This paper gives an introduction on the IEEE 802.16 standard – WIMAX or Worldwide Interoperability for Microwave Access. The different parts give details on the architectural specifications of WiMAX networks and also on the working principle of WiMAX networks including its services provided. It also provides brief descriptions on its salient features of this technology and how it benefits the networking industry. A brief outline of the basic building blocks or equipment of WiMAX architecture is also provided. This paper also evaluates the simulation performance of IEEE 802.16 OFDM PHY layer. The Stanford University Interim (SUI) channel model under varying parameters is selected for the wireless channel in the simulation. The performance measurements and analysis was done in simulation developed in MATLAB.
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency IJECEIAES
In the recent years, the data communication system become the main type of communication in the world. The FSK modulator or demodulator is one of the part that becomes the most important part and extremely advanced with the involvement of microwave active and passive circuits. This paper presents the data transmission analysis using MW-5000 at 5.8 GHz frequency. This experiment use the microwave communication module MW5000 that is available in electronic laboratory. From this experiment the duration taken for the transmission of data is depend on the length of sentence and the value of baud rate.
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency IJECEIAES
In the recent years, the data communication system become the main type of communication in the world. The FSK modulator or demodulator is one of the part that becomes the most important part and extremely advanced with the involvement of microwave active and passive circuits. This paper presents the data transmission analysis using MW-5000 at 5.8 GHz frequency. This experiment use the microwave communication module MW5000 that is available in electronic laboratory. From this experiment the duration taken for the transmission of data is depend on the length of sentence and the value of baud rate.
WIMAX stands for Worldwide Interoperability for Microwave Access.WiMAX refers to broadband wireless networks that are based on the IEEE 802.16 standard, which ensures compatibility and interoperability between broadband wireless access equipment.
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simulation of IEEE 802.16e Physical LayerIOSR Journals
Abstract : Growth in technology has led to unprecedented demand for high speed Internet access. IEEE
802.16e (Mobile WiMAX) is a wireless communication standard with high data transfer rates and good
performance. It not only is efficient as compared to its counterpart technologies today (Wi-Fi and 3G), but also
lays the foundation for 4G mobile communication. In 4G wireless communication systems, bandwidth is a
precious resource, and service providers are continuously met with the challenge of accommodating more users
within a limited allocated bandwidth. To increase data rate of wireless medium with higher performance,
Mobile WiMAX uses Orthogonal Frequency Division Multiple Access (OFDMA). This paper describes the
simulation of the physical layer of IEEE 802.16e using Simulink in Matlab 7.0 (R2010a). The system
performance is evaluated considering the Signal to noise ratio (SNR) and Bit error rate (BER) parameters.
Keywords: 802.16e, OFDMA, Mobile WiMAX.
Handover is the process of switching among the
available services without any interruption. Vertical handover is
a technique of switching from one type of a network to another
type of network (e.g., from WiFi to WiMAX). Seamless handover
between different access technologies is a great challenge as it
needs to obey different performance of QoS and security
constraints. Service users are becoming more demanding
regarding roaming capabilities across different networking
technologies such as WiFi, WiMAX, and CDMA as they claim
service continuity with QoS requirement and good security
features. Vertical Handover Decision (VHD) algorithms need to
be designed to provide the required Quality of Service (QoS) to a
wide range of applications while allowing seamless roaming
among a number of access network technologies. This paper is
about the implementation of the VHD algorithms designed to
satisfy these requirements. A combination of 3 parameters i.e.
Data Rate, SINR and RSS are evaluated to take decision of the
best network among available.
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum and its industry. WiMAX is basically a wireless digital communication system which is also known as IEEE 802.16 standard intended for wireless \"metropolitan area networks\". WiMAX is based upon OFDM multiplexing technique. It was developed in order to provide high speed data rates to the users located in those areas also where broadband wireless coverage is not available. MIMO systems also play an important role in the field of wireless communication by allowing data to be transmitted and received over different antennas. WiMAX-MIMO systems are developed to improve the performance of WiMAX system. This paper analyzes WiMAX-MIMO system for different modulation schemes with different CC code rates under different fading channels (Rician and Nakagami channel). Spatial Multiplexing technique of MIMO system is used for the simulation purpose. Analysis has been done in the form of Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) plots.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The relay stations are widely used in major wireless technologies such as WiMAX (Worldwide Interoperability for Microwave Access) and LTE (Long term evolution) which provide cost effective service to the operators and end users. It is quite challenging to provide guaranteed Quality of Service (QoS) in WiMAX networks in cost effective manner.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
WIMAX stands for Worldwide Interoperability for Microwave Access.WiMAX refers to broadband wireless networks that are based on the IEEE 802.16 standard, which ensures compatibility and interoperability between broadband wireless access equipment.
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simulation of IEEE 802.16e Physical LayerIOSR Journals
Abstract : Growth in technology has led to unprecedented demand for high speed Internet access. IEEE
802.16e (Mobile WiMAX) is a wireless communication standard with high data transfer rates and good
performance. It not only is efficient as compared to its counterpart technologies today (Wi-Fi and 3G), but also
lays the foundation for 4G mobile communication. In 4G wireless communication systems, bandwidth is a
precious resource, and service providers are continuously met with the challenge of accommodating more users
within a limited allocated bandwidth. To increase data rate of wireless medium with higher performance,
Mobile WiMAX uses Orthogonal Frequency Division Multiple Access (OFDMA). This paper describes the
simulation of the physical layer of IEEE 802.16e using Simulink in Matlab 7.0 (R2010a). The system
performance is evaluated considering the Signal to noise ratio (SNR) and Bit error rate (BER) parameters.
Keywords: 802.16e, OFDMA, Mobile WiMAX.
Handover is the process of switching among the
available services without any interruption. Vertical handover is
a technique of switching from one type of a network to another
type of network (e.g., from WiFi to WiMAX). Seamless handover
between different access technologies is a great challenge as it
needs to obey different performance of QoS and security
constraints. Service users are becoming more demanding
regarding roaming capabilities across different networking
technologies such as WiFi, WiMAX, and CDMA as they claim
service continuity with QoS requirement and good security
features. Vertical Handover Decision (VHD) algorithms need to
be designed to provide the required Quality of Service (QoS) to a
wide range of applications while allowing seamless roaming
among a number of access network technologies. This paper is
about the implementation of the VHD algorithms designed to
satisfy these requirements. A combination of 3 parameters i.e.
Data Rate, SINR and RSS are evaluated to take decision of the
best network among available.
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum and its industry. WiMAX is basically a wireless digital communication system which is also known as IEEE 802.16 standard intended for wireless \"metropolitan area networks\". WiMAX is based upon OFDM multiplexing technique. It was developed in order to provide high speed data rates to the users located in those areas also where broadband wireless coverage is not available. MIMO systems also play an important role in the field of wireless communication by allowing data to be transmitted and received over different antennas. WiMAX-MIMO systems are developed to improve the performance of WiMAX system. This paper analyzes WiMAX-MIMO system for different modulation schemes with different CC code rates under different fading channels (Rician and Nakagami channel). Spatial Multiplexing technique of MIMO system is used for the simulation purpose. Analysis has been done in the form of Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) plots.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The relay stations are widely used in major wireless technologies such as WiMAX (Worldwide Interoperability for Microwave Access) and LTE (Long term evolution) which provide cost effective service to the operators and end users. It is quite challenging to provide guaranteed Quality of Service (QoS) in WiMAX networks in cost effective manner.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
WiMAX Features, Characteristics and Application in Wireless Technology Computingijtsrd
WiMAX stands for Worldwide Interoperability for Microwave Access which is also called as IEEE 802.16, the WiMAX technology is basically a wireless broadband communications technology, and it is used to provide higher data rate with increased coverage area. It means that it is based on IEEE 802.16 standard, which provides high speed data over a wide area. This technology can operate Non LOS non line of site . WiMAX is considered as a technology for point to multipoint wireless networking. In this paper it cover about WiMAX, WiMAX feature, it's Characteristics and Application and their architecture of WiMAX. Khushboo Kumari ""WiMAX Features, Characteristics and Application in Wireless Technology Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30204.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30204/wimax-features-characteristics-and-application-in-wireless-technology-computing/khushboo-kumari
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...cscpconf
To provide uninterrupted service to all subscribers in a wireless network, we need to incorporate a low cost, flexible Heterogeneous network which will be able to link with any kind
of network for efficient spectrum utilization, hence improved system capacity. In this connection, Wi-Fi/ Wi MAX integrated network seems to be an ideal solution as it is able to
provide easy deployment, high speed data rate and wide range coverage with high throughput, low end to end delay, flat and low jitter. Wi-Fi/ WiMAX integrated network provides Quality of
Service (QoS) that can support all kinds of real-time application in wireless networks that includes priority scheduling and queuing for bandwidth allocation that is based on traffic
scheduling algorithms within wireless networks. In this paper, we have designed a Wi-Fi/ WiMAX integrated network and analyze the performance of different scheduling algorithms for
that integrated network and highlight our findings on the scheduling algorithm which will give the best performance for a heterogeneous network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Similar to BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS (20)
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...ijistjournal
Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is considered as information propagation channel with an amount of distortion. HLA gene SE is considered as sink regulated by the inducible transcription factors (TFs) (source). Previous work with a certain number of bin size, IEs for source and receiver is computed and computation of mutual information characterizes the dependencies of HLA gene SE on some certain TFs in different cells types of hematopoietic system under the condition of leukemia. Though in recent time information theory is utilized for different biological knowledge generation and different rules are available in those specific domains of biomedical areas; however, no such attempt is made regarding gene expression regulation, hence no such rule is available. In this work, IE calculation with varying bin size considering the number of bins is approximately half of the sample size of an attribute also confirms the previous inferences.
Call for Research Articles - 5th International Conference on Artificial Intel...ijistjournal
5th International Conference on Artificial Intelligence and Machine Learning (CAIML 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and Machine Learning. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Machine Learning in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science, Engineering and Applications.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...ijistjournal
System identification from the experimental data plays a vital role for model based controller design. Derivation of process model from first principles is often difficult due to its complexity. The first stage in the development of any control and monitoring system is the identification and modeling of the system. Each model is developed within the context of a specific control problem. Thus, the need for a general system identification framework is warranted. The proposed framework should be able to adapt and emphasize different properties based on the control objective and the nature of the behavior of the system. Therefore, system identification has been a valuable tool in identifying the model of the system based on the input and output data for the design of the controller. The present work is concerned with the identification of transfer function models using statistical model identification, process reaction curve method, ARX model, genetic algorithm and modeling using neural network and fuzzy logic for interacting and non interacting tank process. The identification technique and modeling used is prone to parameter change & disturbance. The proposed methods are used for identifying the mathematical model and intelligent model of interacting and non interacting process from the real time experimental data.
Call for Research Articles - 4th International Conference on NLP & Data Minin...ijistjournal
4th International Conference on NLP & Data Mining (NLDM 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Data Mining.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)ijistjournal
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
Online Paper Submission - 6th International Conference on Machine Learning & ...ijistjournal
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systemsijistjournal
Almouti published the error performance of the 2x2 space-time transmit diversity scheme using BPSK. One of the key techniques employed for correcting such errors is the Quadrature amplitude modulation (QAM) because of its efficiency in power and bandwidth.. In this paper we explore the error performance of the 2x2 MIMO system using the Almouti space-time codes for higher order PSK and M-ary QAM. MATLAB was used to simulate the system; assuming slow fading Rayleigh channel and additive white Gaussian noise. The simulated performance curves were compared and evaluated with theoretical curves obtained using BER tool on the MATLAB by setting parameters for random generators. The results shows that the technique used do find a place in correcting error rates of QAM system of higher modulation schemes. The model can equally be used not only for the criteria of adaptive modulation but for a platform to design other modulation systems as well.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
Feature extraction is a method of capturing visual content of an image. The feature extraction is the process to represent raw image in its reduced form to facilitate decision making such as pattern classification. We have tried to address the problem of classification MRI brain images by creating a robust and more accurate classifier which can act as an expert assistant to medical practitioners. The objective of this paper is to present a novel method of feature selection and extraction. This approach combines the Intensity, Texture, shape based features and classifies the tumor as white matter, Gray matter, CSF, abnormal and normal area. The experiment is performed on 140 tumor contained brain MR images from the Internet Brain Segmentation Repository. The proposed technique has been carried out over a larger database as compare to any previous work and is more robust and effective. PCA and Linear Discriminant Analysis (LDA) were applied on the training sets. The Support Vector Machine (SVM) classifier served as a comparison of nonlinear techniques Vs linear ones. PCA and LDA methods are used to reduce the number of features used. The feature selection using the proposed technique is more beneficial as it analyses the data according to grouping class variable and gives reduced feature set with high classification accuracy.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
During the twentieth century (1932-1972), white physicians representing the United States government
conducted a human experiment known as the Tuskegee Syphilis Study on black syphilis patients in Macon
County, Alabama. The creators of the study, who supported the idea of black inferiority and the concept
that black people’s bodies functioned differently from white people’s, observed the effects of a disease
called syphilis on untreated black patients in order to collect data for further research on syphilis. Black
individuals involved with the study believed that they were receiving treatment, although in truth,
treatments for syphilis were purposely held back from them. Not only this, but fluids from their bodies, such
as blood and spinal fluid, were extracted to serve as research material without their awareness of the
purpose of the collection. The physicians justified their approach by positioning it as mere observation,
asserting that they were not actively intervening with the patients participating in the experiment. However,
despite their claims of passivity, these white physicians engaged in various morally improper actions,
including deceit, which ultimately resulted in the deaths of numerous black patients who might have had a
chance at survival.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
The SAR and SAS images are perturbed by a multiplicative noise called speckle, due to the coherent nature of the scattering phenomenon. If the background of an image is uneven, the fixed thresholding technique is not suitable to segment an image using adaptive thresholding method. In this paper a new Adaptive thresholding method is proposed to reduce the speckle noise, preserving the structural features and textural information of Sector Scan SONAR (Sound Navigation and Ranging) images. Due to the massive proliferation of SONAR images, the proposed method is very appealing in under water environment applications. In fact it is a pre- treatment required in any SONAR images analysis system. The results obtained from the proposed method were compared quantitatively and qualitatively with the results obtained from the other speckle reduction techniques and demonstrate its higher performance for speckle reduction in the SONAR images.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
1. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
DOI : 10.5121/ijist.2013.3302 9
BER PERFORMANCE ANALYSIS FOR WIMAX PHY
LAYER UNDER DIFFERENT CHANNEL CONDITIONS
Shantanu Pathak1
and Ranjani S.2
Department of Telecommunication, SRM University, Chennai, India
shantanupathak614@gmail.com , ranjani.s@ktr.srmuniv.ac.in
ABSTRACT
This paper gives an introduction on the IEEE 802.16 standard – WIMAX or Worldwide Interoperability for
Microwave Access. The different parts give details on the architectural specifications of WiMAX networks
and also on the working principle of WiMAX networks including its services provided. It also provides brief
descriptions on its salient features of this technology and how it benefits the networking industry. A brief
outline of the basic building blocks or equipment of WiMAX architecture is also provided. This paper also
evaluates the simulation performance of IEEE 802.16 OFDM PHY layer. The Stanford University Interim
(SUI) channel model under varying parameters is selected for the wireless channel in the simulation. The
performance measurements and analysis was done in simulation developed in MATLAB.
KEYWORDS
WiMAX, IEEE, 802.16, OFDM, MIMO, FEC, SUI, PHY, CP
1. INTRODUCTION:
WiMAX is a digital broadband wireless access system;derived from the IEEE 802.16 standard
which has been designed for wireless metropolitan area networks and hence also known as
WirelessMAN. WiMAX systems can provide broadband wireless access (BWA) up to 50 km (30
miles) for fixed stations, and 5 - 15 km (3 – 10 miles), for mobile stations. It is maintained by the
WiMAX Forum industry alliance; that are responsible for the promotion and certification,
compatibility and interoperability of products based on the IEEE 802.16 standards.
The main development that WiMAX has brought in the field of telecommunication is that it is
able to provide broadband internet access in a wireless manner. The present broadband internet
access generally includes access through wired access or through Wi-Fi access. However
providing wired access in a larger scale becomes very expensive and the range and security of
Wi-Fi is not reliable. Hence the new technology WiMAX was developed to provide hi-speed
internet access in a wireless manner instead – wireless because it would much less expensive then
wired; and much more broad coverage than normal Wi-Fi, like cell phone networks, so that it is
able to extend to much larger areas.
2. How WiMAX Works:
In general, WiMAX operates similarly to Wi-Fi but with longer range, higher speeds and
operating larger number of users. WiMAX could potentially erase the suburban and rural
blackout areas that currently have no broadband Internet access because phone and cable
companies have not yet run the necessary wires to those remote locations.
A WiMAX system consists of two parts: a WiMAX Base Station and a WiMAX Receiver.
2. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
10
2.1 WiMAX Base Station:
Base station is place where WiMAX signals are broadcasted and it basically consists of electronic
devices and WiMAX towers. WiMAX towers are further categorised as fixed and mobile towers.
The fixed towers which are connected with home or office subscriber units, provided indoor or
outdoor subscriber unit operate on high power output transmissions providing 3.5 GHz signals
out to distance of 25 miles when passing through WiMAX fixed towers arranged in mesh
topology.
Mobile towers accommodate smaller devices such as laptops with WiMAX wireless mini cards,
cellular phones and mobile devices. These mobile towers work entirely different from fixed
towers due to hand held devices being limited to battery and processing power.
2.2 WiMAX Receiver:
WiMAX receiver is also termed as CPE or customer premises equipment. CPE is a device which
receives the signal from base station and connects to the WiMAX networks. These devices are
usually a Wireless USB modem or PCMCIA slot card for laptops or computers. WiMAX
subscriber units can be indoor or outdoor depending on the distance to the nearest WiMAX base
station tower.
A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired
connection. It can also connect to another WiMAX tower using a line-of-sight, microwave link.
This connection to a second tower referred to as a backhaul, along with the ability of a single
tower to cover up to 3,000 square miles allows WiMAX to provide coverage to remote rural
areas.
3. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
11
WiMAX can provide two types of services:
Non Line of sight service:
In this mode a small antenna connects to the tower. WiMAX uses a lower frequency range of 2
GHz to 11 GHz (similar to Wi-Fi). Lower-wavelength transmissions are not as easily affected by
physical obstructions. They are better able to diffract, or bend, around obstacles.
Line of sight service:
In this mode a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole. The
line-of-sight connection is stronger and more stable, so it's able to send a lot of data with fewer
errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66
GHz. At higher frequencies, there is less interference and lots more bandwidth.
3. WiMAX Architecture:
The IEEE 802.16e-2005 standard provides the air interface for WiMAX but does not give proper
specifications for the WiMAX network. The WiMAX Forum's Network Working Group (NWG)
is responsible for developing the network requirements, architecture, and protocols for WiMAX,
using IEEE 802.16e-2005 as the air interface.
The overall WiMAX Architecture can be logically divided into three parts:
1. Mobile Station (MS): It is used by the subscriber or end user as a source of network
connection. The base station (BS) provides the air interface for the mobile stations.
2. Access Service Network (ASN): It contains ASN gateways to build the radio access at
the end and comprises of more than two or three base stations. ASN is responsible for
radio resource management, encryption keys, routing to the selected network and client
functionality.
3. Connectivity Service Network (CSN): It is responsible for providing IP functions. It is
responsible for internet connections, corporate and public networks and many other user
services.
There are two scenarios for a wireless deployment:
Point-to-point (P2P):
P2P is used when there are two points of interest- one sender and one receiver. P2P can also be
used as a point for distribution using point-to-multipoint (PMP) architecture. The outturn of P2P
radios will be higher than that of PMP products. It is also known as fixed WiMAX designated
under IEEE 802.16 -2004 standard.
4. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
12
Point-to point and point-to-multipoint configurations
Point- to-Multipoint (PMP):
Point to Multipoint is used for broadcasting or distribution services. One base station can service
hundreds of differentsubscriber stations in terms of bandwidth and services offered. It is also
known as mobile or wireless WiMAX designated under IEEE 802.16e-2005 standard.
4. WiMAX Equipment:
WiMAX architecture is built upon two components: radios and antennas. Most WiMAX systems
are designed such that there is a base station radio separate from the antenna. The antenna is
connected to WiMAX radio via a cable known as a "pigtail".
4.1 WiMAX Radios:
A WiMAX radio contains both a transmitter and a receiver to simultaneously send and receive. It
generates signals at a frequency known as the carrier frequency (usually between 2 and 11 GHz).
4.2 WiMAX Antennas:
WiMAX antenna, are designed to provide efficient performance for the required application.
There are three man types:
Omni-directional: Omni directional antennas are used for point-to-multipoint configurations.
Sector: A sector antenna focuses the beam in a specific focused area, offers greater range and
throughput with less energy.
Flat-Panel: Panel antennas are most often used for point-to-point applications.
5. WiMAX Features:
5.1WiMAX OFDM-based air interface (PHY Layer):
The WiMAX air interface (PHY Layer) is based on Orthogonal Frequency Division Multiplexing
or OFDM. The WiMAX RF signals use OFDM techniques and its signal bandwidth can range
from 1.25 to 20 MHz. To maintain orthogonality between the individual carriers the symbol
period must be reciprocal of the carrier spacing.
OFDM is based on a transmission scheme called multi-carrier modulation , which divides a high
bit stream into a number of low bit streams, which are each modulated by separate carriers called
subcarriers or tones.
5. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
13
These modulation schemes generally remove Inter Symbol Interference by keeping the symbol
duration large. But for high data rate systems where the symbol duration is small, the high bit
stream is splitted into several parallel streams increasing the symbol duration of each stream. The
sub-carriers are chosen such that they are orthogonal; hence there is no mutual interference
among the signal streams. This helps in removing ISI to some extent; but to completely remove it
guard bands are also added in the OFDM scheme.
5.2 Adaptive Antenna Techniques:
Adaptive Antenna Systems (AAS) used in WiMAX utilizes beam-forming techniques for
focusing and directing the wireless beam/signal between the base station and the receiver station.
This reduces interference from other external sources and noises, as the beam is focused directly
between two points. Dynamic Frequency Selection (DFS) schemes are applied in which air waves
are first scanned to determine where interference doesn’t occur, and specific frequencies in that
area where no interference occurs is selected.
WiMAX uses these techniques through the use of MIMO (multiple-input multiple output)
communication schemes. MIMO uses multiple antennas at both transmitter and receiver, which
sets up a multiple data stream on the same channel, increasing the data capacity of the channel to
a great extent. With multiple antennas at both transmitter and receiver, the transmitter and
receiver can synchronise and coordinate to move to afree frequency bandif and when interference
occurs. The use of these techniques provides lots of advantages on the basis of coverage, self-
installation, power consumption, frequency re-use and bandwidth efficiency. Use of beam form
techniques and MIMO under WiMAX reduces interference while increasing throughput and
efficiency.
5.3 Adaptive Modulation and Coding:
WiMAX supports a variety of modulation and coding schemes in its specifications. These
schemes are adaptive, that isthey can be made to vary the parameters, according to the prevalent
conditions; they can also be made to change on a burst-by-burst basis per connection.
The coding and modulation schemes maintain a steady signal strength by using different schemes
over increasing distance ; this is achieved by decreasing throughput over range so as to provide
the best Quality of Service (QoS) possible over distance. Also, a technique called Dynamic
Bandwidth Allocation (DBA) is used, which monitors the network for interference or reduction in
signal strength, the base station allocates more bandwidth to the afflicted stream.
To determine the required WiMAX modulation and coding scheme the channel quality feedback
indicator is used. The mobile (UE) can provide the base station (BS) with feedback on the
downlink channel quality and for the uplink, the base station can estimate the channel quality,
based on the received signal quality.
The various modulation schemes used under WiMAX:
Downlink: BPSK, QPSK, 16 QAM, 64 QAM; BPSK optional for OFDM-PHY.
Uplink: BPSK, QPSK, 16 QAM; 64 QAM optional.
The various coding schemes used under WiMAX:
Downlink: convolutional codes at 1/2, 2/3, 3/4, 5/6
Uplink: convolutional codes at 1/2, 2/3, 3/4, 5/6
6. Simulation Model:
The design of the simulated transmitter and receiver for the WiMAX OFDM based PHY layer is
shown below. This design is basedon the physical layer of the IEEE 802.16 2004 WIMAX
OFDM air interface. In this setup, we have used for simulation only the compulsory features of
6. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
14
the specification, while omitting the other features for future improvements. Channel coding part
is divided of three parts Randomization, Forward Error Correction (FEC) and Interleaving.
FEC is done in two steps, firstly through Reed Solomon (RS) Code and then using Convolutional
Code (CC). These are applied in the reverse order at channel decoding at the receiver side. The
complete channel encoding and decoding setup design is shown.
Simulation Setup
Channel Encoding Setup
Channel Decoding Setup
This structure is based on the physical layer of the IEEE 802.16 Wireless MAN OFDM air
interface. The above given structure is explained in detail.
6.1 Randomization:
A Pseudo Random Binary Sequence generator is used to implement randomization. It uses a 15-
stage shift register with a generator polynomial of 1+x14+x15 with XOR gates in feedback
configuration.
6.2 Forward Error Correction:
This block consists of two layers: a first layer of Reed-Solomon coding followed by a second
layer of Convolutional coding. Reed Solomon codes are block codes that are quite good in
correcting burst errors, while convolutional codes are efficientin correcting random errors
7. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
15
generated during transmission in multipath channels. Both of them together provide an effective
measure to correct most type of errors generated in the channels.
6.2.1 Reed Solomon Encoder:
A Reed-Solomon code is defined as RS (N, K, and T) with l-bit symbols. The RS(N,K, and T)
means thatfor encoding, the encoder uses K data symbols of l bits each and adds 2T parity
symbols to create an N-symbol code word. These N, K and T can be defined as:
• N: total no. of bytes after the encoding process,
• K: total no. of data bytes before the encoding process,
• T: total no. of data bytes that can be corrected.
The error correction capabilities of a given RS code is given by (N – K), which is defined as the
measure of redundancy in the block. If the position oferrors in symbols is not known, a Reed-
Solomon code can used to correct up to T symbols, where T can be defined as T= (N – K)/2.
As per the standard, the RS code encoding has been created from a systematic RS (with N =255,
K = 239, and T= 8) code, which uses a Galois field given as GF (28
).
The given polynomials are used for code generator and field generator:
G(x) =(X+λ0
) (X+λ1
) (X+λ2
)…(X+λ2T−1
), λ=02 HEX
P(x) =X8
+X4
+X3
+X2
+1.
6.2.2 Convolutional Encoder:
After the RS coding, the encoded data is passed through a convolutional encoder. The encoder
has native rate of 1/2, a constraint length of 7 and the given generator polynomials are used to
produce its two code bits. The generator is shown below.
G1 = 171OCT ; For X output
G2 = 133OCT ; For Y output
Rate 1/2 convolutional encoder with memory 6
In order to get different coding rates, a process knows as a puncturing operation is performed on
the output of the convolutional encoder. A punctured convolutional code that is generatedfrom
the mother/native code rate 1/2, is performed with generator polynomials.
8. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
16
For decoding the received data, a soft input maximum likelihood sequence estimator utilized
throughthe Viterbi algorithm is used. The block sizes and code rates used in the modulations in
WiMAX systems as specified in IEEE 802.16 standard are shown.
Mandatory channel coding per modulation in WiMAX
6.3 Interleaver:
A block interleaver then interleaves the generatedRS-CC encoded data. Under the standard IEEE
802.16, the interleaver is defined in two stepsof permutations. The first results in adjacent coded
bits being mapped onto nonadjacent subcarriers. The second permutation resultsin adjacent coded
bits are mapped alternately onto less or more significant bits of the constellation, thus reducing
long streams of unusable bits.
6.4 Data Symbols Modulation Mapper:
The bit interleaved data are then passed through the constellation mapper, where depending upon
the size of the input interleaved data,modulated data is generated using one of the following four
different modulation schemes: BPSK, QPSK, 16-QAM and 64-QAM.
6.4.1 Subcarriers Allocation:
The WiMAX standardspecifies three types of subcarriers, which are known as, data, pilot and
null subcarriers. The mapped data are to be arranged in a matrix where the rows number is equal
to the number of data subcarriers. The pilot and null subcarriers are then inserted to form the total
subcarriers. Table below givesclassification of subcarriers for both fixed and mobile WiMAX
systems according to the IEEE 802.16d and 16e standards.
6.5 IFFT:
The IFFT is used to generate a time domain signal, for the symbols generated after modulation
can be considered as the amplitudes of a certain range of sinusoids. Each of the discrete samples
9. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
17
before applying the IFFT algorithm is for an individual subcarrier. Besides ensuring the
orthogonality of the OFDM subcarriers, the IFFT represents also a quick and efficient way for
modulation of the subcarriers in parallel, and hence, the reducing the use of multiple modulators
and demodulators.
The generated data after subcarrier allocation are provided to the IFFT for time domain mapping.
6.6 Cyclic Prefix Insertion:
To reduce the effects of multipath, a cyclic prefix is added to the time domain samples. Four
different cyclic prefix types/durations are provided in the standard. It is taken as G,which is
defined as the ratio of CP time to OFDM symbol time, and can be equal to 1/32, 1/6, 1/8 and 1/4.
6.7Stanford University Interim (SUI) Channel Model:
SUI or, the Stanford University Interim Channel Model is a set of 6 channel models for three
different terrain types and also provide a variety of Doppler spreads, delay spreads and line-of-
sight/non-line-of-site conditions (LOS/NLOS). It definessix channelsto address three different
terrain types.
These three terrain types are defined as A, B and C; Terrain A is hilly terrain with moderate to
heavy tree density and high path loss;Terrain B is hilly terrain with light tree density or flat
terrain with moderate to heavy tree density and moderate path loss; and C is mostly flat terrain
with light tree density and has low path loss.
These models can be used for simulation, testing, and design of technologies used for fixed BWA
applications.
SUI Channels and their characteristic parameters
After the wireless channel we have the receiver model, the receiver basically performs the reverse
operation of the transmitter as well as channel estimationswhich are required to generate the
unknown channel coefficients.
10. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
18
Firstly, the CP is removed and the received signal is converted to the frequency domain using, the
FFT algorithm. An OFDM symbol is composed by data, pilots, and null sub carriers. Hence a
process to separate and divide all the subcarriers is necessary in between. Firstly the guard bands
are removed followed by a disassembling, which is done to generate pilots and data
subcarriers.The pilot subcarriers are used in channel estimation, for calculating the channel
coefficients.To perform an equalization of the data these estimated channel coefficients can be
used in the demapper, so as to compensate for the frequency selective fading of the multipath
propagation channel. After demapping of data, it enters the decoder block.
7. Simulation Results:
7.1 Physical layer performance results:
The aim behind simulating the physical layer of WiMAX was to study BER performance under
different channel conditions and varying parameters, which are used to determine and
characterise the performance of these systems.
7.2 Performance Analysis of WiMAX PHY layer with and without channel coding:
Here simulation of FEC, that is, the combined Reed Solomon and Convolutional code; are done
to checkhow much performance reduction will be created in the system (if such codes are not
utilised in the system).To test this simulation, SUI-3 channel model are used.
We define the following input parameters in our simulations:
• Length of CP: 1/4, 1/8, 1/16, 1/32
• Type of Modulation Used: BPSK, QPSK, 16QAM or 64QAM
• Channel type: SUI (1-6)
• Channel Bandwidth: 1.25 – 28 MHZ
In this section we have presented various BER vs. SNR plots for the different modulations under
SUI –3 Channel Model.
13. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
21
The chief advantage of cyclic codes is that they provide much ease in encoding and also provide a
well-defined mathematical structure for efficient decoding schemes. Reed Solomon codes are
block codes that are quite good in correcting burst errors, while convolutional codes are
efficientin correcting random errors generated during transmission in multipath channels. Both of
them together are quite efficient in correcting most type of errors generated in the wireless
channels.
Reed-Solomon codes are one most powerful and efficient code to correct the errors generated
during transmission, and hence by using this codes in WIMAX we can reduce the bit-error in
noisy environment and useful to provide the efficient data to the subscriber. And by using RS-CC
codes, further reduction of bit error is achieved. Thus utilizing FEC we can transmit very high
data rates in limited bandwidth channels.
7.3 Performance analysis of WiMAX PHY layer using different values of CP:
In the simulation model of WiMAX PHY Layer, data is modulated and then Cyclic Prefix is
added to it to reduce the effect of fading, and also for receiver synchronisation. In this model SUI
– 3 channel is considered.
Comparing transmitted data and demodulated data, we get the Bit Error Rate.
We define the following input parameters in our simulations:
• Type of Modulation Used: BPSK, QPSK, 16QAM or 64QAM
• Channel type: SUI ( 1-6)
• Channel Bandwidth: 1.25 – 28 MHZ
15. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
23
CP isquite an important factor in WiMAX systems. CP reduces the speed and rates of
transmission of data, but it is also required to combat the effects of multipath propagation.Hence
large CP generally used for reducing effects of multipath. Large CP also means large time gaps
between two frames, hence giving extra time to receiver to receive signals from multipath
channels. Though large CP has a disadvantage of reducing data rates, it increases coverage area to
long distances, and hence providing choice of CP as per coverage area requirements.
With increasing distance, signal strength as well as SNR decreases; as a solution to decreasing CP
we use lower modulation levels from higher modulation levels. At low SNR, fading is more and
signal strength is going low as distance increases.
Thus depending upon the requirements of the system, the CP value is to be defined and used for
in the OFDM symbol.
7.4 Performance Analysis of WiMAX PHY layer under Different SUI Channel
Models:
Here we simulate and analyse the performance of the WiMAX systems by varying the
modulation techniques in different SUI channel models.
Here we have simulated the WiMAX PHY layer under the different SUI channel models and
analyse their BER vs. SNR plots
We provide the following input parameters:
• Length of CP : 1/4, 1/8, 1/16, 1/32
• Type of Modulation Used : BPSK, QPSK, 16QAM or 64QAM
• Channel Bandwidth : 1.25 – 28 MHZ
In this section, various BER vs. SNR plots presented which obtained for all the essential
modulation profiles in the standard with the same ratio of cyclic prefix and almost equal channel
bandwidth.
17. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
25
Here the performance analysis of Fixed WIMAX PHY layer for OFDM on different channel
condition has been done.
18. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
26
The channels in Category C (SUI1 SUI2) show minimum path loss, due to their flat terrain with
light tree densities.
The channels in Category B (SUI3 SUI4) provide results between Category A and Category B,
showing moderate path loss (due to terrain being a mixture of hills with light tree density and
plains with moderate tree density)
The channels in category A (SUI5 SUI6) contain more noise and suffer from high attenuations
(due to terrain of hills with heavy tree density). Hencehigher SNR values are required, thus
requiring more power for bits to be transmitted over a high fading channel from base station to
receiver station.
8 Conclusions:
In this paper we provide an introduction to the WiMAX standard and its specifications and
parameters. This paper also gives on a simulation of the WiMAX PHY layer under various
channel conditions. Thesimulated PHY layer supports all the modulation and coding schemes
defined in the standard, as well as the different CP lengths.At the receiver, perfect channel
estimation is assumed. The performance evaluation was done, on the basis of performance
analysis tests done, on the effect of channel coding, on the effect of variable CP, and under
different SUI Channel Models using the WiMAX PHY layer. The BER curves have been used to
compare and analyse the performance of different modulation and coding scheme used. These
results provide us quite a comprehensive overview of the WiMAX systems using OFDM physical
layer under varying conditions of the wireless channel.
From the performance analysis done, we can conclude the performance of Fixed WiMAX as,
Binary Phase Shift Keying (BPSK) isvery power efficient and also requiresquite less bandwidth,
but has low data rates. However 64-Qadrature Amplitude Modulation (64-QAM) has very high
bandwidth requirements but it also provides very high data rates. Quadrature Phase Shift Keying
(QPSK) and 16-QAM modulation techniques, on the other hand provide data rates in between
BPSK and 64-QAM; they require more bandwidth than BPSK but less than 64-QAM; they also
have lower power efficiency then BPSK but better than 64-QAM.
On the case of BER, BPSK provides the least values of BER, while 64-QAM provides the highest
values of BER, and QPSK and 16-QAM providing values in between the two, BPSK and 16-
QAM.
REFERENCES:
[1]. Berezdivin R, Breinig R, Topp R. ―”Next-generation wireless communications concepts and
technologies”. IEEE Communications Mag 2002; 40(3): 108–116.
[2]. IEEE 802.16-2004, ―”Local and Metropolitan Networks — Part 16: Air Interface for Fixed
Broadband Wireless Access Systems”,2004.
[3]. A. Ghosh et al., ―Broadband Wireless Access with WiMAX /802.16: Current Performance
Benchmarks and Future Potential” ,IEEE Communication Mag., vol. 43, Feb. 2005.
[4]. G. Andrew, ArunabhaGhosh, RiasMuhamed : “Fundamentals of WiMAX: Understanding
Broadband Wireless Access”.
[5]. William Stallings, “Wireless: Communications and Networks”, Pearson Education, 2002.
[6]. Theodore S. Rappaport, “Wireless Communications”, Prentice Hall, Second Edition, 17th Printing,
March 2008
[7]. V. Erceg, K.V.S. Hari, M.S. Smith, D.S. Baum et al, “Channel Models for Fixed Wireless
Applications”, IEEE 802.16.3 Task Group Contributions 2001
[8]. WiMAX Forum, “Mobile WiMAX – Part 1: A Technical Overview and Performance Evaluation”,
August 2006
[9]. Koffman, I.; Roman, V.,”Broadband wireless access solutions based on OFDM access in IEEE
802.16” Communications Magazine, IEEE, Vol.40, Iss.4, April 2002.
19. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.3, May 2013
27
[10]. IEEE Std 802.16-2001,” IEEE Std. 802.16-2001 IEEE Standard for Local and Metropolitan area
networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems”, December 2001
[11]. Maninder Singh, KiranAhuja “Performance Evaluation Of Adaptive Modulation Techniques Of
WiMAX Network With Cyclic Prefix” International Journal Of Advanced Engineering Sciences And
Technologies Vol No. 3, Issue No. 1, ISSN: 2230-7818
[12]. A. Md. Anamul Islam, B. Md. Abdul Kader, C. Md. Julkarnain “BER Performance Analysis of a
Real Data Communication through WiMAX-PHY Layer over an AWGN and Fading Channels”
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 04
[13]. Md. Ashraful Islam, RiazUddinMondal, Md. ZahidHasan “Performance Evaluation of Wimax
Physical Layer under Adaptive Modulation Techniques and Communication Channels” (IJCSIS)
International Journal of Computer Science and Information Security, Vol. 5, No.1, 2009
[14]. Ali Hasan Ali Al-Qahtani “Analysis and Simulation of MC-CDMA System for WiMAX Technology /
IEEE 802.16, http://libback.uqu.edu.sa/hipres/ABS/ind10609.pdf
[15]. Team Mahindra “802.16e & 3GPP Systems Network Handover
Interworking”http://www.wimax.com/whitepapers/tech-mahindra-80216e-3gpp-systems-network-
handover.pdf
[16]. BP Tiwari “WiMAX 2.0 for Operators”, http://www.wimax.com/whitepapers/bp-tiwari-wimax-20-
for-operators.pdf
[17]. WiMAX Network Reference Model,
http://www.tutorialspoint.com/wimax/wimax_network_model.htm
[18]. WiMAX Forum “WiMAX: The Quintessential Answer to Broadband in India”
http://resources.wimaxforum.org/sites/wimaxforum.org/files/wimax_in_india_protiviti_paper_0.pdf
[19]. WiMAX Forum “WiMAX a Wireless Solution for Fixed Wireless Access in Emerging Markets”
http://resources.wimaxforum.org/sites/wimaxforum.org/files/document_library/DAP0410_WIMAX
%20A%20WIRELESS%20SOLUTION%20FOR%20FIXED%20WIRELESS%20ACCESS%20IN
%20EMERGING%20MARKETS.pdf
[20]. Technical University of Lisbon “Analysis of WiMAX Data Rate Performance”
http://www.wimax.com/whitepapers/university-of-lisbon-analysis-of-wimax-data-rate-
performance.pdf
[21]. PrabhakarTelagarapu ,G.B.S.R.Naidu . K.Chiranjeevi “Analysis of Coding Techniques in WiMAX”
International Journal of Computer Applications (0975 – 8887) Volume 22– No.3, May 2011
[22]. What is WiMAX, http://www.wimax.com/education/wimax/what_is_wimax
[23]. Gazi Faisal Ahmed Jubair Muhammad Imran Hasan Md. ObaidUllah, “Performance Evaluation of
IEEE 802.16e (Mobile WiMAX) in OFDM Physical Layer”
http://www.bth.se/fou/cuppsats.nsf/all/fbeadb9951fb97f2c125762600348058/$file/Performance%20
Evaluation%20of%20IEEE%20802.16e(Mobile%20WiMAX)%20in%20OFDM%20Physical%20La
yer.pdf
[24]. How Stuff Works -WiMAX http://www.howstuffworks.com/wimax.htm
[25]. WiMAX Tutorial, http://www.wimax.com/table/wimax-tutorial/