Professional Documents
Culture Documents
Facultyy of Enggineerin
ng
Electricaal Engineeering Depaartment
Commu unication & Electronnics Section
Mob i l e W i MA X
Phyysical Layer
L I
Implem
mentatiion of Mobile
M e WiMA
AX
on DSP
D Ti TMS320C66416
Under supervision of:
Prof. Ahmad Kamal Sultan Salem
July
J 2008
What you spend years building, someone may try to
destroy overnight. Build anyway because you had to give
the world the best you have, even if it may never be
enough; Give the world the best you have anyway.
When clocks reverse, time never runs back. So, hard work
had to be your way to face the world.
Wi Team
July, 2008
Presented by:
Abd Al-Rahman Mostafa Fekry
Ali Mohammad Alauldin Ali Salem
Ayman Abdo Solayman Ali
Ehab Kamal Al-din Ahmad Al-Sayed
Hossam Al-din Hasan Mahmod
Islam Mohammad Saad Hussin
Sherif Mohammad Saad Hussin
▬▬▬▬▬▬▬▬
Acknowledgments
Thanks to Allah, first & foremost. For nothing is worth working for if it isn’t for
the sake of Allah. It is only due to Allah’s blessing that we reached this far.
We thank Allah for everything, especially for providing us with hope when we
were close to losing it, guidance he blessed us with to complete our work, &
people that Allah leads us to & made reasons for our success…
Prof. Ahmad, our supervisor, the light – hearted teacher & the kind father image
who guided us through all of our work and was very patient in hearing our
problems. He always provided us with easy, yet creative solutions for any
road blocks we ran into.
We also would like to thank the other groups for support throughout our work
and everyone has been participated in this project.
▬▬▬▬▬▬▬▬
Content
Part (1): WiMAX Overview
1. Chapter (1): IEEE 802.16e Overview…………………………………….1
1.1. Introduction:……...…………………………………………………….1
1.2. Evolution of Broadband Wireless:…………………………….……….3
1.3. WiMAX Applications:………………………………………………....5
1.4. WiMAX versus other systems:…………………………………………5
1.5. WiMAX bands & broadband bands:…………………………..……….8
1.6. WiMAX challenges:……………………………………………………9
1.7. Quality of Service:…………………………………………………….10
1.8. Fractional Frequency Reuse…………………………………..……….11
1.9. Remarks………………………………………………………………..11
1.10. Bibliography……………………………………………………...……12
2. Chapter (2): Orthogonal Frequency Division Multiplexing…...……...…14
2.1. Multicarrier Modulation:……………………………...……………….14
2.2. Orthogonality:…...……………………………………………………..15
2.3. IFFT & FFT:…………………………...………………………………15
2.4. Cyclic Prefix:……………………..……………………………………16
2.5. OFDM Symbol:……………………..…………………………………17
2.6. Peak – to – Average Ratio:…………………………………………….18
2.7. OFDMA:………………………………………………………………19
2.8. Resource – Allocation Techniques for OFDMA:…………….……….20
2.9. OFDMA Frame Structure:……………...……………………………..21
2.10. Sub–Channel & Sub–Carrier Permutations:…………………………..21
2.11. SOFDMA:………….………………………………………………….22
2.12. Bibliography:………………………………………………………….23
3. Chapter(3)Physical Layer:……………....……………………………….24
3.1. Transmitter:……………………...…………………………………….25
3.1.1. Randomizer:……………………..…………………………………….25
3.1.2. Frame Error Correction (FEC):……………………..…………………26
3.1.2.1. Concatenated Reed–Solomon–Convolutional Code:…………..….26
3.1.3. Interleaver:………………...…………………………………………..28
3.1.4. Symbol Mapping:……………………………………………………..29
3.1.5. Pilot Symbol:…………….………………………………………...….30
3.1.6. Training Sequences:……………..…………………………………....30
3.1.7. Inverse Fast Fourier Transform (IFFT):……………………………....31
3.1.8. Cyclic Prefix (CP):………………………...……………………….....32
3.1.9. RF stage:………………...…………………………………………….32
3.2. Channel:……………………………………………………………….32
3.3. Receiver:…………….………………………………………………...32
3.4. Bibliography:……………..…………………………………………...33
4. Chapter (4): MAC Layer:……..…………………………………………35
4.1. Convergence Sub–layer (CS):………………………………………...36
4.2. Common Part Sub–layer:…………...………………………………...36
4.2.1. MAC PDU Construction & Transmission:…………………………...36
4.2.2. Network Entry & Initialization:……………………………………....37
4.2.3. Power–Saving Operations:…………………………………………...38
4.2.4. Mobility Management:……………………………………………….38
4.2.4.1. Handoff Process & Cell Reselection:……...……………………...39
4.2.4.2. Macro Diversity Handover & Fast BS Switching:………….…….39
4.3. Security Sub–layer:…………………………………………………...40
4.3.1. Security Sub–layer Architecture:……………….…………………….40
4.3.2. Authentication architecture:………………...………………………...41
4.4. Bibliography:……………….………………………………………...42
5. Chapter(5): Advanced Techniques in WiMAX:………………………...44
5.1. Adaptive Modulation & Coding (AMC):…………………………….44
5.1.1. Modulation:………………….……………………………………….45
5.1.2. Coding:………….……………………………………………………46
5.2. AMC in Uplink & Downlink:…………….………………………….46
5.3. Performance of the AMC scheme:…………………………………...47
5.4. Channels:…………….……………………………………………….48
5.4.1. Propagation Characteristics of Mobile Radio Channels:……….........48
5.4.1.1. Attenuation:………..……………………………………………...48
5.4.1.2. Multipath effect (Rayleigh & Ricean Fading):………..………….48
5.4.1.3. Doppler Shift:………….………………………………………….50
5.5. Modeling of Channels:………….……………………………………50
5.6. Channel estimation:…………..………………………………………51
5.6.1. Preamble & Pilot:…………….………………………………………51
5.6.2. Pilot Signal Estimation:……………………………………………....51
5.6.2.1. Least Square Estimation:…………….…………………………....52
5.6.2.2. Linear Minimum Mean Square Error Estimation:………….……..52
5.6.3. Channel Interpolation:…………...…………………………………...52
5.6.3.1. Linear Interpolation:…………...………………………………….53
5.6.3.2. Spline & Cubic Interpolation:………….………………………….53
5.6.3.3. Low Pass Interpolation:…………………………………………...53
5.7. Adaptive Antenna Systems (AAS):………….……………………….53
5.7.1. Spatial Diversity:………….………………………………………….54
5.7.2. Beam forming:…………...…………………………………………...56
5.7.3. Multiple–Antenna Techniques:……………...……………………….57
5.7.3.1. Channel Estimation for MIMO–OFDM:………………………….58
5.8. Bibliography:…………….…………………………………………...59
6. Chapter (6): WiMAX Network Architecture…...………………………61
6.1. Network reference model (NRM):……………...……………………61
6.2. The Access service network (ASN):…………..……………………..62
6.3. Connectivity service network (CSN):………….…………………….63
6.4. Reference points (RP):………….……………………………………64
6.5. Bibliography:…………………….…………………………………..65
All of the new advanced applications need powerful tools to carry the up
to life, which also required being economically to have their wide use.
So, digital signal processors, such as the TMS320 family of processors
was introduced by texas Instruments, are used in a wide range of
applications, such as in communications, controls, speech processing, &
so on. They are used in cellular phones, digital cameras, high–definition
television (HDTV), radio, fax transmission, modems, and other devices.
These devices have also found their way into the university classroom,
where they provide an economical way to introduce real – time digital
signal processing (DSP) to the student.
The TM320C6x processor, based on the very–long instruction–word
(VLIW) architecture. This new architecture supports features that
facilitate the development of efficient high–level language compilers.
This book has 8 chapters sorted into two parts. Part I has six chapters
which are concern on the WiMAX system.
Part II consists of two chapters, which have the Matlab simulations &
describes the architecture of the Digital signal processor TI
TMS320C6416 & how to program it in short. The project codes &
implementation are included on the CD provided with the book.
Part. 1
WiMAX Overview
Chapter. 1
Chapter
1
IEEE 802.16e Overview
1.1 Introduction:
1 Nomadicity implies the ability to connect to the network from different locations via different base stations.
Mobility implies the ability to keep ongoing connections active while moving at vehicular speeds.
Chapter. 1
Figure 1.4: Possible scenarios for WiMAX deployment.
Chapter. 1
Mobile 1x EV – DO
Parameters Fixed WiMAX HSPA Wi – Fi
WiMAX Rev A
IEEE 802.16d – IEEE 802.16e – IEEE 802.11
Standards 3GPP Release 6 3GPP2
2004 2005 (a/b/g/e/n)
46 Mbps (in 10
9.4 Mbps (in 3.5 MHz with 3:1
DL/ UL ratio 14.4 Mbps
MHz with 3:1
[FDD]). (using all 14 3.1 Mbps.
DL/ UL ratio
Peak DL data codes). Rev. B will 54 Mbps.
[FDD]). 32 Mbps (in 10
rate 7.2 Mbps support 4.9 More than 100
6.1 Mbps (in 3.5 MHz with 1:1
[TDD]). (using 10 Mbps. Mbps peak
MHz with 1:1
codes). layer 2
[TDD]). Using 2 × 2
throughput
MIMO.
using (n).
3.3 Mbps (in 3.5 7 Mbps (in 10
Both are shared
MHz with 3:1 MHz with 3:1
between Dl &
DL – to – UL DL – to – UL 1.4 Mbps.
Peak UL data UL.
ratio [FDD]). ratio [FDD]). Later, 5.8 1.8 Mbps.
rate
6.5 Mbps (in 3.5 4 Mbps (in 10 Mbps.
MHz with 1:1 MHz with 1:1
[TDD]). [TDD]).
3.5 & 7 MHz in
3.5 GHz band. 3.5, 5, 7, 8.75, 20 MHz.
Bandwidth 10 MHz 5 MHz. 1.25 MHz.
10 MHz in 5.7 initially. 20/ 40 MHz (n).
GHz band.
QPSK, 16 – QPSK, 16 – QPSK, 8 – BPSK, QPSK,
QPSK, & 16 –
Modulation QAM, & 64 – QAM, & 64 – PSK, & 16 – 16 – QAM, &
QAM.
QAM. QAM. QAM. 64 – QAM.
Multiplexing TDM. TDM/ OFDMA. TDM/ CDMA. TDM/ CDMA. CSMA.
TDD, FDD & TDD, FDD &
Duplexing Half – duplex Half – duplex FDD. FDD. TDD.
FDD. FDD.
800, 900, 1800,
2.3, 2.5, & 3.5 800, 900, 1800,
Frequency 3.5, & 5.7 GHz. 1900, & 2100 2.4, 5 GHz.
GHz. & 1900 MHz.
MHz.
< 100 ft
(indoor).
Coverage 3 – 5 Miles. < 2 Miles. 1 – 3 Miles. 1 – 3 Miles.
< 1000 ft
(outdoors).
Mobility Not applicable. Medium. High. High. Low.
Throughput &
Advantages Throughput & coverage area. Mobility & coverage area.
cost.
Interference (&
Disadvantages Interference. Expensive & low rates. Small coverage.
not mobile).
7
infrastructure (U – NII) is
Chapter. 1
USA.
Note that lower band
have severe power
restrictions, extremely
difficult to provide
nomadic or mobile
services.
MPLS, etc).
Ability to be reached regardless of Roaming database, location update,
Page
Mobility
location. & paging.
Chapter. 1
Session continuity while moving
from the coverage area of one base Seamless handover.
station to another.
Session continuity across diverse
networks (as between WiMAX & IP – based mobility (Mobile IP).
Wi–Fi).
Power efficient modulation, sleep/
Reduce battery power consumption idle modes, low power circuits, &
Portability
on portable subscriber terminals. efficient signal processing
algorithms.
Protect privacy of user data. Encryption.
Security Prevent unauthorized access to
Authentication & access control.
network.
Provide efficient & reliable Adaptation of IP – based protocols
Low cost communication using IP for wireless & adapt layer 2
architecture & protocols. protocols for IP.
Interactive Streaming
Parameter Voice Data Video
gaming media
0.01 – 100
Data rate 50 – 85 Kbps. 4 – 64 Kbps. 5 – 384 Kbps. > 1 Mbps.
Mbps.
E – mail, web
browsing, IPTV, movies
Interactive Music, video instant download, peer
Example VoIP.
gaming. clips. messaging – to – peer
(IM), telnet, file video sharing.
download.
Real time Continuous, Non – real time,
Traffic flow Real time. Continuous.
(continuous). bursty. bursty.
< 1% (audio).
10
Figure 1.8: Fractional Frequency Reuse. F1, F2, & F3 are different sets of
sub–channels in the same frequency channel.
1.9 Remarks:
• For mobile WiMAX, the most significant challenge comes from 3G
11
1.10 Bibliography:
[1] Fundamentals of WiMAX for Jeffrey G. Andrews, Ph.D., Arunabha
Ghosh, Ph.D., Rias Muhamed.
[2] The Business of WiMAX for Deepak Pareek – Resource4Business,
India.
[3] Implementation of a WiMAX simulator in Simulink for Amalia Roca.
[4] Mobile WiMAX: The Best Personal Broadband Experience! June 2006
– WiMAX Forum.
[5] Fixed, nomadic, portable & mobile applications for 802.16 – 2004 &
802.16e WiMAX networks, November 2005, Prepared by Senza Fili
Consulting on behalf of the WiMAX Forum.
[6] Mobile WiMAX – Part II: A Comparative Analysis, WiMAX Forum.
[7] A Comparative Analysis of Mobile WiMAX Deployment Alternatives
in the Access Network, WiMAX Forum.
[8] Introduction into WiMAX, CHRISTIAN BAUER (Alcatel).
12
Page
(This page is left blank)
Chapter. 2
Chapter
2
Orthogonal Frequency
Division Multiplexing
bands.
Chapter. 2
2.2 Orthogonality:
In order to assure a high spectral efficiency, sub–channels waveforms must
have overlapping transmit spectra. Nevertheless, to enable simple
separation of these overlapping sub–channels at receiver, they need to be
orthogonal. Orthogonality is a property that allows the signals to be
perfectly transmitted over a common channel & detected without
interference. Set of functions are orthogonal to each other if they match
following condition:
T
⎧C i = j
∫ S (t ) ⋅ S
0
i j (t ) = ⎨
⎩0 i ≠ j
N −1 2⋅π ⋅k n
1 −j
X (k ) =
N
∑ X (n ) ⋅ e N
, for n = 0,1,..., N − 1
Page
k =0
Chapter. 2
2.4 Cyclic Prefix:
If successive OFDM symbols were sent one directly after another, in order
to keep each OFDM symbol independent of others after going through a
wireless channel, it is necessary to introduce a guard time between OFDM
symbols. This guard period, which is called the cyclic prefix (CP), is a
copy of the last part of the OFDM symbol.
IBO = 10 log10
Pin
Page
Chapter. 2
Where Pinsat is the saturation power, above which is the nonlinear region, &
Pin is the average input power. The amount of backoff is usually greater
than or equal to the PAR of the signal.
In order to avoid operating the Power Amplifier (PA) in the nonlinear
region, the input power can be reduced by an amount about equal to the
PAR.
Clipping, sometimes called soft limiting, truncates the amplitude of signals
that exceed the clipping level as:
~ ⎧ A ⋅ e j∠x[ n ] If x[n ] > A
X L [n ] = ⎨
⎩ x[n ] If x[n ] ≤ A
~
Where x[n] is the original signal, & X L [n ] is the output after clipping.
The soft limiter output can be written in terms of the original signal & a
canceling, or clipping, signal as:
~
X L [n ] = x[n ] + c[n ], for n = 0,..., L − 1
Where C[n] is the clipping signal defined by:
⎧⎪ A − x[n ] ⋅ e jθ n If x[n ] > A
C[n ] = ⎨
⎪⎩0 If x[n ] ≤ A
Where θ[n]=arg(–x[n]); that is, the phase of C[n] is out of phase with x[n]
by 180°, & A is the clipping level, which is defined as:
A A
γ = =
E{ x( n ) }
2
εx
2.7 OFDMA:
Orthogonal Frequency Division Multiple Access is the way that users share
subcarriers & time slots (resources) “this technique can be compared relative
to TDMA, FDMA, & CDMA – Multiple access techniques –”. OFDMA is
19
the classical extension of the OFDM & essentially a hybrid of FDMA &
Page
Chapter. 2
TDMA; users are dynamically assigned subcarriers (FDMA) in different
time slots (TDMA).
One significant advantage of OFDMA relative to OFDM is its potential to
reduce the transmit power & to relax the peak – to – average – power ratio
(PAPR) problem.
symbols.
Parameters Value
System Channel Bandwidth (MHz) 1.25 5 10 20
Sampling Frequency (Fp in MHz) 1.4 5.6 11.2 22.4
FFT Size (NFFT) 128 512 1024 2048
Number of Sub–Channels 2 8 16 32
Sub–Carrier Frequency Spacing 10.94 KHz
Useful Symbol Time (Tb=1/f) 91.4 µsec.
Guard Time (Tg=Tb/8) 11.4 µsec.
OFDMA Symbol Duration (Ts=Tb+Tg) 102.9 µsec.
Number of OFDMA Symbols (5 msec frame) 48
2.12 Bibliography:
[1] Fundamentals of WiMAX for Jeffrey G. Andrews, Ph.D., Arunabha
Ghosh, Ph.D., Rias Muhamed.
[2] Implementation of a WiMAX simulator in Simulink for Amalia Roca.
[3] 802.16 IEEE Standards for Local and metropolitan area networks.
[4] Introduction into WiMAX, CHRISTIAN BAUER (Alcatel).
22
Page
(This page is left blank)
Chapter. 3
Chapter
3
Physical Layer
Figure 3.1: Basic system structure.
3.1 Transmitter:
3.1.1 Randomizer:
As described in the standard, the information bits must be randomized
before the transmission. Randomization process is used to minimize the
possibility of transmissions of non–modulated subcarriers. The process of
randomization is performed on each burst of data on the downlink &
uplink, & on each allocation of a data block (sub–channels on the
frequency domain and OFDM symbols on the time domain).
25
Page
Chapter. 3
Figure 3.4: Randomizer.
Code Rate
Rate 1/2 2/3 3/4 5/6
dfree 10 6 5 4
X 1 10 101 10101
Y 1 11 110 11010
XY X 1Y 1 X1Y1Y2 X1Y1Y2X3 X1Y1Y2X3X4X5
3.1.3 Interleaver:
Data interleaving is generally used to scatter error bursts & thus, reduce
error concentration to be corrected with the purpose of increasing
efficiency of FEC by spreading burst errors introduced by the transmission
channel over a longer time. Interleaving result is that burst of errors in the
channel after interleaving becomes in few scarcely spaced single symbol
errors, which are more easily correctable.
All encoded data bits shall be interleaved by a block interleaver with a
block size corresponding to the number of coded bits per the allocated
subchannels per OFDM symbol, Ncbps. The interleaver is defined by a two
step permutation. First ensures that adjacent coded bits are mapped onto
nonadjacent subcarriers. The second permutation insures that adjacent
coded bits are mapped alternately onto less or more significant bits of the
constellation, thus avoiding long runs of lowly reliable bits.
The first permutation is defined by Equation:
⎛ N cbps ⎞ ⎛k ⎞
mk = ⎜⎜ ⎟⎟ ⋅ k mod(12 ) + floor ⎜ ⎟ k = 0,1,..., N cbps − 1
⎝ 12 ⎠ ⎝ 12 ⎠
28
⎝ s ⎠
Chapter. 3
Ncbpc: number of coded bits per subcarrier, i.e., 1, 2, 4 or 6 for BPSK,
QPSK, 16–QAM, or 64–QAM, respectively.
K: index of the coded bit before the first permutation.
mk: index of that coded bit after the first & before the second permutation.
jk: index after the second permutation, just prior to modulation mapping.
s = Ceil (N cbpc / 2 )
(Default)
8 sub–channels 4 sub–channels 2 sub–channels 1 sub–channels
16 sub–channels
Ncbps
BPSK 192 96 48 24 12
QPSK 384 192 96 48 24
16–QAM 768 384 192 96 48
64–QAM 1152 576 288 144 72
29
Chapter. 3
3.1.8 Cyclic Prefix (CP):
As mentioned before [Ch. 2], robustness of any OFDM transmission
against multipath delay spread is achieved by having a long symbol period
with the purpose of minimizing the inter–symbol interference (ISI).
Sometimes it’s called guard time or guard interval & usually its 1/4.
3.1.9 RF stage:
The Previous stages were the baseband processing of the system. After
that, the radio frequency stage (RF) completes the job. It consists of D/A &
oscillator having the system frequency. Resultant signal is at the operating
frequency.
3.2 Channel:
When communicating over a wireless radio channel, received signal can’t
be simply modeled as a copy of transmitted signal corrupted by additive
Gaussian noise (AWGN). Instead, signal fading & other channel effects
[Ch. 5], caused by the time–varying characteristics of propagation
environment, appears which lead to a phenomenon known as multipath
propagation. The time dispersion in a multipath environment causes the
signal to undergo either flat (easy to compensate) or frequency–selective
fading (OFDM solve its problem). Furthermore, time dispersion is
manifested by the spreading in time of the modulated symbols leading to
inter–symbol interference (ISI), & cyclic prefix compensate it. In addition,
root–raised cosine (RRC) filters, usually used for band–limiting the
transmitted signal distort the signal.
3.3 Receiver:
3.4 Bibliography:
[1] Fundamentals of WiMAX for Jeffrey G. Andrews, Ph.D., Arunabha
Ghosh, Ph.D., Rias Muhamed.
[2] 802.16 IEEE Standards for Local and metropolitan area networks.
[3] Implementation of a WiMAX simulator in Simulink for Amalia Roca.
[4] Essentials of Error–Control Coding, for Jorge Castiñeira Moreira.
33
Page
(This page is left blank)
Chapter. 4
Chapter
4
MAC Layer
Media Access Control (MAC) layer, which resides above the PHY layer,
is responsible for controlling & multiplexing various such links over the
same physical medium.
Figure 4.3: WiMAX PDU headers: generic (on the top) & bandwidth
request (on the button).
WiMAX also defines five sub–headers that can be used in a generic MAC
PDU:
1. Mesh sub–header.
2. Fragmentation sub–header.
3. Packing sub–header.
4. Fast-feedback allocation sub–header.
5. Grant-management sub–header.
AAA
HLR
EAP method (e.g. TTLS/ CHAP, TLS, SIM etc.) SIM/ MAP
EAP EAP
41
CHAP
CHAP/ RADIUS AAA
PKMv2- EAP BS- WAC signaling protocol RADIUS or DIAMETER
Page
Dot16KDF(GKEK, # ) { GTEK}
GTEK
protected by GKEK
4.4 Bibliography:
[1] Fundamentals of WiMAX for Jeffrey G. Andrews, Ph.D., Arunabha
Ghosh, Ph.D., Rias Muhamed.
[2] 802.16 IEEE Standards for Local and metropolitan area networks.
[3] Security in WiMAX, Alcatel solution.
42
Page
(This page is left blank)
Chapter. 5
Chapter
5
Advanced Techniques
in WiMAX
WiMAX support many advanced techniques in order to improve the
overall system performance as AMC in order to increase the spectrum
efficiency, & use advanced antenna solutions like Multi–layer transmission
(MIMO), Diversity & Beam–forming to improve Capacity, Coverage &
provide very high data rates.
5.1.1 Modulation:
For each transmission step, several bits are coded on each subcarrier. For
example when clear line of sight exists between sender & receiver over short
distances, 64–QAM is used, which codes six bits on a single subcarrier
(Symbol), Under harsher conditions, less demanding modulation schemes like
16–QAM, QPSK & BPSK are used, which code fewer bits on a subcarrier per
transmission step.
1 bit/ Symbol.
BPSK 6 dB
(Very robust, used with harsh environments).
Page
Table 5.1: SNR required for each modulation, & bits/ Symbol.
Chapter. 5
5.1.2 Coding:
The coding rate is the ratio between the number of user data bits & the
number of error correction & detection bits sent over the air interface. The
lowest coding rate is 3/4. Where three user data bits are encoded in four
bits, which are then sent over the air interface. This coding rate can only be
used for exceptionally good signal conditions. For less favorable conditions
coding rates of 2/3 or 1/2 are used. 1/2 coding basically cuts the data rate in
half.
Figure 5.4: Throughput versus SINR, assuming that the best available
constellation & coding configuration are chosen for each SINR.
Downlink Uplink
BPSK (optional for OFDMA–PHY), QPSK, BPSK, QPSK, 16–QAM, & 64–QAM
Modulation
16–QAM, & 64–QAM. (optional).
Mandatory: Convolutional codes at rates 1/2, Mandatory: Convolutional codes at rates 1/2,
2/3, 3/4, & 5/6. 2/3, 3/4, & 5/6.
Optional: Convolutional turbo codes at rate Optional: Convolutional turbo codes at rate
Coding
1/2, 2/3, 3/4, & 5/6 & repetition codes at rate 1/2, 2/3, 3/4, & 5/6 & repetition codes at rate
1/2, 1/3, & 1/6 LDPC, RS–Codes for OFDM– 1/2, 1/3, & 1/6 LDPC.
PHY.
Table 5.2: Modulation & Coding Supported in WiMAX (UL & DL).
A bank of seven encoders & mappers, each one with a fixed AMC scheme,
is set up so that transmitter can switch from one AMC scheme to another
based on the feedback information.
5.4 Channels:
When communicating over a wireless radio channel the received signal
cannot be simply modeled as a copy of the transmitted signal corrupted by
additive Gaussian noise. Instead, signal fading, while caused by the time–
varying characteristics of the propagation environment, appears. In this
way, short term fluctuations caused by signal scattering of objects in the
propagation environment lead to a phenomenon known as multipath
propagation.
49
⎣
( )
Hˆ LMMSE = RHH ⋅ ⎡⎢ RHH + σ 2 ⋅ X ⋅ X ⋅ X ⋅ Y ⎤⎥
H −1 −1
⎦
Superscript (.) denotes hermitian transpose function & RHH=Σ(H HH).
H
Figure 5.9: Receiver Diversity (on the top) & Transmitter Diversity (on the
button), where h1, h2 … & hNr represent the different channels response.
ε x ⋅ ∑ hi
γ EGC = i =1
Nr ⋅σ 2
3. Maximum gain combination (MGC):
54
Nr 2
ε x ⋅ ∑ hi Nr
= ∑γ i
Page
γ MRC = i =1
σ 2
i =1
Chapter. 5
Figure 5.10: Average bit error probability for selection combining (on the
left) & maximal ratio combining (on the right) using coherent BPSK.
Owing to its array gain, MRC typically achieves a few dB better SNR than
does SC.
Figure 5.13: Beam pattern using this weight vector (Null–steering beam
Page
pattern) with unity gain for desired user & nulls at directions of interferers.
Chapter. 5
5.7.3 Multiple–Antenna Techniques:
Multiple antenna systems –sometimes called multi–layer transmission or
MIMO– are the systems which have several transmit & receive antennas,
or several transmitting antennas, for a single receiving antenna –MISO, for
single transmitting antenna –SIMO–, & for single transmitting & receiving
antenna –SISO–. When increasing the number of the transmitting &
receiving antennas, it improves the performance but practically, there are
some limit that after it increasing the number of antennas doesn’t improve
the performance.
The advantages of Multiple–Antenna Technique:
1. Theoretically n–times capacity with n TX antennas.
2. RX does not necessarily need more antennas (but it is better for the
SNR).
2. Linear Detectors.
Page
Chapter. 5
5.7.3.1 Channel Estimation for MIMO–OFDM:
When OFDM is used with a MIMO transceiver, channel information is
essential at the receiver in order to coherently detect the received signal &
for diversity combining or spatial interference suppression. Accurate
channel information is also important at the transmitter for closed–loop
MIMO.
Channel estimation can be performed in two ways:
1. Training–based channel estimation where known symbols are
transmitted specifically to aid the receiver’s channel estimation–
algorithms it has better convergence speed & estimation accuracy.
2. Blind channel estimation where receiver must determine the channel
without the aid of known symbols; higher–bandwidth efficiency can be
obtained in expanse of system complexity.
Training–based channel–estimation techniques are supported by WiMAX
standard. The estimated channel coefficients are calculated for each receive
antenna by using two long training sequences, PEVEN & PODD when
applying MIMO transmissions. There are two ways to transmit training
symbols: preamble or pilot tones.
Preamble are used for synchronization & initial channel estimation while
the pilot tones are used for tracking the time–varying channel in order to
maintain accurate channel estimates.
59
Page
(This page is left blank)
Chapter. 6
Chapter
6
WiMAX Network
Architecture
Network architecture deals with interoperable network architecture
framework that deals with the end–to–end service aspects such as IP, session
management, security, QoS & so on.
WiMAX Forum’s Network Working Group (NWG) has developed &
standardized these end–to–end networking aspects that are beyond the scope
of the IEEE 802.16e–2005 standard which had to support loosely coupled
interworking with all existing wireless networks (3GPP, 3GPP2) & wire
networks.
4. Key receiver.
Page
Chapter. 6
The NRM defined three profiles for the ASN Shown below:
Functional
Function ASN Entity Name
Category
Profile A Profile B Profile C
Authenticator ASN–GW ASN ASN–GW
Authentication relay BS ASN BS
Security
Key distributor ASN–GW ASN ASN–GW
Key receiver BS ASN BS
Data path function ASN–GW & BS ASN ASN–GW & BS
Handover control ASN–GW ASN BS
Mobility
Context server & client ASN–GW & BS ASN ASN–GW & BS
MIP foreign agent ASN–GW ASN ASN–GW
Radio resource Radio resource controller ASN–GW ASN BS
management Radio resource agent BS ASN BS
Paging agent BS ASN BS
Paging
Paging controller ASN–GW ASN ASN–GW
Service flow authorization ASN–GW ASN ASN–GW
QoS
Service flow manager BS ASN BS
4.5 Bibliography:
[1] Fundamentals of WiMAX for Jeffrey G. Andrews, Ph.D., Arunabha
Ghosh, Ph.D., Rias Muhamed.
[2] Recommendations & requirements for networks based on WiMAX
Forum certified TM products. Release 1.5, April 27, 2006.
[3] WiMAX end–to–end network systems architecture. Stage 2:
Architecture tenets, reference model & reference points. Release 1.0, V&V
Draft, August 8, 2006.
[4] WiMAX end–to–end network systems architecture. Stage 3: Detailed
protocols & procedures. Release 1.0, V&V Draft, August 8, 2006.
[5] Introduction into WiMAX, CHRISTIAN BAUER (Alcatel).
65
Page
(This page is left blank)
Part. 2
Simulation &
Implementation
Chapter. 7
Chapter
7
System Simulation
Using Matlab
Matlab is a very powerful tool that supports researchers & engineers in
their fields. Matlab can be used for simulations, simple programming.
In our project, the main tool box was used is the communication tool box
which consists of simulink blocks & MATLAB functions to simulate the
physical layer of the Mobile WiMAX. The used copy to carry out this
simulations is Matlab R2007b (7.5).
The simulation was based on the simple system structure as following:
Figure 7.1: Basic system structure.
1. Simulink:
As mentioned before [Ch. 3], the system parameters are used to configure
the system blocks.
69
Insert Preamble Insert the preamble sequence used for channel estimation process
Add Guard Band Add 28 zeros upper guard band and 27 zeros for the lower guard band
IFFT Execute the IFFT algorithm for the OFDM technique.
Add cyclic prefix Repeat the last sequence of bits in the sequence beginning.
P/S Parallel to serial.
6. FFT: this sub–block performs FFT process, & removing cyclic prefix.
The sub–block structure:
block structure:
Chapter. 7
Separate data & guard bands Remove the lower and upper guard bands from the data
Select training/data Separate the data and preamble
Channel estimation Estimate the communications channel using LS algorithm
Separate data & pilots Remove the pilots and zero sub-carriers from the data
P/S Parallel to serial
73
Page
Demodulator Demodulates the modulated data streams with the convention modulation techniques
Deinterleaver Rearrange the interleaved data with the WiMAX parameters
Quantizer Used to quantize the bit streams to apply the soft decoding
Viterbi decoding Decodes the data and detect and correct error
Figure 7.13: Input Data Calculations which is used for applying correct
Page
System is similar to the old one, but the communication channel take into
consideration the Rayleigh fading effect in this system.
To modify simple system to support MIMO, We use (2-1) Alamouti code.
Transmitter M–File:
function [ant1, ant2] = stbcenc(u)
% STBCENC Space-Time Block Encoder
% Outputs the Space-Time block encoded signal per antenna.
ant1 = complex(zeros(size(u)));
ant2 = ant1;
% Alamouti Space-Time Block Encoder, G2, full rate
% G2 = [s0 s1; -s1* s0*]
for i = 1:size(u,2)/2
s0 = u(:, 2*i-1); s1 = u(:, 2*i);
ant1(:, [2*i-1 2*i]) = [s0 s1 ];
ant2(:, [2*i-1 2*i]) = [-conj(s1) conj(s0)];
end
In receiver we use the reverse operation where the preambles are divided
into Podd & Peven [Ch. 3]. Receiver M–File:
function z = stbcdec(preamble, data)
% STBCDEC Space-Time Block Combiner
75
chEst1_bef=complex(zeros(200,1));
chEst2_bef=complex(zeros(200,1));
Page
chEst1_before=[preamble(1:2:99) preamble(103:2:201)];
chEst2_before=preamble(2:2:201);
Chapter. 7
for i=1:100
chEst1_bef(2*i-1)=chEst1_before(i);
chEst1_bef(2*i)=chEst1_before(i);
chEst2_bef(2*i-1)=chEst2_before(i);
chEst2_bef(2*i)=chEst2_before(i);
end
chEst_last1=[chEst1_bef chEst1_bef];
chEst_last2=[chEst2_bef chEst2_bef];
chEst1=chEst_last1./complex(ones(200,2));
chEst2=chEst_last1./complex(ones(200,2));
dat=[data(1:100,:);data(102:201,:)];
N = 2; M = 1;
z = complex(zeros(size(dat)));
z0 = complex(zeros(size(dat,1), M)); z1 = z0;
% Space Time Combiner
for i = 1:size(dat,2)/2
z0(:, M) = dat(:, 2*i-1).* conj(chEst1(:, 2*i-1))+conj(dat(:,
2*i)).* chEst2(:, 2*i);
z1(:, M) = dat(:, 2*i-1).* conj(chEst2(:, 2*i-1))-conj(dat(:,
2*i)).* chEst1(:, 2*i);
z(:, [2*i-1 2*i]) = [z0 z1];
end
Note that the frame size must be divisible by the code rate.
2. General block interleaver & deinterleaver:
• Elements: int_PBSK_1_2’ (M–File name).
The M–File:
Ncbps=1152; %the number of input bits to the Interleaver.
Ncpc=6; %the power of 2 for each modulation ex:
%for (BPSK=1),(QPSK=2),(16QAM=4),(64QAM=6).
k = 0:Ncbps-1;
mk = (Ncbps/12)*mod(k,12)+floor(k/12);
s = ceil(Ncpc/2);
jk = s*floor(mk/s)+mod(mk+Ncbps-floor(12*mk/Ncbps),s);
[x, intTable] = sort(jk); % per symbol
76
This model transfer the analog voice to digital samples & then filter
samples digitally by IIR filter then transfer it back to analog speaker to hear
the filtered voice.
1. From wave device & uniform encoder: these blocks receives the analog
voice & convert it to digital samples.
Uniform Encoder:
• Peak: 1.
• Bits: 8.
2. Uniform decoder & to wave device: reverse the operation of from wave
device & uniform encoder convert, so the digital samples converted into
analog sound & speakers output the sound. Blocks use same parameters
as from wave device & uniform encoder convert.
3. Digital Filter:
78
Page
Chapter. 7
2. Get the frequency domain spectrum before & after the filter.
Chapter. 7
80
Figure 7.18: Spectrum Output (The cutoff freq. is at 500 Hz), [On top,
before filtering & after filtering on the button].
Page
Chapter. 7
7.1.5 Audio Reverberation:
This model encodes the audio signal & then adds this signal with delayed
version of itself with gain less than one then decode these signal so that the
output audio signal is reverberated.
7.2 Remarks:
Important Notes:
1. Using buffers & unbuffers blocks causes error rate so it’s better to use
pad & submatrix blocks.
2. We face problems in channel estimation with puncturing codes.
Goals to be achieved:
1. Apply more sophisticated channel estimations algorithms like
“LMMSE”.
2. Solving the problems appears in the channel estimation with the
puncture code in the simulation process.
3. Applying the MIMO concept to improve the bit error rate of the system.
Applying OFDMA, SOFDMA.
7.3 M–File:
System may also be implemented using Matlab functions, so the final
program looks like a written text not a block diagram as Simulink.
The transmitter & receiver M – Files are included in the CD.
83
Page
The different between the fixed point & floating point are that floating point
have greater accuracy in the expanse of the processing speed, the fixed point
DSP’s own high processing speed (TMS320C6416 reach 1 GHz) on the
expanse of the received value accuracy.
84
Page
Chapter. 8
Figure 8.3: Basic system structure.
(File→Load file…).
Chapter. 8
5. Click “Run” to start the program.
Now we are ready to calculate the Branch metrics. There will be 2 branch
metrics for every 2 samples(code rate=½).Then each 4 branch metrics are
concatenated to form a 32–bit word then it is fed to the VCP, with the right
parameters, the output of the VCP will be the reversed version of the input
data.
The flow chart of operating the Viterbi Co–processor are shown below:
86
Page
Chapter. 8
Convolutional Encoder
Rate ½
Block Interleaving
Mapping
BPSK
IFFT
@ 128 Points
+ Cyclic Prefix
AWGN
FFT
@ 128 Points
Deinterleaver
Branch Metrics
calculation
Viterbi Decoding
(VCP)
• If there is too many errors “>100”, check the first error, it’s most likely to
be a syntax error.
9 To Do:
• Use Turbo coding and TCP (Turbo co-processor).
• Add more modulation schemes, Adaptive modulation & code rates.
• Add scalability to the FFT size, pilot and zero insertion.
• Interface two kits as transceivers.
• Optimize code to meet the WiMAX frame processing time constraints
(TDD).
88
Page
Chapter. 8
8.6 Bibliography (Very Important Documents):
[1] TMS320C6414, TMS320C6415, TMS320C6416 fixed point digital
signal processors.
[2] Using TMS320C6416 Coprocessors: Viterbi Coprocessor (VCP), TI.
[3] TMS320C6416 Coprocessors and Bit Error Rates, TI.
[4] Comparing Fixed & Floating Point DSPs. Does your design need a
fixed- or floating-point DSP? The application data set can tell you, TI.
[5] TMS320C6416 Coprocessors and Bit Error Rates, TI.
[6] Digital Signal Processing Selection Guide, TI.
[7] TMS320C64x DSP Viterbi-Decoder Coprocessor (VCP) Reference
Guide, TI.
[8] TMS320C6416T DSK Technical Reference, TI.
[9] TMS320C6000 Instruction Set Simulator Technical Reference Manual,
TI.
[10] Help documents in Code composer studio.
89
Page
(This page is left blank)
▬▬▬▬▬▬▬▬
System Parameters
A
Table 2: Fixed & Mobile WiMAX Certified Profiles.
B
Table 3: PHY – Layer Data Rate at Various Channel Bandwidths.
C
▬▬▬▬▬▬▬▬
Acronyms