Professional Documents
Culture Documents
3, 2006
Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J88-B, No. 3, March 2005, pp. 634642
SUMMARY
This paper presents the results of a study of the
OFDM adaptive modulation technique. The adaptive
modulation technique, which selects the modulation
scheme according to the transmission conditions, is effective in improving system throughput. Then, it is important
to study evaluation function under various propagation
conditions. In this paper, we propose an adaptive modulation technique using the instantaneous DUR (desired signal
to undesired signal ratio) per packet as the performance
measure of the transmission path, in which the intersymbol
interference (ISI) and intercarrier interference (ICI) power
of delayed waves exceeding the guard interval are used
under the assumption of convolution coding and soft-decision Viterbi decoding. A DUR estimation method is also
proposed. The effectiveness of the approach is confirmed
by numerical simulation. 2005 Wiley Periodicals, Inc.
Electron Comm Jpn Pt 1, 89(3): 3645, 2006; Published
online in Wiley InterScience (www.interscience.
wiley.com). DOI 10.1002/ecja.20254
1. Introduction
Recently, the demand for multimedia wireless communications, such as data and image transmission, via the
Internet has increased. As a result, bandwidth enhancement
of wireless communications is indispensable. Intersymbol
interference by the delayed wave is an important problem
for broadband wireless communications. One effective so-
37
(1)
Here gn(n) is additive white Gaussian noise, s(n) is the
transmitted signal, 0, 1, and 2 are the powers of the paths,
0, 1, and 2 are phases of the paths, and 1 and 2 are the
delays. The delay of delayed wave 1 is within the GI while
that of delayed wave 2 exceeds the GI.
In the OFDM demodulator, the received signal r(n)
is multiplied by an ideal time window w(n) and then FFT
processing is applied. If the frequency is m, the FFT output
for the received signal r(n) is R(m), and the FFT process is
F[], then
(2)
Here R0(m), R1(m), R2(m), and GN(m) are the FFT outputs
of r0(n), r1(n), r2(n), and gn(n). Also,
(3)
(4)
38
(7)
(5)
Here RISI(m) is the FFT output of the previous symbol
component leaking in and Wa(m) is the FFT output of
wa(n). 0 denotes the convolution process. The ISI component is spread along the frequency axis.
With regard to the self-symbol, let the FFT output be
Rc(m) and the time window function of the self-symbol
component be wb(n). Then,
(8)
The interference component U is the sum of Eq. (5) (ISI
component) and the second term on the right-hand side of
Eq. (7) (ICI component):
(6)
(9)
(10)
39
(16)
(11)
(12)
4. Numerical Simulation
(13)
4.1. Propagation model
The propagation model used for numerical simulation is an equally spaced exponentially decaying model
with 18 waves. Each path is assumed to have an independent Rayleigh distribution. The parameters of the propagation model used in this paper are given in Table 1.
(14)
(15)
Originally, the power sum is as follows and the third term is considered
negligible:
Propagation
model
A
C
E
40
Path spacing
[ns]
20
50
80
Attenuation
between
Delay spread
[ns]
paths [dB]
1.70
1.35
1.28
50
150
250
64QAM
1/2 (constraint length 7)
Bit interleave (along the
frequency axis)
64
48
16
5000
1000 bytes
E
50 Hz
Ideal
25 MHz
Number of resends
0
1
2
3
4
5
More than 6
Ideal
Cross correlation process
with the received signal and
replica
41
the receiving side, demodulation and error-correcting decoding are carried out with a single packet.
Next, the effective throughput defined in this simulation is explained. The effective throughput is defined as the
total number of bits of the packets correctly received divided by the total transmission time. Using Fig. 7 as an
example, the effective throughput is the number of bits
contained in Packets 1, 2, and 3 divided by (t7 t0).
4.4. Numerical simulation results
In order to verify the effectiveness of the method
proposed in this paper, a numerical simulation was performed. The simulation parameters are listed in Table 4. As
the modulation method, QPSK, 16QAM, or 64QAM was
used for each packet in accordance with the proposed
adaptive modulation technique. The propagation models
used were Model A (delay spread 50 ns, Doppler frequency
20 Hz) and Model C (delay spread 150 ns, Doppler frequency 20 Hz), both of which had delays almost all within
the GI, and Model E (delay spread 250 ns, Doppler frequency 50 Hz) with many delayed waves exceeding the GI
arriving. Also, it was assumed that synchronization, CNR
estimation, and reporting of adaptive modulation informa-
tion were ideal and that the reporting of the adaptive modulation information was without delay.
Next, we explain the chart used for selecting the
modulation method (selecting the modulation format by the
CNR and the instantaneous DUR) in the adaptive modulation technique. In the selection charts shown in Figs. 8 and
9, the CNR is the averaged value. In the simulation, the
estimation of the CNR is assumed to be ideal in order to
focus on the effect of the proposed DUR estimation scheme.
In Figs. 8 and 9, the threshold values are set so that 16QAM
and 64QAM are selected even in the region where the CNR
is small. This is because the instantaneous CNR and instantaneous DUR may become large instantaneously, so that
error-free communications is possible with either the
16QAM or 64QAM modulation method. The threshold
values in the modulation method selection chart were obtained by calculation of the throughput at each CNR by
numerical simulation with the threshold value as the parameter followed by selection of an optimum threshold. In
this instance, two types of selection charts are presented, as
shown in Figs. 8 and 9, because the suitable modulation
scheme selection chart can differ depending on the propagation model. Figure 8 shows a modulation scheme selection chart suitable for a propagation model in which the
delayed waves are almost all within the GI (with the DUR
threshold DURth specified) (suitable for propagation model
A, C). Figure 9 is a chart suitable for a propagation path
with many delayed waves exceeding the GI (suitable for
propagation model E). The results given by the adaptive
modulation technique for each selection chart are denoted
as AMC1 and AMC2* in Figs. 10 to 15. It is assumed that
42
43
(1) From Figs. 13 to 15, it is found that high throughput is obtained in all propagation models regardless of the
CNR, so that the effectiveness of the proposed method is
confirmed. Also, from Figs. 10 to 12, it is confirmed that
the proposed method can achieve high quality and high
throughput, since PER < 10% (IEEE802.11a specification)
is almost always satisfied when modulation scheme selection chart AMC2 is used.
(2) From Figs. 13 to 15, the following is found. If a
relatively high throughput is desired for all propagation
models, the modulation scheme selection chart in Fig. 9 is
used. When high throughput is desired only for Models A
and C, in which the delay of the delayed wave is within the
GI, the modulation scheme selection chart in Fig. 8 should
5. Conclusions
In this paper, under the assumption of convolution
coding and soft-decision Viterbi decoding, a method of
modulation scheme selection using the instantaneous DUR
and taking account of the ISI and ICI by delayed waves
exceeding the GI is proposed for adaptive modulation in
OFDM. The effectiveness of the proposed method was
confirmed by numerical simulation.
44
REFERENCES
1. Itami M. OFDM modulation techniques. Triceps;
2000.
2. Sasaoka S. Mobile communications. Ohm Press;
1998.
3. Otsuki S, Matsuoka H, Suzuki K, Sampei S, Morinaga N. Performance analysis of adaptive modulation
systems using square QAM. Tech Rep IEICE,
1994;RCS94-66.
4. Muneta S, Matsumoto Y, Mochizuki N, Umehira M.
A new frequency-domain link adaptation scheme for
broadband OFDM systems. VTC 1999;1:253257.
5. Usui T, Ishizu F, Murakami K. A study on adaptive
modulation scheme using DUR for OFDM. 2002
IEICE Society Convention (Communication), B-5166.
6. Usui T, Ishizu F, Murakami K. A study on adaptive
modulation scheme in OFDM. Tech Rep IEICE
2002;RCS2002-126.
Tsutomu Usui (member) graduated from the Department of Electrical and Information Engineering, Kanazawa University, in 1998, completed the M.S. program in 2000, and joined Mitsubishi Electric. Since then, he has been engaged in research
and development related to broadband mobile communications systems. He is now affiliated with the Wireless IP Access
Technology Department of the Information Technology R&D Center.
Fumio Ishizu (member) graduated from the Department of Electronic and Communications Engineering, Waseda
University, in 1983, completed the M.S. program in 1985, and joined Mitsubishi Electric. Since then, he has been engaged in
research and development in the fields of satellite communications and digital modulation and demodulation schemes for mobile
communications. He is now a manager in the Wireless IP Access Department of the Information Technology R&D Center.
Keishi Murakami (member) graduated from the Department of Electronic and Communications Engineering, Waseda
University, in 1974, completed the M.S. program in 1976, and joined Mitsubishi Electric. Since then, he has been engaged in
research and development in the fields of satellite communications systems, digital mobile communications systems, and digital
modulation and demodulation systems. He is now a manager in the Communication Laboratory of the Information Technology
R&D Center. He is a member of IEEE and the Society of Information Theory and Its Applications.
45