHXVLQJ,))7DORQJZLWKSLORWFDUULHUVDQGF\FOLFSUHIL[
)RUWKHGLVFUHWHYDOXHVRI615GHILQHWKHWUDQVPLVVLRQWKURXJK$:*1FKDQQHODVSHUQRRI
7UDQVPLWWHUDQG5HFHLYHUDQWHQQDVE\DGGLQJFKDQQHODQGQRLVH0DWUL[HV
Fig. 4.1 Algorithm for WiMAX system model. (a) For WiMAX transmitter. (b) For WiMAX
receiver
4.1 Modeling of WiMAX System Based on Antenna Diversity System and OFDM… 87
$SSO\WKH2)'0GHPRGXODWLRQXVLQJ))7DQGUHPRYHWKHSLORWFDUULHUVDQGF\FOLF
SUHIL[
$SSO\WKHGHLQWHUOHDYLQJRIFRGHGGDWDE\PHDQVRIEORFNGHLQWHUOHDYHU
$SSO\WKHLQQHUDVZHOODVRXWHUGHFRGLQJRI)(&LHFRPELQDWLRQRIYLWHUELGHFRGHU
DQG56GHFRGHU
2EWDLQGHUDQGRPL]HGGDWDXVLQJ;25LQJRIUHFHLYHGGDWDDQG31VHTXHQFH
JHQHUDWRU
&DOFXODWLRQRI%LW(UURU5DWHDQGJHQHUDWLRQRIJUDSKRI%(5YV615
(QGRIGLIIHUHQW615ORRS
(QGRIGLIIHUHQWVLJQDOORRS
Fig. 4.1 (continued)
In this section, designing the flow of various subsystems of the WiMAX transmitter
is explained with their design specifications.
(A) Data Initialization:
The steps for data initialization are as per below:
88 4 WiMAX System Modeling
Step 1: Set the value of input parameters of the system such as no. of antennas for
transmitter section and receiver section, the value of cyclic prefix, and rate
value.
Step 2: Set the rate value for the selected modulation scheme.
Step 3: Set the cyclic prefix value for OFDM technique. The default value is 0.25,
0.125, 0.0625, and 0.03125.
Step 4: Set the symbol value for the OFDM technique.
Step 5: Finally, set the no. of antenna for transmitter and receiver as per chosen
antenna diversity system.
(B) Data Generation and Randomization:
The steps for data generation are as per below:
Step 1: The input data is generated using a data generator. This data has a sequence
of 1’s and 0’s. The size of this data depends on the rate value of the modu-
lation scheme and it is a fixed value.
Step 2: The random stream of data is generated using a pseudo random sequence
generator.
Step 3: After that, XOR process is performed between the output of data generator
and the output of PN sequence generator for ciphering purpose.
Step 4: One byte of 0’s is added after this process for modulation and encoding
process.
Step 5: The padding of one byte is added to this random data after the encoding
process.
(C) Reed–Solomon Encoding:
The steps for Reed–Solomon encoding are as per below:
Step 1: The encoding of input data is performed using the RS encoding method
where different rate value is used for security purpose according to the
modulation scheme. For this process, “RSENC” command is used in
MATLAB.
Step 2: Here, two modes are defined for either transmission or reception such as
“10” or “01.” The value of TxRx is set “10” for encoding purpose.
Step 3: The value of codeword length (n) and data length (k) are also required for
the encoding process. The value of these parameters is set according to the
modulation scheme.
Step 4: For the implementation of Reed–Solomon encoding, the decimal number
is required as input. Therefore, binary input data is converted into decimal
using below polynomial functions such as primitive (p) and generator (g):
p ( x ) = x8 + x 4 + x3 + x 2 + 1 (4.1)
(
g ( x) = x + λ0 ) ( x + λ ) ( x + λ ) …( x + λ )
1 2 2 t −1
(4.2)
Step 5: The encoded decimal data is generated using a command like CodeRS
(msg, n, k).
4.1 Modeling of WiMAX System Based on Antenna Diversity System and OFDM… 89
Step 6: Finally, the encoded decimal data is again converted into binary coded data
for further process.
(D) Convolution Encoding:
The steps for convolution encoding are as per below:
Step 1: After RS encoding, the convolution encoding is applied on RS encoded
data for better performance and transparency.
Step 2: Here, two modes are defined for either transmission or reception such as
“10” or “01.” The value of TxRx is set “10” for encoding purpose. Also, set
parameters such as the rate for coding, bit values for generator polynomial,
and constraint length according to the modulation scheme. For this param-
eter, poly2trellis command is used in MATLAB.
(E) Data Interleaving:
The steps for data interleaving are as per below:
Step 1: Reordering of the encoded data is performed using different interleaving
levels. Here, the value of interleaving level is set 12.
Step 2: According to modulation scheme, no. of bits allocated to subcarrier for
OFDM symbol (Ncbps) and no. of code per carrier (Ncpc) are set. Data
interleaving is performed using below MATLAB commands:
k=0: Ncbps-1
mk = ((Ncbps/12) ∗ mod(k,12)) + floor (k/12);
jk = s∗floor(mk/s) + mod (mk + Ncbps-floor(12∗mk/Ncbps), s);
Step 3: After this process, the data is transmitted to modulation block for further
process.
(F) M-QAM Modulation:
The steps for M-QAM modulation are as per below:
Step 1: Set the value of modulation order M according to the modulation scheme.
Here, modulation schemes such as QPSK and QAM with different order
are used. The no. of bits per symbol (Xsym) is also defined according to
the modulation scheme.
Step 2: The following MATLAB commands are used to generate modulated data
according to the modulation order and Xsym.
Step 3: The output of this process is complex data which is based on the used
modulation scheme.
90 4 WiMAX System Modeling
Step 4: Transmit the complete OFDM symbols through the wireless channel.
4.1 Modeling of WiMAX System Based on Antenna Diversity System and OFDM… 91
In this section, the designing flow of various subsystems of the WiMAX receiver is
explained with their design specifications.
(A) OFDM Receiver:
The steps for OFDM receiver are as per below:
Step 1: Set reception by setting value “01” and get transmit OFDM symbol. After
that, the cyclic prefix is removed from received data which are added dur-
ing transmission.
Step 2: Perform the inverse of IFFT (FFT) to convert symbol into frequency
domain by using the below command to get modulated data:
Step 3: After this process, the data are estimated using position information of the
pilot carrier and subcarrier. This estimated data is sent to demodulation
block for further process.
(B) M-QAM Demodulation:
The steps for M-QAM demodulation are as per below:
tep 1: Set the value of modulation order M according to the modulation scheme.
S
Step 2: The following MATLAB commands are used to get demodulated data
according to the modulation order and Xsym.
Step 3: Perform symbol to bet mapping to retrieve the original coded bits.
(C) Data De-interleaving:
The steps for data de-interleaving are as per below:
Step 1: This is a reverse process of data interleaving.
92 4 WiMAX System Modeling
j = 0: Ncbps-1
mj = s∗floor(j/s) + mod ((j + floor(12∗j/Ncbps)), s);
kj = 12∗mj-(Ncbps-1) ∗floor(12∗mj/Ncbps);
Step 3: Finally, the data is rearranged and given to convolution decoder block for
further process.
(D) Convolution Decoding:
The steps for convolution decoding are as per below:
Step 1: For decoding purpose, set TxRx = “01,” and take the value of parameters
such as the rate for coding, bit values for generator polynomial, and con-
straint length according to a modulation scheme. The decoding of data is
performed using below the instruction:
Step 2: Remove the puncturing vector. Apply the decoded data to next stage of RS
decoding.
(E) Reed–Solomon Decoding:
The steps for Reed–Solomon decoding are as per below:
Step 1: This is the reverse process of RS encoding. Convert decoded data into a
decimal number for the proper working of RS decoder.
Step 2: For decoding purpose, set TxRx = “01,” and the value of codeword length
(n) and data length (k) are also required for the decoding process. The val-
ues of these parameters are the same as generating at the transmitter
section.
Step 3: The decoding of the data is performed using the below instruction:
Step 4: Finally, the decoded decimal data is converted into binary data.
(F) Data De-randomization:
The steps for data de-randomization are as per below:
Step 1: This process removes padded one byte of zero bits from the decoded binary
data.
Step 2: After that, XORing between random data and decoded binary data is per-
formed to get actual bits of received data at the receiver side.
4.1 Modeling of WiMAX System Based on Antenna Diversity System and OFDM… 93
4.2 D
esigning and Analysis of WiMAX System Model Based
on SISO Antenna Diversity System
The modeling of the WiMAX system for SISO antenna diversity scheme is pre-
sented along with its performance in this section. Figure 4.3 shows the initialization
of the WiMAX system model for SISO antenna diversity scheme. The value of SNR
would be selected in such a way that valid BER value can be obtained for the
designed system.
After the set value of parameters for a WiMAX system model based on SISO
antenna diversity scheme, the performance of the system in terms of the graph between
BER versus SNR is shown in Fig. 4.4. Figure 4.4 shows that BER value is high for low
SNR value but BER value is decreased when SNR value is increased. This figure also
shows that the performance of this system is good when the SNR value is 1 dB.
Fig. 4.3 Initialization of WiMAX system model based on SISO antenna diversity system
0.6
0.5
0.4
BER
0.3
0.2
0.1
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
SNR in dB
Fig. 4.4 BER vs. SER curve of WiMAX system model based on SISO antenna diversity system
4.3 Designing and Analysis of WiMAX System Model Based on SIMO Antenna… 95
4.3 D
esigning and Analysis of WiMAX System Model Based
on SIMO Antenna Diversity System
The modeling of the WiMAX system for SIMO antenna diversity scheme is pre-
sented along with its performance in this section. Figure 4.5 shows the initialization
of the WiMAX system model for SIMO antenna diversity scheme. The value of
SNR would be selected in such a way that valid BER value can be obtained for the
designed system.
After the set value of parameters for a WiMAX system model based on SIMO
antenna diversity scheme, the performance of the system in terms of the graph
between BER versus SNR is shown in Fig. 4.6. Figure 4.6 shows that BER value is
high for low SNR value but BER value is decreased when SNR value is increased.
This figure also shows that the performance of this system is good when the SNR
value is 1 dB and shows that BER value is near to zero or zero after the SNR value
is 9 dB or more.
Fig. 4.5 Initialization of WiMAX system model based on SIMO antenna diversity system
0.6
0.5
0.4
BER
0.3
0.2
0.1
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
SNR in dB
Fig. 4.6 BER vs. SER curve of WiMAX system model based on SIMO antenna diversity system
96 4 WiMAX System Modeling
4.4 D
esigning and Analysis of WiMAX System Model Based
on MISO Antenna Diversity System
The modeling of the WiMAX system for MISO antenna diversity scheme is pre-
sented along with its performance in this section. Figure 4.7 shows the initialization
of the WiMAX system model for MISO antenna diversity scheme. The value of
SNR would be selected in such a way that valid BER value can be obtained for the
designed system.
After the set value of parameters for a WiMAX system model based on MISO
antenna diversity scheme, the performance of the system in terms of the graph
between BER versus SNR is shown in Fig. 4.8. Figure 4.8 shows that BER value is
high for low SNR value but BER value is decreased when SNR value is increased.
This figure also shows that the performance of this system is good when the SNR
value is 1 dB and shows that BER value is near to zero or zero after the SNR value
is 9 dB or more.
Fig. 4.7 Initialization of WiMAX system model based on MISO antenna diversity system
0.6
0.5
0.4
BER
0.3
0.2
0.1
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
SNR in dB
Fig. 4.8 BER vs. SER curve of WiMAX system model based on MISO antenna diversity system
4.5 Designing and Analysis of WiMAX System Model Based on MIMO Antenna… 97
4.5 D
esigning and Analysis of WiMAX System Model Based
on MIMO Antenna Diversity System
The modeling of the WiMAX system for MIMO antenna diversity scheme is pre-
sented along with its performance in this section. Figure 4.9 shows the initialization
of the WiMAX system model for MIMO antenna diversity scheme. The value of
SNR would be selected in such a way that valid BER value can be obtained for the
designed system.
After the set value of parameters for a WiMAX system model based on the
MIMO antenna diversity scheme, the performance of the system in terms of the
graph between BER versus SNR is shown in Fig. 4.10. Figure 4.10 shows that BER
value is high for low SNR value but BER value is decreased when SNR value is
increased. This figure also shows that the performance of this system is good when
the SNR value is 1 dB and shows that BER value is near to zero or zero after the
SNR value is 7 dB or more.
Fig. 4.9 Initialization of WiMAX system model based on MIMO antenna diversity system
0.6
0.5
0.4
BER
0.3
0.2
0.1
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
SNR in dB
Fig. 4.10 BER vs. SER curve of WiMAX system model based on MIMO antenna diversity
system
98 4 WiMAX System Modeling
0.7
0.6
0.5 WiMAX SISO
0.4 WiMAX SIMO
BER
Fig. 4.11 Comparative comparison of performance for WiMAX system model based on all
antenna diversity systems
4.6 C
omparison of Performance for WiMAX System Model
Based on All Antenna Diversity Systems
Sections 4.2–4.5 give the performance of a WiMAX system model for different
antenna diversity schemes for various values of SNR. Here, the comparative analy-
sis of different antenna diversity schemes for WiMAX system with parameter val-
ues such as cyclic prefix = 0.0625, 256 OFDM symbols, and M = 16 QAM 3/4 is
given. Figure 4.11 shows the comparative analysis of modeling a WiMAX system
for different antenna diversity schemes.
The comparison shows that the BER value for each scheme is obtained in the
range of SNR values from 1 to 14 dB. The performance SISO scheme is very bad
compared to other schemes in terms of obtained BER values. The performance of
the MIMO scheme is best compared to other schemes. The highest BER values can
be achieved using the SISO scheme.
The WiMAX system is capable of providing very huge coverage area of approxi-
mately 50 Km. But when the distance of communication increases, the performance
of this system is decreased. Under such environment, implementation of MIMO is
opening the great voyage towards highly efficient transmission at lower values of
SNRs in WiMAX system. As per the presented work, just 6 dB SNR is required to
reduce the errors in the received signal.
References
1. Eklund, C., Marks, R. B., Stanwood, K. L., & Wang, S. (2002). IEEE standard 802.16: A
technical overview of the Wireless MAN™ air interface for broadband wireless access. IEEE
Communications Magazine, 40(6), 98–107.
2. Khan, M. N., & Ghauri, S. (2008). The WiMAX 802.16 e physical layer model. In IET
International Conference on Wireless, Mobile and Multimedia Networks (pp. 117–120).
3. Alim, O. A., Abdallah, H. S., & Elaskary, A. M. (2008). Simulation of WiMAX systems. In
IEEE Communication Workshop (pp. 11–16).
Chapter 5
WiMAX System Modeling for Real-Time
Data Transmission
In the previous chapter, the modeling of WiMAX system for different antenna diver-
sity schemes is discussed using random binary data. The basic modeling of tradi-
tional WiMAX system along with detailing of every block has been already
discussed in the Chap. 2. The ideal AWGN channel with no fading effects is used in
this model. Table 5.1 summarized the default parameters used for modeling of
WiMAX system based on different antenna diversity schemes.
Table 5.1 indicated that the parameters such as cyclic prefix and modulation
order are treated as important parameters. As such these parameters can have mul-
tiple no. of values but after certain experimentations that have been discussed in
Chap. 4, their optimum value can be derived. As further, this chapter discussed the
transmission of digital image and speech signal using a WiMAX system. Figures 5.1
and 5.2 show the sample test image with 256 × 256 pixels and a sample speech
signal with 2 s, respectively. Figure 5.3 shows the QAM symbols for transmission
of original data.
5.2 M
odeling of WiMAX-MIMO System for Real-Time
Image Transmission
Model parameter WiMAX-SISO system WiMAX-SIMO system WiMAX-MISO system WiMAX-MIMO system
Model setup MATLAB MATLAB MATLAB MATLAB
SNR value of 24 24 24 24
AWGN channel
(dB)
Power rating of 0.1 0.1 0.1 0.1
AWGN channel (W)
Image matrix size 256 × 256 256 × 256 256 × 256 256 × 256
Samples/frame 35 35 35 35
Generator [1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1] [1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1] [1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1] [1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1]
polynomial of PN
sequence generator
Initial states of PN [0 0 0 1 1 1 0 1 1 1 1 0 0 0 1] [0 0 0 1 1 1 0 1 1 1 1 0 0 0 1] [0 0 0 1 1 1 0 1 1 1 1 0 0 0 1] [0 0 0 1 1 1 0 1 1 1 1 0 0 0 1]
sequence generator
Codeword length N 255 255 255 255
of RS encoder
Message length K of 239 239 239 239
RS encoder
RS encoder rate 3/4 3/4 3/4 3/4
Convolution encoder 171 171 171 171
input vector length k
Convolution encoder 131 131 131 131
output vector length
n
Native rate of 5/6 5/6 5/6 5/6
convolution coder
Puncture vector ([1 0 1 0 1;1 1 0 1 0], 10, 1) ([1 0 1 0 1;1 1 0 1 0], 10, 1) ([1 0 1 0 1;1 1 0 1 0], 10, 1) ([1 0 1 0 1;1 1 0 1 0], 10, 1)
5 WiMAX System Modeling for Real-Time Data Transmission
Model parameter WiMAX-SISO system WiMAX-SIMO system WiMAX-MISO system WiMAX-MIMO system
QAM modulation 4 4 4 4
order
QAM normalization 1/√2 1/√2 1/√2 1/√2
factor
OFDM symbol time 64 μs 64 μs 64 μs 64 μs
Channel bandwidth 1.5–20 MHz 1.5–20 MHz 1.5–20 MHz 1.5–20 MHz
NFFT 256 256 256 256
No. of the cyclic 1/8 1/8 1/8 1/8
prefix
OFDM training N.A. N.A. 200 bits 200 bits
sequence
OFDM pilot carriers 55 bits 55 bits 55 bits 55 bits
No. of transmitter – – 2 2
antenna for alamouti
encoding
No. of receiver – – 1 2
antenna for
Alamouti decoding
Samples of the 16,000 16,000 16,000 16,000
speech signal
Amount of noise AWGN_PWR∗0.1∗((randn AWGN_PWR∗0.1∗((randn AWGN_PWR∗0.1∗((randn AWGN_PWR∗0.1∗((randn
generated by noise (20000,1) + j∗randn (20000,1))/ (20000,1) + j∗randn (20000,1))/ (20000,1) + j∗randn (20000,1))/ (20000,1) + j∗randn (20000,1))/
generators 1 and 2 sqrt (AWGN_SNR)) sqrt (AWGN_SNR)) sqrt (AWGN_SNR)) sqrt (AWGN_SNR))
5.2 Modeling of WiMAX-MIMO System for Real-Time Image Transmission
101
102 5 WiMAX System Modeling for Real-Time Data Transmission
<D[LV
=D[LV
;D[LV
2ULJLQDO6SHHFK
[
2. The random data (280 × 1) is generated using a randomizer and then encrypted
using RS encoder and convolution encoder to get encrypted output data with a
size of 384 × 1.
3. This encrypted data is modulated with the help of QAM modulator to get mod-
ulated data with a dimension of 192 × 1.
4. Here MIMO diversity scheme is used for transmission of data. Therefore, the
modulated data is reframed to get original data with the dimension of 201 × 1.
5. After getting framed data, the main task of the system is performed using
Alamouti encoder which is based on the logic of Alamouti coding. Figure 5.5
shows the basic model for Alamouti encoder. This model consists of OSTBC
encoder and two U-Y selectors. Here, the logic of two-stage conversion is per-
formed and the output of the model is data with dimension 201 × 2. Here, the
output of Alamouti encoder is two data streams which are complex conjugation
5.2 Modeling of WiMAX-MIMO System for Real-Time Image Transmission 103
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 5.3 QAM symbols for testing of performance of designed WiMAX system model
of each other. After that, these data are separated and sent using two OFDM
transmitters.
6. Figure 5.6 shows the detailed model of the OFDM transmitter. Here, two trans-
mitters worked on the same function of two different sequences by adding some
guard bands and cyclic prefix in the data stream to reduce the ISI error during
transmission. This process converts 3-D data in a 1-D matrix with a dimension
of 864 × 1.
7. After that, two data streams with two different sequences are transmitted using
two different channels. The nature of channels is AWGN and the basic structure
of these channels is shown in Fig. 5.7. Here, the effect of multipath fading is not
considered. The noise is added into data streams using two adders and the out-
put of two channels is fed to two different OFDM receivers. If the first two
adders are not used in the channels, then data can travel in different directions
or paths and never combined which overrule the Alamouti logic. So that, by
using the top two adders, the combination of data is performed and after that
noise is added in the combined data using the other two adders.
8. The output of the channel is fed to two separate OFDM receivers. Figure 5.8
shows the basic structure of the OFDM receiver. The important functions of the
receiver are to remove the guard bands and cyclic prefix.
9. The received data streams are fed to Alamouti decoder. Figure 5.9 shows the
basic structure of this decoder which uses maximum likelihood concept for data
decoding. It decoded original data with dimension 200 × 2 using the estimation
of channel and STB combination. Here, for estimation of the channel, two
training sequences are required along with the original data matrix which gives
two-dimension output data.
104 5 WiMAX System Modeling for Real-Time Data Transmission
,PDJH
,QSXW
'$77;
56 &RQYROXWLRQDO
4$0
5DQGRPL]HU (QFRGHU (QFRGHU
2)'07UDQVPLWWHU
$ODPRXWL
)UDPLQJ
(QFRGHU
2)'07UDQVPLWWHU
:L0$;
0,02
&KDQQHO
2)'05HFHLYHU
4$0 0/$ODPRXWL
'H)UDPLQJ
'HPRGXODWRU 'HFRGHU
2)'05HFHLYHU
'$75;
$ODPRXWL
(QFRGHU
7R >[@
>[@ )UDPH
2XW
>[@ 7R >[@ >[@
6DPSOH >[@
X 0,02(1&2'(5 \
,Q
>[@ 7R >[@
IUPJ >[@ )UDPH
2XW
10. After obtaining decoding data, the deframing of decoded data with dimension
200 × 2 is performed using parallel to serial conversion and removes the
additional zero bits from the decoded data to obtain original decoded data with
dimension 192 × 1.
5.2 Modeling of WiMAX-MIMO System for Real-Time Image Transmission 105
11. After this, viterbi decoding is applied to obtain original image at the receiver
side.
12. At last, the comparison between output and input image is performed to calcu-
late the Bit Error Rate.
Figure 5.11 shows the WiMAX-MIMO system after simulation. The model
shows the input data values and output data values at each block with its justifica-
tion. The variations in QAM symbols, received image, and BER value for system
performance for transmission of the image are given in Figs. 5.12, 5.13, and 5.14,
respectively.
The performance of the system shows that the number of bits for an image such
as 635,880 is successfully transmitted using this model. This situation indicated that
the BER of this model is very low around 0.00009 which fulfills the criteria of
image data transmission.
106 5 WiMAX System Modeling for Real-Time Data Transmission
WiMAX
MIMO
Channel
[864x1]
1
In1
2 [864x1]
In2
Noise Noise
Generation-1 Generation-2
+ + + +
[864x1] Adder1 Adder2 [864x1]
[864x1] [864x1]
[864x1]
+ +
Adder3 Adder4
[864x1] [864x1]
[864x1] [864x1]
AWGN AWGN
[864x1] [864x1]
2 Out2 1 Out1
5.3 M
odeling of WiMAX-MIMO System for Real-Time
Speech Signal Transmission
In this section, modeling of the WiMAX system based on the MIMO antenna diver-
sity system for real-time speech signal transmission is discussed. The steps for
transmission of the real-time speech signal are the same as discussed for transmis-
sion of the image, only changes taken place in input data and output data. The simu-
lated WiMAX-MIMO system model for real-time speech signal transmission is
shown in Fig. 5.15.
The variations in QAM symbols, received speech signal, and BER value for
system performance for speech signal transmission are given in Figs. 5.16, 5.17, and
5.18, respectively. The performance of the system shows that the number of speech
signal bits such as 280,280 are successfully transmitted using this model. This situ-
ation indicated that the BER of this model is very low around 0.0004 which fulfills
the criteria of signal transmission.
108 5 WiMAX System Modeling for Real-Time Data Transmission
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
<D[LV
=D[LV
;D[LV
Fig. 5.15 Simulated WiMAX-MIMO system for real-time speech signal transmission
6FDWWHU3ORW
4XDGUDWXUH$PSOLWXGH
,QSKDVH$PSOLWXGH
Fig. 5.16 Output QAM symbols for transmission of real-time speech signal
112 5 WiMAX System Modeling for Real-Time Data Transmission
Original Speech
60
40
20
0
0 0.5 1 1.5 2 2.5 3
4
x 10
Received Speech
60
40
20
0
0 0.5 1 1.5 2 2.5 3
x 104
This chapter covers a summary of the book and future direction in WiMAX system
modeling.
show that this model is effectively used for transmission of digital images and
speech signals. More specifically, research work inside this book evaluates the com-
plete physical layer of WiMAX system along with the implementation of various
antenna diversity techniques on the platform of MATLAB.
The main focus of WiMAX system modeling is to achieve the lowest BER i.e. to
achieve high quality system performance. The performance of the system in terms
of BER and capacity can be improved by increasing a greater number of antennas
and through spatial multiplexing and transmission of signals through various which
lead to the designing and implementation of BLAST structure in WiMAX frame
work. Furthermore, the performance of the system will be evaluated and analyzed
with the help of the OFDM system and different modulation schemes. For the same
purpose, various models would be implemented with the help of DSP processor and
the performance of these models would be analyzed.
Index
A C
Adaptive Modulation and Coding Cellular and wireless technologies, 4
(AMC), 18 Cyclic prefix (CP), 68
Alamouti algorithm, 61
Alamouti coding, 6, 66, 85, 89
Alamouti decoder, 106 D
Alamouti encoder, 103 Data de-interleaving, 91
Alamouti scheme, 60 Data de-randomization, 91
Antenna diversity systems, 57, 67, Data transmission, 113
87–92 Default modeling parameters, 90
BPS, 58 Designing algorithm, 66
MISO, 59–61 Direct sequence spread spectrum, 56
OFDM technique, 58 Discrete multi-tone (DMT), 57
SISO, 58
SNR, 59, 60
Antenna diversity technique, 85 F
Antenna separation orientation, 57 Fourth generation (4G), 13
Automatic Re-transmission Request Frequency division duplex system, 55
(ARQ), 20
AWGN channel, 90
BER calculation, 91 G
convolution decoding, 90 Gaussian noise, 59
initialization, 92
MISO antenna diversity, 93
M-QAM demodulation, 90 I
OFDM receiver, 90 Interleaving scheme, 56
SIMO antenna diversity system, 93 Internet protocol (IP), 19
Intersymbol interference (ISI), 56, 62
B
BER calculator, 109, 110 M
Bit error rate (BER), 58, 64 Matrix A MIMO system, 61
SER, 64 Matrix B MIMO system, 62
SNR graph, 65, 66 Maximum Ratio Combining (MRC), 18
T WiMAX-MIMO system, 99
Test input image, 102 Wireless communication, 3, 5, 113
Test speech signal, 102 Wireless system generation, 5
Time diversity, 54, 55 Wireless technologies, 5
Worldwide interoperability for microwave
access (WiMAX)
V backup links, 14
Vector summation, 53 channel
Viterbi decoder BER, 21
“block interleaver”, 28 framework, 24
information and diminishes, 27 parameters, 25
“Insert Zeros”, 27 simulation model, 25
simulation model, 27 SNR, 25
WGN, 24
chipsets, 14
W IEEE 802.16 for metropolitan area
Wave propagation, 53, 54 network, 14
Wi-Fi hotspots, 5 IEEE 802.16 for metropolitan space
WiMAX system, 113 network, 15
algorithm, 85 MAC, 17
antenna diversity, 99 MAN, 14
AWGN channel, 104 physical layer
BER vs. SER curve, 93 block interleaving, 17
communication, 94 forward error correction, 17
convolution encoding, 88 frequency diversity, 17
data generation, 88 M-QAM technique, 17
data initialization, 87 OFDM technique, 17
data interleaving, 89 randomization, 16
deframing, 107 space diversity, 17
framework, 2 time diversity, 17
fundamental data, 1 proprietary solutions, 14
IEEE, 3 real-time image transmission
MIMO antenna diversity, 93 BER calculation, 39
MIMO framework, 4 channel disturbances, 45
MIMO innovation, 4 comparing, 51
mobile technology, 1 example, 32
NLOS task, 5 framework, 47
OFDM receivers, 105 input image, 31
OFDM transmitters, 103, 105 input image data, 47
OFDM, 5 input image viewer, 32
parameters, 25, 100–101 input QAM symbols, 31
performance, 94 methodology, 32
prototype model, 2 output data, 32
QAM symbols, 99, 103, 108, 110 output image, 35
real-time speech signal output image viewer, 34
transmission, 109 output QAM symbols, 44
real-time speech signal, 105 simulation model, 34
SIMO antenna diversity, 92 system model, 50
simulation, 2 receiver
transmission, 5 BER calculation, 28, 29
WiMAX-MIMO system, 104 de-randomizer, 28, 38
wireless and cellular systems, 3 output data, 28
wireless channel, 85 QAM demodulator, 26, 27
118 Index