Implement Wimax by Matlab
Implement Wimax by Matlab
E389
Institut für Nachrichtentechnik und Hochfrequenztechnik
von
Amalia Roca
Matrikelnr.: 0526852
San Antonio 4, 12596 Torreblanca
Castellón - Spain
Amalia Roca
Vienna, February 2007
i
Acknowledgements
I would like to acknowledge many people who helped me during the course
of this work, supporting it in one way or another. First and foremost, my
appreciation and thanks go to my family. In particular, I can never thank my
parents enough for their commitment, sacrifice, and overalls, their consistent
encouragement and support.
I wish to express my gratitude to my supervisor, Christian Mehlführer,
for his seasoned guidance. Without his helpful suggestions this thesis could
not be done. I also want to thank the people I met during my stay in Vienna
and my colleagues at UPV for their friendship, help, and cheerfulness. I
could not possibly forget M.J, and C. and the rest of A.C. Thank you for
your support when my confidence was down.
Last, but not least, I want to mention A.F., who would be very proud of
me to see that, at the end, all the efforts have their recompense.
ii
Abstract
iii
Contents
1 Introduction 1
1.1 The WiMAX standard . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Technical overview . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Relationship with other wireless technologies . . . . . . 8
1.2 Outline of the thesis . . . . . . . . . . . . . . . . . . . . . . . 11
2 Transmitter 14
2.1 Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2 Encoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.2.1 Reed-Solomon encoder . . . . . . . . . . . . . . . . . . 17
2.2.2 Convolutional encoder . . . . . . . . . . . . . . . . . . 19
2.2.3 Puncturing process . . . . . . . . . . . . . . . . . . . . 20
2.2.4 Interleaver . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.3 Modulation mapper . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4 Pilot symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.5 Training sequences . . . . . . . . . . . . . . . . . . . . . . . . 24
2.6 Assembler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.7 The guard bands . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.8 Inverse Fast Fourier Transform algorithm . . . . . . . . . . . . 28
2.9 The cyclic prefix . . . . . . . . . . . . . . . . . . . . . . . . . 28
3 Channel 30
3.1 Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.2 Fading channel models . . . . . . . . . . . . . . . . . . . . . . 33
3.2.1 Description of the fading channel . . . . . . . . . . . . 33
3.2.2 Flat fading . . . . . . . . . . . . . . . . . . . . . . . . 37
3.2.3 Frequency-selective fading . . . . . . . . . . . . . . . . 38
3.2.4 Channel model implementation . . . . . . . . . . . . . 38
iv
3.3 The I-METRA channel model . . . . . . . . . . . . . . . . . . 42
4 Receiver 43
4.1 Fast Fourier Transform algorithm . . . . . . . . . . . . . . . . 44
4.2 Removing the guard bands . . . . . . . . . . . . . . . . . . . . 44
4.3 Disassembler . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.4 Channel estimator . . . . . . . . . . . . . . . . . . . . . . . . 44
4.5 Demapper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4.5.1 Hard Demapping . . . . . . . . . . . . . . . . . . . . . 46
4.5.2 Soft demapping . . . . . . . . . . . . . . . . . . . . . . 47
4.6 Decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.6.1 Deinterleaving . . . . . . . . . . . . . . . . . . . . . . . 50
4.6.2 Inserting zeros . . . . . . . . . . . . . . . . . . . . . . . 50
4.6.3 Viterbi decoder . . . . . . . . . . . . . . . . . . . . . . 50
4.6.4 Reed-Solomon decoder . . . . . . . . . . . . . . . . . . 52
5 MIMO transmission 53
5.1 MIMO communications theory . . . . . . . . . . . . . . . . . . 53
5.1.1 The MIMO channel model . . . . . . . . . . . . . . . . 54
5.1.2 Space-Time Coding . . . . . . . . . . . . . . . . . . . . 56
5.1.3 Maximum Ratio Combining . . . . . . . . . . . . . . . 60
5.2 MIMO implementation . . . . . . . . . . . . . . . . . . . . . . 61
5.2.1 Transmitter . . . . . . . . . . . . . . . . . . . . . . . . 62
5.2.2 Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . 64
7 Simulation results 73
7.1 A single antenna transmission . . . . . . . . . . . . . . . . . . 73
7.1.1 Modulation schemes and coding rates . . . . . . . . . . 74
7.1.2 Types of channel fading . . . . . . . . . . . . . . . . . 76
v
7.1.3 Demapping and channel estimation . . . . . . . . . . . 77
7.1.4 AMC and its effects in the results . . . . . . . . . . . . 80
7.2 Multiple antenna transmission . . . . . . . . . . . . . . . . . . 83
7.2.1 SISO, SIMO, MISO, and MIMO systems . . . . . . . . 83
7.2.2 Channel model scenarios . . . . . . . . . . . . . . . . . 85
8 Conclusion 86
A OFDM theory 89
A.1 Multicarrier modulation . . . . . . . . . . . . . . . . . . . . . 89
A.2 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
A.3 Cyclic Prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
A.4 The OFDM system model . . . . . . . . . . . . . . . . . . . . 93
A.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
B Derivation of formulas 95
B.1 Description of the correlation matrices . . . . . . . . . . . . . 95
B.2 Estimation of the transmitted symbols when using STC . . . . 97
B.2.1 Alamouti with one receive antenna . . . . . . . . . . . 97
B.2.2 Alamouti with two receive antennas . . . . . . . . . . . 99
Bibliography 120
vi
Chapter 1
Introduction
The experienced growth in the use of digital networks has led to the need
for the design of new communication networks with higher capacity. The
telecommunication industry is also changing, with a demand for a greater
range of services, such as video conferences, or applications with multimedia
contents. The increased reliance on computer networking and the Internet
has resulted in a wider demand for connectivity to be provided "any where,
any time", leading to a rise in the requirements for higher capacity and high
reliability broadband wireless telecommunication systems.
Broadband availability brings high performance connectivity to over a
billion users worldwide, thus developing new wireless broadband standards
and technologies that will rapidly span wireless coverage. Wireless digital
communications are an emerging field that has experienced an spectacular
expansion during the last several years. Moreover, the huge uptake rate of
mobile phone technology, WLAN (Wireless Local Area Network) and the
exponential growth of Internet have resulted in an increased demand for new
methods of obtaining high capacity wireless networks [1].
Worldwide Interoperability for Microwave Access, known as WiMAX, is
a wireless networking standard which aims for addressing interoperability
across IEEE1 802.16 standard-based products. WiMAX defines a WMAN2 ,
a kind of a huge hot-spot that provides interoperable broadband wireless
connectivity to fixed, portable, and nomadic users. It allows communications
which have no direct visibility, coming up as an alternative connection for
cable, DSL3 , and T1/E1 systems, as well as a possible transport network for
Wi-Fi4 hot-spots, thus becoming a solution to develop broadband industry
1
Institute of Electrical and Electronics Engineers
2
Wireless Metropolitan Area Network
3
Digital Subscriber Line
4
Wireless-Fidelity, name given to WLAN IEEE 802.11b standard-based products.
1
CHAPTER 1. INTRODUCTION 2
Feature Benefit
TDM/TDMA scheduled • Efficient bandwidth usage.
uplink/downlink frames
Scalable from one to hundreds • Allows cost effective deployments by
of subscribers supporting enough subscribers to deliver
a robust business case.
Connection-oriented • Per connection QoS.
• Faster packet routing and forwarding.
QoS support • Low latency for delay sensitive services
(TDM, Voice, VoIP).
• Optimal transport for VBR6 traffic (video).
• Data priorization.
Automatic retransmission • Improves end-to-end performance by
request (ARQ) hiding RF layer induced errors from
upper layer protocols.
Support for adaptive • Enables highest data rates allowed by
modulation channel conditions, exploiting system
capacity.
Security and encryption • Protects user privacy.
(TripleDES)
Automatic power control • Enables cellular deployments by
minimizing self-interference.
protocol is quite simple using TDM5 to multiplex the data. However, in the
upstream direction, where multiple SSs compete for accessing to the medium,
the MAC protocol applies a time division multiple access (TDMA) technique,
thus providing an efficient use of the bandwidth.
The services required by the multiple users are varied, including voice
and data, Internet protocol (IP) connectivity, and voice over IP (VoIP). In
order to support this variety of services, the MAC layer must accommodate
both continuous and bursty traffic, adapting the data velocities and delays
to the needs of each service. Additionally, mechanisms in the MAC provide
for differentiated quality of service (QoS) supporting the needs of various
applications.
Issues of transport efficiency are also addressed. Both modulation and
coding schemes are specified in a burst profile that is adjusted adaptively for
each burst to each subscriber station, making the use of bandwidth efficient,
providing maximum data rates, and improving the capacity of the system.
The request-grant mechanism is designed to be scalable, efficient, and self-
5
Time Division Multiplexing
6
Variable Bit Rate
CHAPTER 1. INTRODUCTION 5
• Optional support of smart antennas, whose beams can steer their focus
to a particular direction or directions always pointing at the receiver,
and consequently, avoiding interference between adjacent channels, and
increasing the spectral density and the SNR. There are two basic types
of smart antennas, those with multiple beam (directional antennas),
and those known as adaptive antenna systems (AAS). The first ones
can use either a fixed number of beams choosing the most suitable
for the transmission or an steering beam to the desired antenna. The
second type works with multi-element antennas with a varying beam
pattern. These smart antennas are becoming a good alternative for
BWA10 deployments.
9
Forward Error Correction
10
Broadband Wireless Access
CHAPTER 1. INTRODUCTION 7
Feature11 Benefit
256-point FFT OFDM • Simple equalization of multipath channels in
waveform outdoor LoS and NLoS environments.
Adaptive modulation and variable • Ensures a robust RF link while maximizing
error correction encoding the number of bits per second for each
per radio frequency (RF) burst subscriber unit.
TDD and FDD duplexing • Addresses varying worldwide regulations when
support one or both may be allowed.
Flexible channel sizes • Provides the necessary flexibility to operate
(from 1.25 to 20 MHz) in many different frequency bands with
varying requirements around the world.
DFS support • Minimizes interference between adjacent
channels.
Designed to support AAS • Smart antennas are fast becoming more
affordable, and as these costs come down,
their ability to suppress interference and
increase system gain is more important
to BWA deployments.
TDM and FDM support • Allows interoperability between cellular
systems (TDM) and wireless systems (FDM).
Designed to support • Implemented in DL to increase diversity
multiple-input multiple-output and capacity.
(MIMO) schemes • STC algorithms at the transmitter, MRC
at the receiver.
The mobile WiMAX (IEEE 802.16e)12 uses the 2048-point FFT OFDMA
PHY specification. It provides a service area coverage from 1.6 to 5 km,
allowing transmission rates of 5 Mbps in a 5 MHz channel bandwidth, and
with a user maximum speed below 100 km/h. It presents the same features
as those of the fixed WiMAX specification that have been already mentioned.
However, other features such as handoffs and power-saving mechanisms are
added to offer a reliable communication. Battery life and handoff are two
critical issues for mobile applications. On one hand, maximizing battery life
11
All these features are in great detail explained in [5].
12
A complete description of the mobile WiMAX can be found in [6].
CHAPTER 1. INTRODUCTION 8
implies minimizing the mobile station (MS) power usage. On the other hand,
handoff and handovers are necessary to enable the MS to switch from one
BS to another at vehicular speeds without interrupting the connection.
The main features of the initial IEEE 802.16 standard, and those of the
so-called fixed and mobile WiMAX, 802.16-2004 and 802.16e respectively, are
summarized in the following chart:
Table 1.1 - 3: IEEE 802.16, IEEE 802.16-2004, and IEEE 802.16e standards.
Range
Cellular evolution
Rate
Wi-Fi
WiMAX
UMTS
Mobility
Figure 1.1 - 2: WiMAX fills the gap between Wi-Fi and UMTS.
UMTS also in other possible scenarios, where, in general, the costs in the
deployment, maintenance, or just the supply of the service would not be
profitable.
Table 1.1 - 4 gives an overview on the comparison between the mentioned
systems, WiMAX and its two closest competitors, Wi-Fi and UMTS. A
deeper analysis of these three systems will be developed next.
However, WiMAX does not create a conflict with the mentioned Wi-Fi,
as they are complementary technologies. WiMAX provides a low cost way
to backhaul Wi-Fi hot-spots and WLAN points in businesses and homes,
offering a wireless last mile extension for cable and DSL infrastructures.
feedback
19
Additive White Gaussian Noise
20
Bit Error Rate
Chapter 2
Transmitter
This chapter describes the different steps the transmitter performs before
transmitting the data. The functional blocks that compose the transmitter
of the WiMAX simulator are depicted in Figure 2.0 - 1.
Pilot
Input Transmitted
bits Add signal
Encoder Mapper Assembler IFFT256 Add CP
Zeros
Training
First
Reedof all, the data from the source is randomized and afterwards, coded
Convolutional
1
Solomon
and mapped into QAM Puncture Interleaver
Encoder symbols. As previously explained in Chapter 1,
Encoder
the simulator implemented in the thesis works for the WirelessMAN-OFDM
physical (PHY) layer of WiMAX. This PHY layer uses orthogonal frequency
division multiplexing (OFDM) with 256 subcarriers.
Each OFDM2 symbol is composed of 192 data subcarriers, 1 zero DC
subcarrier, 8 pilot subcarriers, and 55 guard carriers. Therefore, a process
of assembling the zero DC subcarrier, data, and pilots is needed to built
the symbols. Furthermore, preambles consisting of training sequences are
appended at the beginning of each burst. These training sequences are used
for performing an estimation of the channel coefficients at the receiver.
1
Quadrature Amplitude Modulation
2
A detailed analysis of the OFDM theory is given in Appendix A.
14
CHAPTER 2. TRANSMITTER 15
2.1 Source
As described in the standard [4], the information bits must be randomized
before the transmission. The randomization process is used to minimize
the possibility of transmissions of non-modulated subcarriers. The process
of randomization is performed on each burst of data on the downlink and
uplink, and on each allocation of a data block (subchannels on the frequency
domain and OFDM symbols on the time domain).
In our case, instead of performing a randomization process, a binary
source that produces random sequences of bits is used. The number of bits
that are generated is specified to be frame-based and is calculated from the
packet size required in each situation. The packet size depends on the number
of transmitted OFDM symbols and the overall coding rate of the system, as
well as the modulation alphabet.
Equation 2.1 - 1 calculates the number of transmitted OFDM symbols in
one frame. It depends on the total number of transmitted symbols, NTsym ,
which also includes the symbols used for the preamble, specified by Ntrain :
In the formula, Tsym is the OFDM symbol time, and Tframe denotes the
frame duration. The expression that defines Tsym as well as the possible
values specified for the frame duration can be found in Section C.1.1.
Once the number of OFDM symbols is known, the number of bits to be
sent by the source is calculated:
Here, R represents the overall coding rate, Ndata is the number of used data
subcarriers, and Ma defines the modulation alphabet, which is specified by
the number of transmitted bits per symbol.
CHAPTER 2. TRANSMITTER 16
2.2 Encoder
As shown in Figure 2.2 - 1, the encoding process consists of a concatenation of
an outer Reed-Solomon (RS) code and an inner convolutional code (CC) as a
FEC scheme. That means that first data passes in block format through the
RS encoder, and then, it goes across the convolutional encoder. It is a flexible
coding process due to the puncturing of the signal, and allows different coding
rates. The last part of the encoder is a process of interleaving to avoid long
error bursts.
Reed-Solomon Convolutional
Puncture Interleaver
Encoder Encoder
The users report the current channel condition to the base station (BS)
and, based on this report, a specific coding rate is selected for the downlink
data transmissions. Thus, users who experience a "bad" channel condition,
i.e. low SNR, at a given time, will be provided with better error correction
3
Pulse Amplitude Modulation
CHAPTER 2. TRANSMITTER 17
than those users experiencing "good" channel conditions at the same time.
This process is called adaptive modulation and coding (AMC)4 .
In the next sections, each one of the different encoder blocks will be
explained in detail. It will be given a thorough description of how they work
and are implemented in the simulator.
Primitive Polynomial:
p(x) = x8 + x4 + x3 + x2 + 1 (2.2 - 1)
Generator Polynomial:
The primitive polynomial is the one used to construct the symbol field
and it can also be named as field generator polynomial. The code generator
polynomial is used to calculate parity symbols and has the form specified
as before, where λ is the primitive element of the Galois field over which
the input message is defined. See [9] and [10] for more information about
Reed-Solomon codes.
To make the RS code flexible, i.e. to allow for variable block sizes and
variable correction capabilities, it is shortened and punctured. When a block
is shortened to k bytes, 239 − k zero bytes are added as a prefix, and, after
the encoding process, the 239 − k encoded zero bytes are discarded. Once
the process of shortening has been done, the number of symbols going in and
out of the RS encoder change, and also the number of symbols that can be
corrected, t. With the puncturing, only the first 2t of the total 16 parity
bytes5 shall be employed. Figure 2.2 - 2 shows the RS encoding, shortening,
and puncturing process.
k data bytes
k+2t
k, the number of overall bytes after encoding, n, and the number of data
bytes that can be corrected, t, are the ones specified in Table 2.2 - 1, and
they change for every modulation scheme. Thus, the number of blocks used
in the Reed-Solomon encoder is calculated as
Spacket
NRS = . (2.2 - 3)
8k
A block diagram of the Reed-Solomon encoder implemented in Matlab
Simulink is depicted in Figure 2.2 - 3.
"Reshape 1" arranges the input data of the RS encoder in a matrix form,
where the corresponding number of rows is calculated from the length of
the blocks before encoding, k, and the number of calculated Reed-Solomon
blocks, as specified in Equation 2.2 - 3, determines the number of columns.
Zero padding along columns at the beginning is performed to achieve a length
of 239 bytes for each block. "Reshape 2" shapes out the matrix structure into
a vector6 . Once data has passed through the encoder, the block "Reshape 3"
distributes the output vector of the encoder in a matrix with size 255 × NRS .
The "Select rows"-block deals with selecting the correct amount of bytes
after the encoding process. Thus, the zero prefix is discarded, and data
is punctured by taking only the first 2t bytes of the total parity bytes, as
previously explained. To end, "Reshape 4" rearranges the matrix data in a
column vector, ready for the convolutional coding.
1 1 1 1 0 0 1
X = 171OCT
T T T T T T
Y = 133OCT
1 0 1 1 0 1 1
2.2.4 Interleaver
Data interleaving is generally used to scatter error bursts and thus, reduce
the error concentration to be corrected with the purpose of increasing the
efficiency of FEC by spreading burst errors introduced by the transmission
channel over a longer time. Interleaving is normally implemented by using
a two-dimensional array buffer, such that the data enters the buffer in rows,
which specify the number of interleaving levels, and then, it is read out in
columns. The result is that a burst of errors in the channel after interleaving
becomes in few scarcely spaced single symbol errors, which are more easily
correctable.
WiMAX uses an interleaver that combines data using 12 interleaving
levels. The effect of this process can be understood as a spreading of the bits
of the different symbols, which are combined to get new symbols, with the
same size but with rearranged bits.
The interleaver of the simulator has been implemented in two steps. First,
data passes through a matrix interleaver which performs block interleaving
by filling a matrix with the input symbols row by row, and then sending this
matrix content column by column. The parameters used for this block are
the number of rows and columns that compose the matrix:
Ntcb
Nrows = 12, Ncolumns = .
Nrows
The second step consists of a block interleaver. It rearranges the elements
of its input according to an index vector. This vector is defined as
tcb −1
NX
i iNrows
I= s + mod i + Ntcb − ,s + 1 , (2.2 - 6)
i=0
s Ntcb
where:
• Ntcb is the total number of coded bits,
Ntcb = Ncpc Ntx-data
• Ncpc is the number of coded bits per subcarrier, being the same as
specified with the modulation alphabet, Ma ,
• Ntx-data is the total number of transmitted data symbols, and
Ntx-data = Ndata NOFDM
l m
Ncpc
• s= 2
.
CHAPTER 2. TRANSMITTER 22
-3 -1 1 3
-
-1 1.
-
-7 -5 -3 -1 1 3 5 7
-
√ √
2 2conj(PALL (k)) k mod 4 = 0
PSHORT (k) = (2.5 - 1)
0 k mod 4 6= 0
√
2conj(PALL (k)) k mod 2 = 0
PEVEN (k) = (2.5 - 2)
0 k mod 2 6= 0
√
In both, Equation 2.5 - 1 and Equation 2.5 - 2, a factor of 2 representing
√
a boost of 3 dB appears. Furthermore, there is an additional factor of 2 in
PSHORT which has the aim of equating the root-mean-square (RMS) power
with the power of the data symbols.
7
DownLink
8
UpLink
CHAPTER 2. TRANSMITTER 25
CP 64 64 64 64 CP 128 128
Tg Tb Tg Tb
2.6 Assembler
WiMAX specifications for the 256-point FFT OFDM PHY layer define three
types of subcarriers; data, pilot and null, as shown in Figure 2.6 - 1. 200
of the total 256 subcarriers are used for data and pilot subcarriers, eight of
which are pilots permanently spaced throughout the OFDM spectrum. The
remaining 192 active carriers take up the data subcarriers. The rest of the
potential carriers are nulled and set aside for guard bands and removal of the
center frequency subcarrier.
9
Frame Control Header
CHAPTER 2. TRANSMITTER 26
Pilots
Zero DC
f
The same action occurs with the zero DC, situated in the centered subcarrier,
which is, in this case, the one with index 101.
After this first concatenation, the training symbols are appended at the
beginning of each burst.
data
DC
1 101 201
Figure 2.7 - 1: Structure composed with data, pilots and zero DC subcarriers.
data
DC
guards
data
DC
guards
CP
CP
Tg Tb
Tsym
Tsym = Tb + Tg , (2.9 - 1)
where:
The parameter G defines the ratio of the CP length to the useful symbol
time. When eliminating ISI10 , it has to be taken into account that the CP
must be longer than the dispersion of the channel. Moreover, it should be as
small as possible since it costs energy to the transmitter. For these reasons,
G11 is usually less than 1/4:
Tg
G= . (2.9 - 2)
Tb
10
Inter-Symbol Interference
11
Values for this parameter are specified in Appendix C.
Chapter 3
Channel
When communicating over a wireless radio channel the received signal cannot
be simply modeled as a copy of the transmitted signal corrupted by additive
Gaussian noise. Instead, signal fading, while caused by the time-varying
characteristics of the propagation environment, appears. In this way, short-
term fluctuations caused by signal scattering of objects in the propagation
environment lead to a phenomenon known as multipath propagation. The
time dispersion in a multipath environment causes the signal to undergo
either flat or frequency-selective fading. Furthermore, the time dispersion
is manifested by the spreading in time of the modulated symbols leading to
inter-symbol interference (ISI). In order to avoid ISI in OFDM systems, the
cyclic prefix time has to be chosen larger than the maximum delay spread of
the channel. In addition, root-raised cosine (RRC) filters, usually used for
band-limiting the transmitted signal, are utilized as interpolation filters in
the simulator.
This chapter deals with the modeling, analysis, and simulation of the
channel. It provides a description of the mentioned RRC filters as well as a
brief explanation about the fading characteristics.
As the simulation results depend strongly on the radio channel, it is very
important to use accurate and realistic channel models in the simulation to
enable realistic and reliable results. Thus, the well-known I-METRA channel
model is introduced.
3.1 Filters
Data transmission over band limited channels requires a technique of pulse
shaping at the transmitter. Since the pulse shaping filter does not cause
inter-symbol interference (ISI), this implies the fundamental shapes of the
30
CHAPTER 3. CHANNEL 31
pulses to be such that they do not interfere each other. A criteria that
ensures non-interference specifies the shape of the pulses to be such that its
amplitude decays rapidly outside the pulse interval. A widely used filter for
this purpose is the well known raised cosine filter, which satisfies Nyquist’s
first criterion1 . However, in practical applications the overall magnitude
response of the raised cosine spectrum is equally split between the transmitter
and the receiver, thus obtaining square-root raised cosine filters, also known
as root-raised cosine (RRC) filters. The advantage of such subsystems is that
if the transmit side filter is stimulated by an impulse, then the receive one
is forced to filter an input pulse with a shape that is identical to its own
impulse response, therefore setting up a matched filter and maximizing the
SNR while at the same time minimizing ISI [12].
The RRC filter is generally used in series pairs so that the total filtering
effect is that of a raised cosine filter. Since the frequency response of the
transmit and receive filters is multiplied at the receiver, the receiver sees a
signal that has been filtered by a raised cosine filter overall:
where Tsym is the modulation symbol duration, and Rsym is the symbol rate.
The width of the central frequencies is defined by the roll-off factor, α,
which determines the sharpness of the frequency response and can take values
comprised between 0 and 1. Specifically, α governs the bandwidth occupied
by the pulse and the rate at which the tails of the pulse decay. Figure 3.1 - 1
shows that when α = 0 the frequency response has a form of a rectangle
offering the narrowest bandwidth but the slowest rate of decay in the time
domain. However, when α = 1 the frequency response is completely round
but the impulse response presents the added benefit of rapidly decaying time
domain tails. Therefore, it can be deduced that the smaller the roll-off factor,
the more efficient is the scheme since it gives the narrowest bandwidth.
1.4 1.5
1.2
0.8 1
0.6
h(t)
0.4
0.2 0.5
-0.2
-0.4 0
2 3 4 5 6 7 8 0 0.5 1 1.5 2 2.5 3 3.5
Time
Figure 3.1 - 1: Spectral shape and inverse Fourier transform of the RRC pulse.
The most commonly used design methodology for this kind of filters is
the frequency sampling design, where the frequency response of the filter is
sampled at constant intervals and an inverse fourier transform (IFFT) is
applied to the frequency samples to obtain the filter coefficients. The more
the number of frequency samples, the more will the actual response match
the desired response. That means that if more filter taps are used, a more
accurate response is obtained, and therefore, better rejection is given.
CHAPTER 3. CHANNEL 33
fd = fM cos ϕ, (3.2 - 1)
where:
• fM = fc v/c is the maximum Doppler shift,
αi (t, τ ) and τi (t, τ ) are the delay dependent instantaneous amplitude and
the time delay associated with the i-th multipath component, respectively.
The instantaneous phase shift encountered by the i-th multipath component
due to its delay is represented by the factor 2πfc τi (t), whereas any other
phase alteration experienced by this multipath component is incorporated in
θi (t, τ ). To simplify Equation 3.2 - 4, the phase delays are lumped together
and represented by
Tm
Input
signal
K/(MW) K/(MW) K/(MW)
Channel
+ output
Aditive
noise
where the parameter ρ2 represents the power of the received non-fading signal
component, and I0 is the modified Bessel function of first kind and order zero.
The Ricean distribution is usually expressed with the K-factor defined
as the ratio of the power of the deterministic signal to the variance of the
multipath component:
ρ2
K = 2. (3.2 - 7)
2σ
If K approaches zero, then the Rice distribution degenerates in a Rayleigh
distribution. Thus, when ρ has values near to 0, K is prone to −∞ dB,
and since the dominant path decreases in amplitude, the Rice distribution
becomes a Rayleigh distribution. Furthermore, if K approaches infinity, one
path will contain the whole channel energy, corresponding to a LoS scenario.
and
Tsym > στ . (3.2 - 9)
2
The region of support of a function f (x) is defined as the set χ = x|f (x) 6= 0. The
size of such region is defined to be maxx∈χ (x) − minx∈χ (x).
CHAPTER 3. CHANNEL 38
1 OFDM frame
N OFDM frames
Time-variant channel
As previously explained, the variation in time of the wireless channel is caused
by user mobility and multipath propagation. The impulse response of time-
varying channels is characterized as a time-variant linear filter, h(t, τ ), and a
frequency shift appears in the received signal, fd , when users are in relative
motion.
The time-variant filtering is implemented in the function "tvfilter ", which
convolutes every sample of the transmitted signal with the instantaneous
impulse response. Since such a filtering operation is of very high complexity,
the "time-variant block fading" model was implemented.
To generate the time-varying characteristic of the fading channel [15], the
function "jakes" is used. It utilizes a so-called sum of sinusoids to perform
this operation.
where Cnk , ωnk , and φnk represent the amplitude, frequency, and uniformly
random phase of the n-th complex sinusoid in the k-th fader.
For this situation, ωnk = ωM cos ϕnk , where n = 0, 1, 2, 3, ..., N − 1, and
k = 0, 1, 2, 3, ..., M − 1. Note that ϕnk , that denotes the n-th arrival angle in
the k-th fader, depends on both, the fading waveform and the sinusoid.
The parameter Cnk can be reduced to a constant value by assuming a
uniform antenna gain pattern and uniformly distributed incident power [15]:
1
C=√ . (3.2 - 14)
N
Furthermore, different spectrum shapes are obtained depending on the
values the parameters φnk and ϕnk take. Hence, a flat spectrum, a Jake’s
spectrum, and a Clarke’s spectrum are defined.
- Flat spectrum
The parameter ϕnk takes the values ±π/2 thus making null the operation
cos ϕnk .
Therefore, the exponential describing the fading waveform follows the
next expression:
Xt = exp(j(2πfd t + φnk )). (3.2 - 15)
Streuobjekte
CHAPTER 3. CHANNEL
Sender
bewegter
feststehende
Streuobjekte
41
v Empfänger
The recently mentioned factors are of a random character, i.e. they are described by a random process. The
- probability
Clarke’sdensity
spectrum
funtions (pdf) of these processes are affected by two independent factors:
At the receiving side we encounter the sum of all paths, hence, we are interested in the pdf of that sum. The
For this
pdf of kind
a sum of spectrum,
of statistically independenthowever, theisphase
random processes identical of the
to the sinusoid,
convolution of all φnk , Taking
pdf’s. is zero.
Therefore, the
into account formula
permanently for the
changing fading
echo-paths to be too costly.isThe central limit theorem 1 states that a
proveswaveform
sufficient number of independent random processes are approximating a Gaussian or normal-pdf. According to
its mean the magnitude of a complex-valued Gaussian process is Ricean or Rayleigh distributed, i.e. if a line of
Xt = exp(j(2πf
sight exists the simulation of mobile-channels cos ϕ
demands a dRicean nk )).
process (3.2 - 16)
and a Rayleigh process, respectively,
if no line of sight is available (”worst case”).
Furthermore, the doppler effect plays a crucial role. Arising from the movement between transmitter and
receiver the receiving signal is shifted in frequency domain. The doppler frequency f D in turn is a random
-Jake’s spectrum
process due to the random direction of motion2 of the receiver in regard of the transmitter.
1
10
0
10
S(f ) in dB
-1
10
PSfrag replacements -2
10
-100 -80 -60 -40 -20 0 20 40 60 80 100
f in Hz
The values of the parameters for the three kinds of spectrum already
defined are summarized in Table 3.2 - 1.
Spectrum ϕnk φnk
Flat ±π/2 6= 0
Clarke 6= ±π/2 0
Jake 6= ±π/2 6= 0
3
Simulation results have been performed using this spectrum.
CHAPTER 3. CHANNEL 42
4
The Rician factor, K, utilized when LoS transmissions are being performed, is only
applied for the first tap.
Chapter 4
Receiver
Pilot
Received Output
data Remove Remove bits
FFT256 Disassembler Demapper Decoder
CP zeros
Channel
Training
estimator
43
CHAPTER 4. RECEIVER 44
4.3 Disassembler
The disassembler deals with the task of separating the signal, either in time or
in frequency domain, to get data, training, and pilots. These three different
symbol streams form the output of the disassembler.
yk = pk hk + nk , (4.4 - 1)
where hk is the channel coefficient for the k-th subcarrier, pk is the training
symbol, and nk is a noise symbol.
The LS channel estimates can be obtained by finding the minimum squared
error, as expressed in Equation 4.4 - 2:
where the expressions (·)∗ and (·)−1 denote conjugation and inverse operation,
respectively. This estimator is implemented for all subcarriers where a pilot
symbol unequal to zero is transmitted.
In the simulator, channel estimation is implemented using either the
short, the long or both training symbols. The use of one or another training
sequence depends on the values of the averaging parameters.
The long training used for channel estimation is PEVEN , and as described
in Equation 2.5 - 2, it has null values for the odd indices. If only the long
training sequence is used for channel estimation, Equation 4.4 - 3 results in
hk,LS = 0.25p∗k yk .
b (4.4 - 4)
The short training has values different than zero only for the indices that
are multiple of 4, as defined in Equation 2.5 - 1. Here, Equation 4.4 - 3 reduces
to the expression
hk,LS = 0.125p∗k yk .
b (4.4 - 5)
A better channel estimate can be achieved if averaging in the frequency
domain is performed. This way, the averaging parameter defines how many
subcarriers are taken into account when performing the cited averaging.
While small averaging factors improve the performance in strongly frequency-
selective channels, large averaging factors improve the performance in flat
fading channels.
The two parameters defining the described averaging factors are called
LongAveraging and ShortAveraging, and can be zero or positive. A value
CHAPTER 4. RECEIVER 46
4.5 Demapper
At the receiving end of the communication link the demapper provides the
interface between the transmission channel and the functions that compute
and deliver estimates of the transmitted data bits to the user. Furthermore,
the demapper operates on the waveform that is received in each separate
transmission symbol interval and produces a number or a set of numbers
that represent an estimate of a transmitted binary or M-ary symbol. Thus,
the demapping methods are used for decision metrics with the aim of making
a decision about which bit, "zero" or "one", was transmitted. This decision
metric can be as simple as hard decision, or more sophisticated, being then
a soft decision.
Hard demapping methods output a hard decision as a function of the
input, and this form of output is application-dependent. However, the soft
demapping outputs a real number, in the form of a log-likelihood ratio. This
is the logarithm of the ratio between the likelihood that the target produced
the speech input and the likelihood that a non-target produced the input. In
contrast, this form of output is application-independent in the sense that this
likelihood ratio output can theoretically be used to make optimal decisions
for any given target prior.
dE = |y − hs|. (4.5 - 1)
CHAPTER 4. RECEIVER 47
where σv2 is the noise variance of the signal, and σv the standard deviation.
Thus, Equation 4.5 - 3 yields
n o
1 |hs−y|2
P
s|bk =1 exp − 2 σv2
LLR(bk ) = ln P n o. (4.5 - 4)
1 |hs−y|2
s|bk =0 exp − 2 σ 2
v
2
Probability Density Function
CHAPTER 4. RECEIVER 48
-
The example uses a 4-QAM constellation map, and thed1 received symbol has
11 01
been represented with an "x". Moreover, channel coefficients
-1 - equal to "one"
have been assumed to make the example easier to explain. b b
1 0
The example begins with the calculation of the LLR for the bit b0 , situated
on the right side, as shown in Figure 4.5 - 1.
10 00 10 00
1- 1- d2
x -1 x 1
-1 1. .
-
-
-
d1
11 01 11 01
-1 - -1 -
b1b0 b1b0
(a) (b)
11
d1 is the minimum 01
-1 - distance between the received bit and the points in
the constellation map that b1bhave
0 a bit equal to "one" in the position of the bit
b0 . The same operation is performed for the bit b0 equal to "zero", obtaining
the distance d2 . The numerical values for these distances are d1 = 1.56
and d2 = 0.92. The LLR can be calculated as the difference between both
distances: LLR = d1 − d2 . Replacing the numerical values, it has been
obtained a result of 0.64 for LLR(b0 ).
10 00
1-
d1 x
-1 1.
CHAPTER 4. RECEIVER 49
-
11 01
-1 -
The same steps must be followed to get the LLR value 0 the bit b1 . This
b1bfor
process is depicted in Figure 4.5 - 2. In this case, d1 = 1.43, d2 = 0.92, and
LLR(b1 ) = 0.51.
10 00 10 00
1- 1- d2
d1 x x
-1 1. -1 1.
-
-
11 01 11 01
-1 - -1 -
b1b0 b1b0
Figure 4.5
10 - 2: Example
00 of calculating the LLR for the bit b1 .
1- d2
Both LLR(b-1 0 ) andx LLR(b
1. 1 ) have positive values. Therefore, it can be
-
concluded that the symbol "00" is the one that have been transmitted with
11
the highest probability. 01
-1 -
b1b0
4.6 Decoder
The final stage of receive processing is the decoder. A block diagram of the
decoder is depicted in Figure 4.6 - 1.
The decoder accepts the sequence of bits or LLRs from the demapper
and, in accordance with the encoding method that was used, attempts to
reproduce the information originally generated by the source. Like in the
encoder block, the decoder is also composed of four steps, which perform
diverse operations with the aim of reversing the process done by the encoder.
CHAPTER 4. RECEIVER 50
4.6.1 Deinterleaving
The deinterleaver rearranges the bits from each burst in the correct way by
ordering them consecutively as before the interleaving process. It consists of
two blocks, a general block deinterleaver and a matrix deinterleaver.
These blocks work similarly as the ones used in the interleaver. The
general block deinterleaver rearranges the elements of its input according to
an index vector. The matrix deinterleaver performs block deinterleaving by
filling a matrix with the input symbols column by column, and then, sending
its contents to the output row by row. The parameters used in both blocks
are the same as those ones used in the interleaving process3 .
to advance deeper into the trellis making decisions by eliminating the least
likely paths. The early rejection of unlikely paths is the fact that reduces
the complexity. The goal of selecting the optimum path can be expressed
equivalently as choosing the codeword with the maximum likelihood metric,
or as choosing the codeword with the minimum distance metric.
Furthermore, the delay introduced in the decoding process has to be taken
into account. The rejection of possible paths does not really begin until the
third step in the representation in the trellis diagram. This is due to the fact
that until this time two branches can not have converged in one state, and
thus, no decision can be done. This delay effect is considered in a parameter
called traceback depth, which specifies how many symbols may preceed the
beginning of the algorithm. For code rates of 1/2, a typical value for the
traceback depth is about five times the constraint length of the code.
Another parameters of the Viterbi decoder block of Simulink are the trellis
structure used in the convolutional encoder, the decision type of decoding,
and the operation mode. They are defined as follows:
• The type of signals that can support the Viterbi decoder block are
based on the decision type parameter. This parameter can have three
values: unquantized, hard-decision, or soft-decision.
As the decision process has been implemented in the demapper, the
last kind of decision type, that is the "unquantized", is the one used
in our simulator. It accepts real numbers as inputs for the decoder
block. The positive numbers are interpreted as a logical zero, and the
negative ones, as a logical one. However, when this parameter is set to
"soft-decision", the entries of this block are integers between 0 (most
confident decision for logical zero) and 2b (most confident decision for
logical one), being b the number of soft-decision bits.
• The operation mode parameter controls which method the block uses
for transitioning between successive frames.
The "truncated" mode, in which each frame is treated independently
and the traceback depth parameter starts at the state with the best
metric and ends in the all-zeros state, is the operation mode used in
the simulator.
Other values for this parameter are the "continuous" and "terminated"
modes.
For more details about these parameters consult the documentation help
of Matlab, or see [19].
CHAPTER 4. RECEIVER 52
"Insert zeros 2". "Unbuffer" arranges the data from the matrix structure in
a row vector. It has to be taken into account that this block introduces a
delay equal to one frame in the system. Finally, "Select rows" has the task of
selecting only the k original data bytes, and the "Buffer"-block redistributes
its input samples in a new frame size, kNRS .
4
The sourcecode used to generate a Matlab S-funcion is available from
http://rscode.sourceforge.net and has been published under the Lesser General Public
License (LGPL).
Chapter 5
MIMO transmission
53
CHAPTER 5. MIMO TRANSMISSION 54
s1(t) y1(t)
scattering
s2(t) y2(t)
s(t) .
.
medium .
. y(t)
. .
. .
. .
. .
. .
. .
. .
sNT(t) yNR(t)
NT transmit NR receive
antennas antennas
In order to take the channel correlation into account, which has a strong
impact on the achievable performance of the system, two different spatial
channel models are considered.
CHAPTER 5. MIMO TRANSMISSION 56
1 1
s* s
2 0 2 1
In the first time slot, transmit antennas Tx1 and Tx2 are sending symbols
s0 and s1 , respectively. In the next time slot, symbols −s∗1 and s∗0 are sent,
where (·)∗ denotes complex conjugation. Each symbol is multiplied by a
factor of a squared root of two in order to achieve a transmitted average power
of one in each time step. Furthermore, it is supposed that the channel, which
has transmission coefficients h1 and h2 , remains constant and frequency flat
over the two consecutive time steps.
The received vector, r, is formed by stacking two consecutive received
data samples in time, resulting in
1
r = √ Sh + n, (5.1 - 6)
2
(f1) (f0)
t1 t0
-1 1
s* s
2 1 2 0
Input Output
s = (s0s1) (r0r1)T
1 1
s* s
2 0 2 1
Vectors h1 = [h11 , h12 , ..., h1NR ]T and h2 = [h21 , h22 , ..., h2NR ]T contain the
channel coefficients corresponding to the transmission from antenna Tx1 and
antenna Tx2 to every receive antenna, respectively.
As in the previous section, the received vector is
y0 r0 1 h1 h2 s0 n0
= =√ + , (5.1 - 14)
y1 r∗1 ∗
2 h2 −h1
∗
s1 n∗1
h1*
n0
s1·h1 s1·|h1|2+n0h1*
h1
s1 s1h2+n0h1*+n1h2*
n1
h2
s1·h2 s1·|h2|2+n1h2*
h2*
yi = hi s + ni , i = 1, 2, · · · , NR , (5.1 - 17)
CHAPTER 5. MIMO TRANSMISSION 61
where hi and ni are the channel coefficients and the noise experienced by
antenna i, respectively, s is the transmitted signal, and NR is the number of
receive antennas. Moreover, it is considered that the antennas are sufficiently
spaced from each other and the channel coefficients, affected by fading, can
be assumed to be independent.
The weighted combination for the input antennas to be taken into account
is expressed as follows:
NR
X NR
X NR
X
y= βi yi = s βi hi + βi ni . (5.1 - 18)
i=1 i=1 i=1
5.2.1 Transmitter
Pilot
from to
Encoder Add Zeros
Mapper STC Assembler
Training0
Training1
STC block
This block performs the Alamouti algorithm described in Equation 5.1 - 11.
As explained, the basic Alamouti scheme transmits two complex symbols,
s0 and s1 , using the multiple-input single-output channel twice with channel
vector values h1 and h2 . During the first channel use antenna Tx1 transmits
s0 , and antenna Tx2, s1 . In the following channel use, symbols −s∗1 and s∗0
are transmitted from Tx1 and Tx2 respectively.
Pilot symbols
On a given pilot subcarrier, the same pilot symbol is used for the STC block.
The pilot symbol for pilot subcarrier "s" obtained after it has been 2-PAM
modulated is ps , and the OFDM symbols that enter into the STC block are
symbols "k" and "k+1". The standard [4] specifies that the modulation on
pilot subcarrier "s" during the transmission of symbol "k" shall be ps on both
transmit antennas. Nevertheless, during symbol "k+1", the modulation on
the pilot subcarrier shall be −ps for antenna 1, and ps for antenna 2.
Antenna 1 Antenna2
symbol k pilot ps pilot ps
symbol k + 1 pilot −ps pilot ps
CHAPTER 5. MIMO TRANSMISSION 63
Preambles
Two long training sequences are needed when using the MIMO transmission.
As explained in Section 2.5, preambles for DL transmissions are composed of
three consecutive OFDM symbols. The first one, set according to the short
training PSHORT , is used for synchronization. The second symbol uses a long
training sequence, necessary in the receiver for channel estimation. The first
antenna transmits the sequence PEVEN as long training sequence, and the
second antenna transmits the sequence PODD . As in the SISO case, the last
symbol of the preamble is the FCH.
The following expressions describe the idea already explained:
Assembler
frequency
S0 = (s0,1 s0,2 s0,3 … s0,n-1 s0,n) S1 = (s1,1 s1,2 s1,3 … s1,n-1 s1,n)
t0 ... ...
-
t1 ... ...
-S1* = (-s1,1* -s1,2* -s1,3* … -s1,n-1* -s1,n*) S0* = (s0,1* s0,2* s0,3* … s0,n-1* s0,n*)
S2 S3
t2 ... ...
-S3* S2*
t3 ... ...
The assembling process for the MIMO system is very similar to the SISO
transmission explained in Section 2.6.
For a better understanding, the STC usage with the OFDM symbols is
illustrated in Figure 5.2 - 2. During the first time step, symbols S0 and S1 are
sent simultaneously from antenna 1 and antenna 2, respectively. Following
CHAPTER 5. MIMO TRANSMISSION 64
the Alamouti algorithm, the OFDM symbols −S1∗ and S0∗ are sent in the next
time step. The same operations are performed for the next time intervals,
thus the symbol pair (S2 , S3 ) is sent during the time steps t2 and t3 , and so
on.
On the other hand, the pilot symbols are inserted between the OFDM
symbols as previously explained. Antenna 1 transmits ps and −ps in time
steps t0 and t1 , respectively. However, only ps is transmitted from antenna
2 during both time intervals.
5.2.2 Receiver
At the receiver only the blocks described in the following have to be changed
to allow detection of Alamouti coded signals.
Disassembler
When implementing the MIMO disassembler it has to be taken into account
that, although from different antennas, two OFDM symbols are transmitted
in each time interval. Each OFDM symbol is processed as a matrix, where
each row represents a subcarrier. In this way, 3D-matrices would be needed
in order to also specify, in this case, the antenna from where the OFDM is
being transmitted in each time step. However, Simulink does not support
3D-matrices, and therefore, these OFDM symbols of different antennas are
processed consecutively.
The mentioned disassembling process separates first the two transmitted
OFDM symbols, and next, performs the separation of training sequences,
pilot subcarriers, and DC subcarrier from the original data subcarriers, as
explained in Section 4.3.
Channel estimator
The estimated channel coefficients are calculated for each receive antenna as
explained in Section 4.4. Moreover, two long training sequences, PEVEN and
PODD , are used when applying MIMO transmissions, and so, both have to be
considered for the channel estimation. If only one transmit antenna exists,
the channel estimation is performed using the sequence PEVEN . However,
when the two transmit antennas are being used, the second antenna will
estimate its channel coefficients with PODD . This is possible because PEVEN
CHAPTER 5. MIMO TRANSMISSION 65
uses only even subcarriers and PODD only odd subcarriers, making the OFDM
symbols PEVEN and PODD orthogonal.
Demapper
The aim of the demapper is determining the symbol that was transmitted.
With this purpose, decision metric algorithms are developed. Both hard
demapping and soft demapping are implemented as described in Section 4.5.
However, the estimate of the received signal has to be calculated first, and
depending on the diversity scheme, this calculation is performed in a different
way.
When a scheme with two transmit antennas and only one receive antenna
is being used, the receive estimates are calculated from Equation 5.1 - 13:
1
sb = √ h2 s + HH
νne.
2
On the other hand, when there is one transmit antenna and two receive
antennas, the estimate of the received signal is obtained following the MRC
formula:
sb = s1 h2 + n0 h∗1 + n1 h∗2 ,
where h2 = |h1 |2 + |h2 |2 .
Finally, when two antennas at both ends of the communication system
are used, the estimation is performed as in Equation 5.1 - 15:
1
sb = √ h2 s + HH
νne.
2
The growing demand of all types of services, not only voice and data but
also multimedia services, aims for the design of increasingly more intelligent
and agile communication systems, capable of providing spectrally efficient
and flexible data rate access. These systems are able to adapt and adjust the
transmission parameters based on the link quality, improving the spectrum
efficiency of the system, and reaching, in this way, the capacity limits of the
underlying wireless channel. Link adaptation techniques, often referred to
as adaptive modulation and coding (AMC), are a good way for reaching the
cited requirements. They are designed to track the channel variations, thus
changing the modulation and coding scheme to yield a higher throughput by
transmitting with high information rates under favorable channel conditions
and reducing the information rate in response to channel degradation.
This chapter is focused on the implementation of such techniques. A
theoretical explanation, necessary to understand the operation principles of
adaptive modulation and coding, is briefly given. Also a performance analysis
of the AMC scheme implemented in the simulator is furthermore presented
in this chapter.
66
CHAPTER 6. ADAPTIVE MODULATION AND CODING 67
4-QAM 64-QAM
2-PAM 16-QAM
Parameter adaptation
The choice of the appropriate modulation and coding mode to be used in the
next transmission is made by the transmitter, based on the prediction of the
channel conditions for the next time interval. An SNR threshold such that
it guarantees a BER below the target BER, BER0 , is defined by the system
for each scheme whenever the SNR is above the SNR threshold.
The SNR thresholds are obtained from the BER vs. SNR characteristics
of a modulation mode on an AWGN channel. As outlined in Figure 6.1 - 2,
the method consists on splitting the SNR range into N + 1 SNR regions by
N + 2 SNR thresholds, {γ}N +1
n=0 , with γ0 = 0 and γN +1 = ∞.
Each of the N schemes is then assigned to operate within a particular
SNR region. When the SNR γ falls within the SNR region γn ≤ γ ≤ γn+1 ,
the associated channel state information is sent back to the transmitter. The
transmitter then adapts its transmission rate and coding and modulation
schemes by transmitting with a modulation scheme such that it guarantees
a BER below BER0 . This enables the system to transmit with high spectral
efficiency when the SNR is high, and to reduce the spectral efficiency as the
SNR decreases.
CHAPTER 6. ADAPTIVE MODULATION AND CODING 69
0
10
2-PAM
4-QAM
-1
10 16-QAM
64-QAM
-2
10
BER0
BER
-3
10
γ1 γ2 γ3 γ4
-4
10
-5
10
-6
10
-5 0 5 10 15 20 25 30
SNR(dB)
Figure 6.1 - 2: BER vs. SNR relationship and corresponding SNR thresholds
for N coding and modulation schemes employed by AMC.
Feedback mechanism
Once the receiver has estimated the channel SNR, converted it into BER
information for each mode candidate, and, based on a target BER, selected
the mode that yields the largest throughput while remaining within the BER
target bounds, it has to feed back the selected mode to the transmitter in
order that the adaptation can be performed.
However, the challenge associated with adaptive modulation and coding
is that the mobile channel is time-varying, and thus, the feedback of the
channel information becomes a limiting factor. Therefore, the assumption of
a slowly-varying as well as a reliable feedback channel is necessary in order to
achieve an accurate performance of the AMC scheme. In this way, no delay or
transmission error can occur in the feedback channel so that no discrepancy
between the predicted and the actual SNR of the next frame appears.
Moreover, the receiver must also be informed of which demodulator and
decoding parameters to employ for the next received packet.
estimator also estimates the corresponding SNR. On the other hand, a new
block is introduced with the aim of deciding the modulation and coding
mode to be switched at the transmitter. Furthermore, as appreciated in
Figure 6.2 - 1, not only the encoder and mapper in the transmit side but also
the decoder and demapper in the receiver are grouped into a unique block,
which implementation and function will be later discussed.
C1
C2
C3
C4
C5
C6
C7
AM
AM
AM
AM
AM
AM
AM
AM
0
10
AMC1
AMC2
AMC3
AMC4
AMC5
-1
AMC6
Coded BER
10 AMC7
Target BER
-2
10
-5 0 5 10 15 20 25
Channel SNR [dB]
Simulation results
In this chapter, simulation results will be presented along with the underlying
assumptions. The goal is to evaluate the performance of the simulator as well
as to obtain a more accurate understanding of the operation of the WiMAX
system. Through numerous comparisons between simulation results obtained
with different simulation parameters, some discussions about the use of these
different parameters and options are given with the purpose of offering a
complete view on the better manner of performance of the transmission.
Thus, not only the two demapping methods but also the impact of the channel
estimation are analyzed. Furthermore, the transmission gain obtained when
using multiple antennas instead of only a single antenna at one or both ends
of the transmission link is also examined. The different channel models and
scenarios are applied in different simulations so that the fading phenomenon
can be studied. To end, results when activating the AMC mechanism are
offered, thus showing the mentioned increase in spectral efficiency and data
throughput.
73
CHAPTER 7. SIMULATION RESULTS 74
0
10
−1
10
Uncoded BER
−2
10
−3
10 2−PAM
4−QAM
16−QAM
64−QAM
−4
10
−20 −15 −10 −5 0 5 10 15 20 25
Channel SNR [dB]
The curves show the BER as a function of the bit energy to noise rate
(Eb /N0 ), which is a measure of the energy efficiency of a modulation scheme.
If a higher Eb /N0 is needed to transfer data for a given modulation scheme,
it means that more energy is required for each bit transfer. Low spectral
efficiency modulation schemes, such as 2-PAM and 4-QAM, require a lower
CHAPTER 7. SIMULATION RESULTS 75
Eb /N0 , and hence, are more energy efficient and less vulnerable to bit errors.
Furthermore, the BER versus the SNR can be calculated from Eb /N0 . The
SNR for each modulation takes into account the number of bits per symbol,
and so, the signal power corresponds to the energy per bit times the number
of bits per symbol.
0
10
AMC1
AMC2
AMC3
AMC4
AMC5
AMC6
Coded BER
−1
10 AMC7
−2
10
−5 0 5 10 15 20 25
Channel SNR [dB]
where Pbc is the probability of bit error per carrier, Ma defines the modulation
alphabet, and Q(x) is related
2 to the complementary
Gaussian error function
1
R∞ −x 1 x
by Q(x) = √2π x exp 2 dx = 2 erfc √2 , which is the probability that
a Gaussian distributed variable x0 is larger than x.
Therefore, the probability of bit error is calculated as
Pb = 1 − (1 − Pbc )2 . (7.1 - 2)
subcarriers (data and pilots) to the data subcarriers, and 33/32 represents
the relationship between the data symbol with and without adding the cyclic
prefix, which, in this case, is defined by G = 1/32.
A comparison between all different modulation schemes and coding rates
is given in Figure 7.1 - 2, where the coded BER vs. SNR curves have been
plotted. It can be noticed that the higher the code rate, the more the curves
are shifted to the right, and as it has been discussed for the uncoded BER
curves, the higher the modulation scheme, the higher the bit error rate.
Block fading
TV block fading
TV fading
−1
10
Coded BER
−2
10
−3
10
−4
10
−5 0 5 10 15 20
Channel SNR 100 [dB]
Also discussed in this section is the velocity of the user terminal, analyzed
next. With this purpose, the following graphics show the performance of the
CHAPTER 7. SIMULATION RESULTS 77
system not only for the uncoded BER curves, but also for the coded BER
curves, when passing the signal through a time-variant channel, in scenario F.
The parameters used in this simulations are soft demapping, perfect channel
knowledge, and AMC3.
0 0
10 10
v=0 km/h v=0 km/h
v=30 km/h v=30 km/h
v=100 km/h −1 v=100 km/h
10
−1
10
Uncoded BER
−2
Coded BER
10
−3
10
−2
10
−4
10
−3 −5
10 10
−5 0 5 10 15 20 −5 0 5 10 15 20
Channel SNR [dB] Channel SNR [dB]
(a) (b)
Figure 7.1 - 4: BER vs. SNR curves in a time-variant channel for scenario F.
0
10 0
10
Hard demapping
Soft demapping
Perfect channel
LS estimation
−1
10 −1
10
Coded BER
Coded BER
−2
10 −2
10
−3
10 −3
−3 −2 −1 0 1 2 3 4 5 10
−3 −2 −1 0 1 2 3 4 5 6
Channel SNR [dB]
Channel SNR [dB]
(a) Hard demapping vs. soft demapping. (b) Perfect channel knowledge vs. least-
squares channel estimation.
−1
10
Coded BER
−2
10
Figure 7.1 - 6: Comparison between hard and soft demapping and channel
estimation in an AWGN channel.
same way, if soft demapping is combined with LSE1 , the gain obtained with
the soft demapping is damaged by the application of the least-squares channel
estimation, and only 1 dB of gain in SNR is achieved.
In addition to this, both demapping and channel estimation is analyzed
for the block fading channel. As in the AWGN channel, the comparison
between the demapping methods is performed with a perfect knowledge of
the channel, and the one for channel estimation, using hard demapping.
The following figures analyze not only both demapping methods but also
the channel estimation results in scenario F. They show that the gain obtain
with soft demapping increases as the SNR increases. The same occurs with
the gain obtained when using perfect channel knowledge instead of least-
squares channel estimation. Therefore, the receiver is able to better utilize
the diversity of the frequency-selective channel.
0 0
10 10
Hard demapping Perfect channel
Soft demapping LS estimation
−1
10
Coded BER
Coded BER
−1
10
−2
10
−3 −2
10 10
0 5 10 15 20 25 0 5 10 15 20 25
Channel SNR [dB] Channel SNR [dB]
(a) Hard demapping vs. soft demapping. (b) Perfect channel knowledge vs. least-
squares channel estimation.
1
Least-Squares Estimation
CHAPTER 7. SIMULATION RESULTS 80
0
10
70
Without AMC
With AMC Without AMC
With AMC
60
−1
10
Throughput [Mbps]
50
Coded BER
40
−2
10
30
20
−3
10
−5 0 5 10 15 20 25 10
−5 0 5 10 15 20 25
Channel SNR [dB]
Channel SNR [dB]
(a) Coded BER vs. SNR curves. (b) Throughput vs. SNR curves.
Figure 7.1 - 8: Comparison between results obtained with and without using
the AMC scheme.
as the channel SNR is higher, higher AMC schemes are used to give us the
best spectral efficiency while providing the desired BER performance.
In the same way, the chart shows the SNR ranges for a given target BER
of 10−2 . In this case the SNR thresholds are shifted to the right (higher
SNR) due to decreasing nature of the BER curves with the SNR. Therefore,
as Figure 7.1 - 9 shows, if the target BER is higher, the performance of the
system will be worse as worse channel quality conditions (higher target BER
to guarantee a BER below it) are required. However, it can be seen that
the target BER is not achieved. The channel fading is so fast (low temporal
correlation and short coherence time) that the SNR varies too much during
the transmission of each codeword, and therefore, more effort should be spent
on optimizing the AMC mechanism.
0
10
Target BER=1e−1
Target BER=1e−2
Coded BER
−1
10
−2
10
0 2 4 6 8 10 12 14 16 18 20
Channel SNR [dB]
Figure 7.1 - 9: The influence of the target BER in the AMC mechanism.
CHAPTER 7. SIMULATION RESULTS 82
Another aspect to take into account is the velocity of the user. Since
the channel conditions change more rapidly when the user moves faster, the
AMC mechanism needs to shift from one mode to another more often to
follow the variations of the channel. On the other hand, the feedback of the
channel information to the transmitter becomes a limiting factor as while
it is being performed, the channel conditions change continuously. Thus it
can be thought, as Figure 7.1 - 10 shows, that better results are obtained if
the velocity of the user is smaller. The setting parameters for this curves
are time-variant block fading channel, scenario B, soft demapping, and least-
squares channel estimation.
0 80
10
v=3 km/h v=3 km/h
v =100 km/h 70 v=100 km/h
60
Throughput [Mbps]
−1
10
Coded BER
50
40
−2
10
30
20
−3 10
10 −10 −5 0 5 10 15 20 25
−10 −5 0 5 10 15 20 25
Channel SNR [dB] Channel SNR [dB]
(a) Coded BER vs. SNR curves. (b) Throughput vs. SNR curves.
Figure 7.1 - 10: AMC results for a time-variant block fading channel with
different user velocities.
0
10 0
10
Soft demapping Perfect channel
Hard demapping LS estimation
Coded BER
Coded BER
−1
10 −1
10
−2
10 −2
−5 0 5 10 15 20 25 10
0 2 4 6 8 10 12 14 16 18 20
Channel SNR [dB] Channel SNR [dB]
(a) Comparison between hard and soft (b) Comparison between perfect channel
demapping. knowledge and channel estimation.
Figure 7.1 - 11: Demapping and channel estimation when using the AMC
scheme.
• fc =2 GHz
• BW =20 MHz
• G=1/32
• AMC=3
0
10
1x1
2x1
1x2
2x2
Diversity 1
−1
10
Coded BER
−2
Diversity 4 Diversity 2
10
Diversity 2
−3
10
−5 0 5 10 15 20 25
Channel SNR [dB]
28
26
Trhoughput [Mbps]
24
22
20
1x1
18 1x2
2x1
2x2
16
−5 0 5 10 15 20 25
Channel SNR [dB]
−2
10
−3
10
−4
10
−5 0 5 10 15
Channel SNR [dB]
Conclusion
86
CHAPTER 8. CONCLUSION 87
OFDM theory
89
APPENDIX A. OFDM THEORY 90
Nc subcarriers
Δf = /Nc
...
A.2 Orthogonality
In order to assure a high spectral efficiency the subchannel waveforms must
have overlapping transmit spectra. Nevertheless, to enable simple separation
of these overlapping subchannels at the receiver they need to be orthogonal.
Orthogonality is a property that allows the signals to be perfectly transmitted
over a common channel and detected without interference. However, loss
of orthogonality results in blurring between these information signals and
degradation in communication.
Set of functions are orthogonal to each other if they match the conditions
in Equation A.2 - 1. It means that if any two different functions within a
set are multiplied and integrated over a symbol period, the result is zero for
orthogonal functions:
Z T
C i=j
Si (t)Sj (t)dt = (A.2 - 1)
0 0 i 6= j.
Furthermore, a general set of orthogonal waveforms is given by
(
√ 1 exp(j2πfk t) t[0, Tsym ]
ψk (t) = Tsym (A.2 - 2)
0 otherwise,
with fk = f0 + k∆f , being k = 0, 1, ..., Nc − 1.
In Equation A.2 - 2, fk represents the subcarrier frequency, and f0 is the
lowest frequency used, corresponding to the index k = 0. The inter-carrier
APPENDIX A. OFDM THEORY 91
spacing must satisfy ∆f = 1/Tsym = R/Nc , where Tsym is the symbol period
described above.
Each OFDM subcarrier has a sinc(x)1 frequency response. This is the
result of the symbol time corresponding to the inverse of the carrier spacing.
The sinc shape has a narrow main lobe with many side lobes that decay
slowly with the magnitude of the frequency difference away from the centre.
Each carrier has a peak at its centre frequency and nulls evenly spaced with
a frequency gap 1.2
equal to the carrier spacing.
1
0.8
0.6
0.4
0.2
-0.2
-0.4
Figure
-5 -4
A.2-3- 1: -2Spectrum
-1 0
of1 an2 OFDM
3 4
signal.
5 6
CP
CP
Tg Tb
Tsym
CP
x0,m y0,m
w(n) D
M E
I U h(n) M
. . X s(n) r(n) U F .
F .
. . X F .
F .
. . T .
T .
xNc-1,m yNc-1,m
A.5 Summary
After the explanation given about OFDM, it can be said that OFDM is
a wideband modulation scheme that is specifically able to cope with the
problems of the multipath reception. This is achieved by transmitting many
narrowband overlapping digital signals in parallel, inside one wide band.
Increasing the number of parallel transmission channels reduces the data
rate that each individual carrier must convey, and that lengthens the symbol
period. As a result, the delay time of reflected waves is suppressed to within
one symbol time.
The basics that have been explained, as well as the OFDM system model,
are derived for a time-invariant channel. When working with time-variant
channels, the variations erode the orthogonality of the subcarriers and cause
ICI or "FFT leakage". In those cases, a more complex system is needed to
model such behaviour [32] [33].
Appendix B
Derivation of formulas
s1(t) y1(t)
scattering
s2(t) y2(t)
s(t) .
.
medium .
. y(t)
. .
. .
. .
. .
. .
. .
. .
sNT(t) yNR(t)
NT transmit NR receive
antennas antennas
95
APPENDIX B. DERIVATION OF FORMULAS 96
and sm (t) and yn (t) are the signals at the m-th transmit antenna port and
at the n-th receive antenna port, respectively.
The flat fading MIMO radio channel describing the connection between
transmitter and receiver can be expressed as
α11 α12 · · · α1NT
α21 α22 · · · α2NT
H = .. , (B.1 - 1)
.. ... ..
. . .
αNR 1 αNR 2 · · · αNR NT
Assuming that all antenna elements have the same polarization and the
same radiation pattern, the spatial complex correlation coefficient at the
transmitter between antennas m1 and m2 is given by Equation B.1 - 3, where
the spatial correlation coefficient at the transmitter, ρTXm1 m2 , is assumed to
be independent of n. Similarly, the spatial complex correlation coefficient
observed at the receive side, ρRX
n1 n2 , defined in Equation B.1 - 4, is assumed to
be independent of m:
ρTX
m1 m2 = hαnm1 , αnm2 i, (B.1 - 3)
ρRX
n1 n2 = hαn1 m , αn2 m i. (B.1 - 4)
The operation ha, bi1 denotes an inner product between a and b, and is
calculated as ha, bi = E{ab∗ }/(σa σb ), where σa is the standard deviation of
the variable a, and (·)∗ performs the conjugation operation.
The symmetrical complex correlation matrices can be defined from both,
Equation B.1 - 3 and Equation B.1 - 4:
ρTX
11 ρTX
12 · · · ρTX
1NT
ρTX∗ ρTX · · · ρTX
21 22 2NT
RT = .. .. .. .. , (B.1 - 5)
. . . .
ρTX∗ TX∗ TX
NT 1 ρNT 2 · · · ρNT NT N ×N
T T
1
ha, bi=hb, ai∗
APPENDIX B. DERIVATION OF FORMULAS 97
ρRX
11 ρRX
12 ··· ρRX
1NR
ρRX∗
21 ρRX
22 ··· ρRX
2NR
RR = . (B.1 - 6)
.. .. .. ..
. . . .
ρRX∗ RX∗ RX
NR 1 ρNR 2 · · · ρNR NR NR ×NR
ρm1 n1 TX RX
m2 n2 = hαn1 m1 , αn2 m2 i = ρm1 m2 ρn1 n2 . (B.1 - 7)
Finally, it can be deducted from all this mathematical analysis that the
spatial correlation matrix of the MIMO radio channel is represented by the
Kronecker product of the spatial correlation matrices in both transmit and
receive ends, and is given by RMIMO = RT ⊗ RR , where ⊗ represents the
Kronecker product [31].
1 1
s* s
2 0 2 1
As shown in Figure B.2 - 1, the signal obtained at the receiver side when
using the Alamouti algorithm is defined as
r0 1 h1 h2 s0 n0
=√ + . (B.2 - 1)
r1∗ ∗
2 h2 −h1
∗
s1 n∗1
The estimated transmitted signal is then calculated from the formula
s = Hν H y, where y = [r0 , r1∗ ]T .
b
APPENDIX B. DERIVATION OF FORMULAS 98
s = Hν H y
b
⇓
sb0 H r0
= Hν =
sb1 r1∗
1 s0 n0
= √ Hν H Hν + Hν H
=
2 s1 n∗1
h∗1 h∗1
1 h2 h1 h2 s0 h2 n0
=√ ∗ + =
2 h2 −h1 h2 −h∗1
∗
s1 ∗
h2 −h1 n∗1
h∗1 n0 + h2 n∗1
1 |h1 |2 + |h2 |2 0 s0
=√ + =
2 0 |h1 | + |h2 |2
2
s1 h∗2 n0 − h1 n∗1
h∗1 n0 + h2 n∗1
1 1 0 s0
= √ (|h1 |2 + |h2 |2 ) + =
2 0 1 s1 h∗2 n0 − h1 n∗1
1
= √ h2 I2 s + ne. (B.2 - 2)
2
Once the corresponding operations for estimating the transmitted signal
have been performed, the result is represented in Equation B.2 - 2, where:
• h2 = |h1 |2 + |h2 |2 is the power gain of the channel,
n1
s = HH
The estimated transmitted signal can be calculated from b ν y, where
∗ ∗ T
y = [r0 (1)r0 (2)r1 (1)r1 (2)] .
The virtual channel matrix, Hν , is expressed as
h11 h21
h12 h22
Hν =
h∗21 −h∗11 .
h∗22 −h∗12
r 0 (1) n0 (1)
sb0 H r0 (2)
1 H s0
H n0 (2)
= Hν ∗ = √ Hν Hν + Hν
=
sb1 r1 (1) 2 s1 n∗1 (1)
∗
r1 (2) n∗1 (2)
APPENDIX B. DERIVATION OF FORMULAS 100
h 11 h21
h∗11 h∗12 h21
1 h22 h12 h22 s0
=√ ∗ ∗ h21 −h∗11 s1 + n
∗ e=
2 h21 h22 −h11 −h12
h∗22 −h∗12
1 1 0 s0
= √ (|h11 |2 + |h21 |2 + |h12 |2 + |h22 |2 ) +n
e=
2 0 1 s1
1 1
= √ (kh1 k22 + kh2 k22 )I2 + n
e = √ h2 I2 s + ne. (B.2 - 4)
2 2
Equation B.2 - 4 expresses the obtained result for the process of estimating
the transmitted symbols. As described in the previous section:
• h2 = kh1 k22 + kh2 k22 = |h11 |2 + |h21 |2 + |h12 |2 + |h22 |2 is the power gain
of the channel, and
∗
h11 n0 (1) + h∗12 n0 (2) + h21 n∗1 (1) + h22 n∗1 (2)
• n
e = represents some
h∗21 n0 (1) + h∗22 n0 (2) − h11 n∗1 (1) − h12 n∗1 (2)
modified noise.
Appendix C
101
APPENDIX C. PARAMETERS OF THE SIMULATOR 102
• Fs : sampling frequency.
nf BW
Fs = 8000
8000
• ∆f : subcarrier spacing.
Fs
∆f =
NFFT
• Tb : useful symbol time.
1
Tb =
∆f
• Tg : CP time.
Tg = GTb
Tsym = Tb + Tg
• Ts : sampling time.
Tb
Ts =
NFFT
APPENDIX C. PARAMETERS OF THE SIMULATOR 103
• Ntcb : total number of coded bits per allocation subchannel per OFDM
symbol.
Ntcb = Ntx-data Ma
Parameter Value
Ndata 192
Npilot 8
Ntrain 3
Variable, from 1.25 to 20 MHz,
BW being an integer multiple
of 1.25, 1.5 or 1.75 MHz
1. For channel bandwidths
multiple of 1.75 MHz, nf = 8/7
2. For channel bandwidths
multiple of 1.5 MHz, nf = 86/75
3. For channel bandwidths
multiple of 1.25 MHz, nf = 144/125
nf 4. For channel bandwidths
multiple of 2.75 MHz, nf = 316/275
5. For channel bandwidhts
multiple of 2.0 MHz, nf = 57/50
6. For channel bandwidths
not otherwise specified, nf = 8/7
G 1/4, 1/8, 1/16, 1/32
Number of lower frequency guard subcarriers 28
Number of higher frequency guard subcarriers 27
Frequency offset indices of guard subcarriers −128, −127, ..., −101
+101, +102, ..., +127
Frequency offset indices of pilot carriers −88, −63, −38, −13
+13, +38, +63, +88
Tframe (msec) 2.5, 4, 5, 8, 10, 12.5, 20
WiMAX Wi-Fi
Ndata 192 48
Npilot 8 4
NFFT 256 64
BW variable fixed
(1.25 to 20 MHz) (20 MHz)
Coding CC+RS CC
CP variable fixed
107
APPENDIX D. WIMAX SIMULATOR BLOCK DIAGRAM 108
and the preamble transmitted from the second antenna is set according to
the sequence PODD , which uses, in this case, a subset of odd subcarriers.
Blocks "Pilot", "Training Ant. 0", and "Training Ant. 1" generate
the pilot and both training sequences, respectively.
OFDM data symbols are obtained after rearranging the data vector from
the "Coding TX" block in a matrix form that has 192 rows (number of data
subcarriers in an OFDM symbol). Moreover, if Alamouti coding is selected
in a parameter file, "STC" performs the Alamouti algorithm described in
Section 5.1.2 to the OFDM data symbols. Otherwise, this block has no
impact on the signal.
The next block, called "Assembler", deals with the task of rearranging
data, pilots, trainings, and zero DC subcarrier, as explained in Section 2.6.
After the assembling process, the 55 guard bands are appended at the end of
each frame, the signal is converted to the time domain and the cyclic prefix
is added. Then, the signal is sent over the channel, which is implemented in
the block "Channel Model".
The receiver performs the reverse operations to get the transmitted data.
The cyclic prefix is removed from each symbol and the signal is converted to
the frequency domain using an FFT algorithm. As it has been told before,
an OFDM symbol consists of data, pilot, trainings, a zero DC subcarrier,
and some guard bands. Thus, a process to separate all these subcarriers is
needed. First, the guard bands are removed, and then, a disassembling is
performed to obtain pilots, data, and trainings. The trainings are utilized in
the "Channel estimator". The estimated channel coefficients can be used
in the demapper to realize an equalization of the data symbols to compensate
the frequency-selective fading of the multipath propagation channel. To end,
data is decoded following the inverse steps as performed in the transmitter
(deinterleaving, inserting zeros as the inverse process of puncturing, Viterbi
decoding of the convolutional code, and Reed-Solomon decoding). These two
last steps, demapping and decoding, are performed in the "Decoding RX"
block. As its analogous block, it consists of a bank of seven demappers and
decoders, where the appropriate modulation and coding scheme is selected
by the AMC signal explained next.
Furthermore, a feedback mechanism of adaptive modulation and coding
(AMC) is performed in order to allow the system to shift modulation scheme
and so, maintain the connection quality and link stability, thus allowing the
system to overcome time-selective fading. This AMC mechanism works by
estimating the SNR of the channel, and depending on the desired conditions
of the channel established by a given target BER, changing modulation and
coding. These operations are performed in the "Calculate AMC" block.
[1x180]
Pilot
Pilot
[201x3] [1x180]
Training Ant. 0
Train0
[201x3] [201x366] [256x366] [256x366] [320x366]
Sym Zero Padding IFFT Add CP
Train1 [201x366] [256x366]
[201x3] [201x3]
Training Ant. 1
Data
[192x360]
[207360x1] [320x366]
Code Bits
TX
Coding TX [155520x1]
[7x1]
RX FER/BER CodedErrorvec
[155520x1] [7x1] Channel Model
AMC
[320x183] [384x1
TX
[207360x1]
[7x1]
RX FER/BER UncodedErrorvec
[207360x1]
AMC
AMC
Data Bits
[155520x1]
Data Data
[34560x1]
[256x183] [320x183]
Sym Remove Zeros FFT Remove CP
Code Bits [201x3] [201x183] [256x183] [256x183]
[207360x1] Channel Train
[384x1] [201x3]
Channel
Estimator [384x1]
Decoding RX 19.87
SNR [dB]
AMC 3
AMC
-1
Z
APPENDIX D. WIMAX SIMULATOR BLOCK DIAGRAM
Estimated SNR
AMC
Target BER TargetBER
Calculate AMC
109
3G Third Generation
3GPP Third Generation Partnership Project
4G Fourth Generation
AAS Adaptive Antenna System
AMC Adaptive Modulation and Coding
AP Access Point
ARQ Automatic Retransmission Request
AWGN Additive White Gaussian Noise
BER Bit Error Rate
BS Base Station
BTC Block Turbo Coding
CC Convolutional Coding
CIR Channel Impulse Response
CP Cyclic Prefix
CSI Channel State Information
CTC Convolutional Turbo Coding
DC Direct Current
DFS Dynamic Frequency Selection
DL DownLink
DSL Digital Subscriber Line
FCH Frame Control Header
FDD Frequency Division Duplexing
FDM Frequency Division Multiplexing
FEC Forward Error Correction
110
APPENDIX E. ABBREVIATIONS AND SYMBOLS 111
⊗ Continuous-time convolution
(·)∗ Complex conjugation operation
(·)−1 Inversion operation
(·)T Transposition
(·)H Hermitian operation
a Binary inversion of the sequence a
As Vector that represents the points in the constellation map
bk Bit on position k
Bcoh Coherence bandwidth
Bd Doppler spread
BER0 Target BER
BW Nominal channel bandwidth
c Speed of light
ci (t) Tap coefficients
C Amplitude of the fading component
Cm Normalization factor in the modulation map
C Set of complex numbers
dE Euclidean distance
E{} Mathematical expectation
Eb /N0 Bit energy to noise rate
fc Carrier frequency
fd Doppler frequency
fM Maximum Doppler shift
fN Nyquist frequency
fRay (a) Rayleigh fading distribution
fRice (a) Rice fading distribution
fsam Sampling frequency of the channel simulator
Fs Sampling frequency of the OFDM symbol
G Ratio of the CP time to the useful symbol time
G Channel gain matrix
h Vector of channel coefficients
ĥ Channel coefficients estimates
h(t) Channel impulse response
h(t, τ ) Channel time-varying impulse response
hb (t, τ ) Baseband equivalent impulse response of the channel
H Channel matrix
Hrc (f ) Raised cosine filter frequency response
Hrrc (f ) Root-raised cosine filter frequency response
APPENDIX E. ABBREVIATIONS AND SYMBOLS 114
ρRX
ij Spatial correlation coefficient at the receiver
σx Standard deviation of x
στ RMS delay spread
σv2 Noise variance
θ Phase alteration experienced by the multipath fading signal
τ Channel multipath delay
Bibliography
[2] Intel White Paper, Wi-Fi and WiMAX Solutions: ”Understanding Wi-
Fi and WiMAX as Metro-Access Solutions,” Intel Corporation, 2004.
http://www.intel.com/netcomms/technologies/wimax/304471.pdf
[3] J. Pino Lacosta: ”WiMAX: una alternativa d’accés a les xarxes,” Master
Thesis, Universitat Oberta de Catalunya, Enginyeria Informàtica, June
2004.
117
BIBLIOGRAPHY 118
[16] L. Staphorst: ”Viterbi decoded linear block codes for narrowband and
wideband wireless communication over mobile fading channels,” Master
Thesis, Department of Electrical, Electronic and Computer Engineering,
University of Pretoria, July 2005.
http://upetd.up.ac.za/thesis/available/etd-08082005-120839/
[26] A. van Zelst, R. van Nee, and G. A. Awater: ”Space division multi-
plexing (SDM) for OFDM systems,” IEEE 51st Vehicular Technology
Conference (VTC) Proceedings, vol. 2, pp. 1070-1074, Tokyo, Spring
2000.