You are on page 1of 6

1

Performance Improvement of IEEE802.16-2004


System in Jamming Environment via Link
Adaptation
Juan Li, Sven-Gustav Häggman

As the most common threat in electronic warfare, jamming


Abstract— Beginning with a study on the performance of denies military networks via attacking its radio frequency
IEEE802.16-2004 based system in military specialized media. It is therefore of practical significance to evaluate the
environment where jamming is prominence, this paper focuses on system performance under jamming.
system performance enhancement in jamming environment via
Various jamming strategies can be employed to attack
link adaptation. Two types of jamming are considered: multitone
pilot jamming and partial-band jamming.
communication systems. In IEEE802.16-2004 based system,
The results of computer simulation show that the system is data are transmitted via a number of orthogonal low rate
vulnerable to jamming. Further, multitone pilot jamming subcarriers, with some of them acting as pilots. For the system
degrades the system performance more severely than partial- two types of jamming may be possible: partial-band jamming
band jamming, when jamming resource is of limited power. A where the jamming signals are placed on the partial/whole
robust characteristic is observed from the standard newly defined subcarriers, and multitone pilot jamming where the jamming
operation mode, ‘BPSK 1/2’, under most of the jamming signals are placed just on the pilot subcarriers, assuming that
scenarios. the knowledge of the system is obtained beforehand.
Accordingly, a practical mean carrier-to-interference-noise Karhima et al. [3] suggested that link adaptation may
ratio (CINR) based link adaptation algorithm is proposed with
improve the performance of jammed WLAN systems. Link
merit that it requires no change to the current protocol. In the
assumed jamming scenario, the system with link adaptation and adaptation is a resource management method widely applied in
systems with fixed operation mode are tested and compared. The wired and wireless communication systems [4-7].
simulation results verify that the system operating in jamming IEEE802.16-2004 offers the possibility of implementing link
environment achieves performance improvement from both adaptation, but the details are left open. Hence, developing
throughput and service stability aspects by applying the proposed link adaptation algorithms for IEEE802.16-2004 system falls
link adaptation algorithm. A parameter ‘imperfectness’ is into the interest of the present work.
introduced to evaluate the algorithm. Higher efficiency is found in This paper is organized as following: a review on one of
system under partial-band jamming. An optimal value of α used the physical layer (PHY) specifications of IEEE802.16-2004,
for estimating the mean CINR is proposed to be around 0.3.
WirelessMAN-OFDM, is given in Section 2. Section 3 gives
an introduction of the simulation model. With the model,
Index Terms— IEEE802.16-2004, link adaptation, mean CINR,
WiMAX Section 4 presents an investigation on the performances under
partial-band- and multitone pilot jamming. Link adaptation is
I. INTRODUCTION introduced in Section 5 as a countermeasure to jamming. The
proposed algorithm is verified for both types of jamming. Its
T HERE has been a strong push to make greater use of
commercial off-the-shelf (COTS) products in military
systems for the sake of resource saving. As the first standard of
effectiveness and efficiency are evaluated. Optimization to the
algorithm is studied as well. Conclusions are made in Section
6.
WiMAX product, IEEE802.16-2004 [1] plays the roles from
acting as backhaul for Wi-Fi hot spots to providing last-mile II. WIRELESSMAN-OFDM PHY
high speed broadband wireless access (BWA) to Internet. For
To accommodate various implementation features in the
non-line-of-sight (NLOS) operation, the IEEE802.16-2004 frequency bands 10-66GHz, IEEE802.16-2004 specifies five
based system is expected to provide up to 75Mbps throughput air interfaces. Among them, WirelessMAN-OFDM PHY based
for a system with 20MHz channelization, in a typical coverage on orthogonal frequency-division multiplexing (OFDM) is
range of 3-5 miles, maximally 30 miles [2]. The range and designed for NLOS operation in the frequency bands below
NLOS capability make WiMAX technology attractive and 11GHz. It is selected as the investigated air interface in this
cost-effective for military tactical network. paper.
However, the reliability and efficiency of the WiMAX In WirelessMan-OFDM PHY, the information data on the
network is challenged by the electronic warfare in battlefield. transmitter side are first sent to channel encoder, which
consists of randomizer, forward error correction (FEC)
encoder, and interleaver. The randomizer uses a linear

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
2

feedback shift register (LFSR) to scatter long data strings of III. SIMULATION
‘0’ or ‘1’. The FEC helps to correct the errors in the faded
subcarriers to a certain limit. It concatenates an outer Reed- A. Model
Solomon encoder together with an inner rate- compatible
convolutional encoder. The interleaver uses two permutations The simulation is carried out on the link level by using
to rearrange the subcarriers so that the burst errors are Monte Carlo method with the aid of Matlab. The procedures
distributed more uniformly at the demodulation input. After are depicted in Fig. 2.
channel coding, data bits are mapped and modulated onto the Randomi- RS- Conv.
Interleave Mapping OFDM
zation encode Coding
allocated subcarriers by modulations, which include BPSK,
Gray-mapped QPSK, 16-QAM and 64-QAM. Different Multipath

combinations of modulation and FEC result in different block


sizes and code rates, IEEE802.16-2004 WirelessMAN-OFDM AWGN

PHY defines seven combinations (modes) of mandatory Equalizer

channel coding per modulation, which are listed in Table. I. De-


Randomi-
De- De-Conv. De- De- De-
Jamming
RScode Coding Interleave Mapping OFDM
For later reference convenience, they are numbered as Mode 1 zation

to Mode 7. When the modulation is done, modulated data are Fig. 2. Link level simulation
multiplexed by OFDM. In the receiver side, all the procedures In addition to jamming, the system is subjected to
that carried out in the transmitter side are implemented in a multipath fading and additive white Gaussian noise as well.
reverse direction. The channel is simulated as a frequency selective, slow fading
TABLE I channel by snapshot approach. Channel equalization is based
MANDATORY MODULATION / CODING MODES [1]
on comb type pilot channel estimation [8], which is achieved
Mode Modulation Block size (bytes) RS code CC
Uncoded Coded code rate by the channel information collected at the pilot subcarriers.
1 BPSK 12 24 (12,12,0) 1/2 At the receiver side, jamming is added to the specified
2 QPSK 24 48 (32,24,4) 2/3 subcarriers with varying signal-to-jamming ratio (SJR) values.
3 QPSK 36 48 (40,36,2) 5/6 Assuming that a total jamming power Jtot is distributed evenly
4 16-QAM 48 96 (64,48,8) 2/3 to m subjammers, and the power of each subjammer is
5 16-QAM 72 96 (80,72,4) 5/6
6 64-QAM 96 144 (108,96,6) 3/4
J0=Jtot/m. SJR is defined as
7 64-QAM 108 144 (120,108,6) 5/6 Eb Eb
SJR(linear ) = = (1)
NJ J0 W
The time duration of an OFDM symbol is composed of where Eb is the signal energy per bit, NJ is the jamming power
the useful symbol time Tb and the cyclic prefix (CP) time Tg. spectral density, and W stands for the bandwidth of one
The cyclic prefix is a duplication of the tail part of the useful subjammer.
symbol and placed in the beginning of the symbol. With The parameters adopted in the simulation and their
proper duration Tg, it may efficiently mitigate the effect of settings are listed in Table. II. In the table, Nfft is the number of
multipath. From frequency domain viewpoint, an OFDM total subcarriers (the number of points in the fast Fourier
symbol is made up from a series of subcarriers as shown in transform (FFT)). Nused is the number of used subcarriers. The
Fig. 1. For WirelessMAN-OFDM PHY air interface, the signal-to-noise ratio (SNR) is set as high as 20dB since the
number of subcarriers for one OFDM symbol is 256. They are study here focuses on jamming.
divided into three types: 192 data subcarriers which carry
payload, 8 pilot subcarriers which are mainly for channel TABLE II
estimation, and 56 null subcarriers which are for guarding SIMULATION SETTINGS
purpose. The pilot subcarriers are distributed uniformly among channel bandwidth 7 MHz Nfft 256
Nused 200 sampling factor n 8/7
the data subcarriers.
CP ratio G (Tg / Tb) 1/4 SNR 20 dB
OFDM symbol duration 40 µs
channel path gains [0 -4 -8] dB
channel path delays [0 1.5 4] µs

B. Investigated Jamming Strategies


As stated above, pilot subcarriers are critical for channel
estimation and equalization. In case they are jammed, the
recovery of the transmitted data encounters difficulties. Two
jamming strategies are considered: (1) multitone pilot
jamming, in which the pilot subcarriers are jammed; (2)
Fig. 1. OFDM symbol Frequency domain structure [1] partial-band jamming, in which part or all of the system
bandwidth are jammed. Depending on the number of
subjammers, four multitone jamming scenarios and three
partial-band jamming scenarios are tested. They are listed in
Table. III and numbered as Scenario 1 to 7.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
3

that Mode 1 presents ‘saturation’ characteristic except for the


TABLE III
INVESTIGATED JAMMING SCENARIOS Scenario 4 (jamming 8 pilots) and 7 (jamming 100%
Multitone Jamming Partial-band Jamming bandwidth). ‘Saturation’ here refers to the phenomenon that
Scenarios Number of Scenarios Percentage of Jammed the system becomes insensitive to the increase of jamming
No. Jammed Pilots No. Bandwidth power after it reaches a certain value. Actually ‘Saturation’ is
1 1 5 30% also observed in other modes but only appears under the
2 2 6 50%
3 4 7 100%
jamming of Scenario 1. As a new mode introduced by
4 8 IEEE802.16-2004, Mode 1 endows more robustness to the
system under jamming.
Jamming is assumed to start from the low frequency side, In general, the throughput loss resulting from partial-band
e.g., in Scenario 2 jamming is applied to the first two pilot jamming is less than that of the multitone jamming, indicating
subcarriers (refer to Fig. 1), and in Scenario 5 jamming is that multitone jamming degrades the system performance more
applied to the leftmost 30% of the subcarriers. For each severely than the partial-band jamming does. In multitone pilot
jamming scenario, all the seven modes are tested at various jamming, the number of jammed pilots determines the
SJR values. Each SJR value test involves 106 bits transmission. jamming severity and Scenario 4 (jamming 8 pilots) degrades
After data recovering, the packet error rate and the throughput the system the most. In partial band jamming, system
are recorded. performance is degraded by either increased power of
The system performance is evaluated in terms of subjammer or increased number of subjammer, depending on
throughput calculated by the level of jamming power. More details have been presented
Thrpt = Thrpt max ⋅ (1 − PER ) (2) elsewhere [9].
where PER is packet-error-rate, Thrptmax is the expected data
payload within unit transmission time. The maximum V. LINK ADATPTATION
throughputs of different modes are listed in Table. IV Jamming introduces impairment to the channel whereas
according to the simulation settings. link adaptation is widely applied to adapt the varying channel
conditions. The principle of link adaptation is to accommodate
TABLE IV a highly protected mode with low data rate to a harsh channel
MAXIMUM THROUGHPUT OF SEVEN MODES BEFORE FEC and a weakly protected mode with high data rate to a good
Mode No. 1 2 3 4 5 6 7 channel,
Thrptmax(Mbps) 1.2 2.4 3.6 4.8 7.2 9.6 10.8
WirelessMAN-OFDM PHY supports a frame-based
transmission. The downlink subframe contains a large number
IV. SYSTEM PERFORMANCE UNDER THE JAMMING SCNEARIOS of bursts. One or several downlink bursts are able to be
transmitted with different burst profiles, which provide the
Comparisons among the jamming scenarios are carried out basis for implementing link adaptation.
to reveal their performances. As an example, the throughput The seven combinations of modulation and encoding in
versus jamming power for Scenario 1 (jamming 1 pilot) is the standard provide a good opportunity of implementing link
plotted in Fig. 3. The throughput is presented in percentage adaptation. In fact, IEEE802.16-2004 defines per-allocation
which is the ratio of actual throughput to the maximum adaptive modulation and coding shall be supported. However,
throughput of the corresponding mode. The total jamming the algorithm is left open.
power ‘1’ is the power used in 100% bandwidth jamming
when SJR is 0 dB. A. Algorithm
The results show that the system performances decrease as The key issue of link adaptation is to select the channel
the jamming power increases. An interesting observation is quality metric. In IEEE802.16-2004, two parameters are
defined for channel quality measurement: received signal
100% Jam 1 pilot Jam 2 pilots
Jam
Jam
4 pilots
30% Bd.
Jam 8 pilots
Jam 50% Bd.
strength indicator (RSSI) and interference-and-noise-ratio
90% Jam 100% Bd.
(CINR). Their statistic calculations are mandatory and results
80%
are obtained directly from the subscriber station. Thereafter
70%
selecting the channel quality metric from them is quite
Thrpt/Thrptmax x100%

60% straightforward with no needs to change the protocol. RSSI


50% offers channel strength assessment, while CINR provides the
40% information on the actual operating condition of the receiver,
30% including interference, noise level and signal strength. The
20%
latter is thus more capable of reflecting the real channel
10%
condition. In the present work, the mean CINR statistic is
0%
chosen as the channel quality metric.
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 The estimation of the CINR of a single message can be
Power of Jamming
achieved by ([1]).
Fig. 3. Throughput performance of Mode 1
under seven jamming scenarios

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
4

N −1 d1 stays constant. The range of d2 is set as 15811 m to 500 m.


∑ s[k , n]
2
As the jammer approaching the receiver, SJR is assumed to be
CINR[k ] = n =0 (3)
N −1 a function of d2. When d2 changes from maximum to
∑ r [k , n] − s[k , n]
2
n =0 minimum, the SJR for jamming scenario 7 changes from 30 dB
where r[k , n] is the n-th received sample within message k, to 0 dB. The jammer uses the seven jamming scenarios to
s[k , n] is the corresponding detected or pilot sample
attack the system. Since the power of jammer is fixed, the
values of SJR versus distance for the seven jamming scenarios
corresponding to symbol n. The mean CINR statistic (in dB) is
are different and plotted in Fig. 5.
derived from multi samples of the single message:
The performance of the system is simulated with and
D D
µ CINR dB [k ] = 10 log(µ CINR [k ]) without link adaptation using the same settings as shown in
where (4) Table. II.
D CINR[0] k=0 In addition, the estimation of channel quality metric, mean
µ CINR [k ] =  D
(1 − α )µ CINR [k − 1] + α ⋅ CINR[k ] k >0 CINR, is directly affected by the parameter α in equation (4).
However, the decision of α value is empirical and the standard
k is the time index for the message. α is an averaging leaves it to the vendor. Hence, five values of α, 0.1, 0.3, 0.5,
parameter in the range of [0, 1] specified by basestation. 0.7 and 0.9 are tested in the simulation.
K
µ CINR dB [k ] is the actual value that can be obtained from the
subscriber station, and is used as the channel quality metric.
30
Another issue for the link adaptation algorithm is the
reporting time, which refers to the time period between two
20
continuous checking of the channel quality. It should not be
either too short so that the radio resource is wasted, or too long 10
so that the channel condition tracing fails. In this work, it is set
to be 10 bursts, assuming each burst contains one OFDM SJR (dB)
0
symbol. Jam 1 pilot
Jam 2 pilots
The link adaptation is implemented by the following -10
Jam 4 pilots
steps: Jam 8 pilots
step 1. System operation starts with Mode 1. -20 Jam 30% Bd.
Jam 50% Bd.
step 2. The message bursts are continuously transmitted Jam 100% Bd.
until the end of one reporting time (10 bursts). -30
14500 12500 10500 8500 6500 4500 2500 500
K
step 3. The mean CINR statistic µ CINR dB [k ] is calculated Distance (m )

with equation (4), in which CINR[K] is obtained from


Fig. 5. SJR versus distance
equation (3).
K
step 4. If the resulted µ CINR dB [k ] is found to be out of the C. Effectiveness of the Link Adaptation Algorithm
operation range of the current mode, the operation mode will The throughputs of the systems under jamming scenario 5
be modified in the following burst and remains unchanged to 7 are shown in Fig. 6 as examples. Two criteria can be then
during the following reporting time. introduced to evaluate the performance with and without link
step 5. If there are more bursts to transmit go back to step adaptation: (1) the highest throughput is expected, which is
2. measured by the mean value of throughput; (2) the throughput
The operation range for each mode is a set of thresholds should be as stable as possible, which is measured by its
which are composed of a lower and an upper limit. The CINR standard deviation.
thresholds are obtained from previous simulations [9]. The mean x and standard deviation s N of throughput are
B. Testing Environment calculated as:
In order to evaluate the performance of the proposed link 1 n
x= ∑ xi (6)
adaptation algorithm, a simplified jamming case is used as n i =1
illustrated in Fig. 4. There are two connections: link 1 is the 2
transmission between the transmitter and the receiver; link 2 is n  n 
n ∑ x 2 −  ∑ x 
the transmission between the jammer and the receiver. The sN =
i =1  i =1  (7)
jammer, say, an airplane, moves towards the transmitter in a n(n − 1)
very high and constant speed, thus, d2 decreases quickly while The results are plotted as histograms and two of them are
presented in Fig. 7 as examples.
Among the seven fixed operation modes, Mode 6 owns
Link 1, d1 the highest throughput for the two cases in Fig. 7. However it
is accompanied with the highest standard deviation as well.
Receiver Transmitter
Link 2, d2
Jammer This means the high throughput is achieved at the expense of
low stability: when the jammer is approaching, the throughput
Fig. 4. Imagined jamming case corrupts rapidly even to zero. The lowest standard deviation

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
5

12 12 12
with LA with LA with LA
fix mode 1 fix mode 1 fix mode 1
10 fix mode 2 10 fix mode 2 10 fix mode 2
fix mode 3 fix mode 3 fix mode 3
Throughput (Mbps)

fix mode 4

Throughput (Mbps)

Throughput (Mbps)
fix mode 4 fix mode 4
8 8 8
fix mode 5 fix mode 5 fix mode 5
fix mode 6 fix mode 6 fix mode 6
6 fix mode 7 6 fix mode 7 6 fix mode 7

4 4 4

2 2 2

0 0 0
14500 12500 10500 8500 6500 4500 2500 500 14500 12500 10500 8500 6500 4500 2500 500 14500 12500 10500 8500 6500 4500 2500 500
Distance (m) Distance (m) Distance (m)

(a) (b) (c)


Fig. 6. System performances under different jamming scenarios, α=0.3 (a) jamming scenario 5: jamming 30% bandwidth
(b) jamming scenario 6: jamming 50% bandwidth (c) jamming scenario 7: jamming 100% bandwidth

belongs to Mode 1, which proves the robustness of this mode unavoidable misjudgement. The non-overlapped area between
again, but too cautious protection gains itself the lowest the link adaptation curve and the envelope measures the level
throughput. of misjudgement. As the jammed bandwidth increases from
The throughput of the system with link adaptation is 30% to 100% in Fig. 6, the non-overlapped area diminishes
higher than that with any of the fixed modes. Meanwhile, its gradually. In Fig. 6 (c), the difference is so small that the two
standard deviation remains at a moderate level. This indicates curves are almost the same. Similar observations are also
the superior performance of the system, either in quantity or in obtained in jamming Scenarios 1 to 4.
quality of the service. Imperfectness is introduced here for the purpose of
comparing the link adaptation efficiencies among different
D. Efficiency of the Algorithm
jamming scenarios. It refers to the ratio between the non-
As shown in Fig. 6, the throughputs for system either with overlapped area and the area under the envelope:
or without link adaptation all decrease with the distance d2.  N 
The throughputs of systems with fixed mode obtain the highest  ∑ Thrpt LA (i ) 
 i =1 
value alternatively but none of them can persist through the IMP = 1 −
N  × 100% (5)
entire simulation time. In other words, the system performance  ∑ Thrpt envelope (i ) 
 
 i =1 
is not optimized. When link adaptation is applied, the
throughput approaches the envelope of those throughput where N is the total number of simulation trials. ThrptLA is the
curves of fixed modes, as shown by the bold line in Fig. 6. throughput obtained by system with practical link adaptation,
In principle, an ideal link adaptation should produce a Thrhptenvelope is the throughput obtained by ideal link
throughput curve exactly the same as the envelope of the seven adaptation. The results are listed in Table V.
TABLE V
curves. However, practically it can never be realised due to IMPERFECTNESS UNDER DIFFERENT α
7.0E+06
Mean Standard Deviation Jamming 1 2 3 4 5 6 7
6.0E+06 scenario No.
5.0E+06
α = 0.1 30% 17% 9% 4% 4% 4% 1%
α = 0.3 30% 18% 8% 3% 4% 3% 1%
4.0E+06
α = 0.5 28% 20% 12% 6% 5% 4% 1%
3.0E+06 α = 0.7 28% 22% 15% 10% 6% 4% 2%
2.0E+06 α = 0.9 31% 26% 20% 14% 7% 7% 2%
1.0E+06
The imperfectness of Scenario 5 to 7 are very small. It
0.0E+00
with LA fix mode 1 fix mode 2 fix mode 3 fix mode 4 fix mode 5 fix mode 6 fix mode 7
confirms that the link adaptation algorithm adopted here is
efficient enough. The imperfectness of Scenario 1 to 4 varies
(a)
between 3% and 31%, It can be concluded that generally the
8.0E+06
Mean Standard Deviation
more subcarriers are jammed, the lower imperfectness link
7.0E+06

6.0E+06
adaptation achieves.
5.0E+06
Since the power of jammer is fixed, a large number of
4.0E+06
subjammers lowers the power allocated to each subjammer. As
3.0E+06
a result, the simulated SJR ranges for the seven scenarios are
2.0E+06
different (see Fig. 5). Instead of 0-30dB for Scenario 7, the
1.0E+06 simulated SJR for Scenario 1 varies from -23…7 dB. It
0.0E+00 indicates that the pilot subcarrier in Scenario 1 exposes to so
with LA fix mode 1 fix mode 2 fix mode 3 fix mode 4 fix mode 5 fix mode 6 fix mode 7
strong distortion that a correct mean CINR evaluation is
(b) always not possible, which leads to high ratio of misjudgment
Fig. 7. Performance comparison of systems with link adaptation and fixed in link adaptation. In Scenario 7, all the subcarriers receive
operation modes under different jamming scenarios, α=0.3 (a) scenario 5: jamming, so the jamming power is scattered and every
jamming 30% bandwidth (b) scenario 7: jamming 100% bandwidth subcarrier is only slightly affected. This gives a better

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
6

opportunity of accurate mean CINR evaluation and therefore http://www.wimaxforum.org/news/press_releases/Telephony_WiMAX.p


df , last visit on May 26, 2006
increases the efficiency of link adaptation.
[3] Karhima, T.; Silvennoinen, A.; Hall, M.; Haggman, S.-G.; “IEEE
E. Influence of α 802.11b/g WLAN tolerance to jamming”,
Military Communications Conference, 2004. Vol. 3, 31 Oct.-3 Nov.
According to Table V, most of the lowest imperfectness 2004 Page(s):1364 - 1370 Vol. 3
under different jamming scenarios happens when α equals 0.3. [4] Li Juan, Edward Mutafungwa, “Rate adaptation of convolutional coded
After α rises above 0.3, the larger α produces lower optical CDMA systems for improved goodput”, Optics
Communications, Vol. 240/4-6 (2004) pp 315-327.
throughputs. This suggests that the optimal value for α is [5] Queseth, O.; Gessler, F.; Frodigh, M. “Algorithms for link adaptation in
around 0.3. This agrees with the suggestion in [10], where 0.25 GPRS.”, Vehicular Technology Conference, 1999 IEEE 49th, Volume:
is proposed as the value of α. 2 , 1999 Page(s): 943 -947 Vol.2

According to the coefficients of µ CINR dB [k − 1] and [6] Daji Qiao; Sunghyun Choi; Shin, K.G.; “Goodput analysis and link
adaptation for IEEE 802.11a wireless LANs”, Mobile Computing, IEEE
µ CINR dB [k ] defined in equation (4), a relatively low α means Transactions on Vol. 1, Issue 4, Oct.-Dec. 2002 Page(s):278 - 292.
more weight is put on the historical value of mean CINR, and [7] Ramachandran, S.; Bostian, C.W.; Midkiff, S.F.; “A link adaptation
the system tends to make link adaptation decisions more on the algorithm for IEEE 802.16”, Wireless Communications and Networking
 Conference, 2005 IEEE Vol. 3, 13-17 March 2005 Page(s):1466 - 1471
historical µ CINR dB [k − 1] instead of on the current µ CINR dB [k ] . Vol. 3
This optimal value of α verifies the significance of using CINR [8] Coleri, S.; Ergen, M.; Puri, A.; Bahai, A.; “Channel estimation
statistic instead of instantaneous CINR as the channel quality techniques based on pilot arrangement in OFDM systems”,
Broadcasting, IEEE Transactions on, Vol. 48, Issue 3, Sept. 2002
metric in the standard. Page(s):223 - 229
[9] Juan Li, Sven-Gustav Häggman, “Performance of IEEE802.16-2004
VI. CONCLUSION based System in Jamming Environment and its Improvement with Link
Adaptation”, accepted by PIMRC’2006.
Motivated by the jamming threats in battle field, this [10] R. Yaniv, T. Kaitz, D. Stopler, “Corrections to CINR and RSSI
paper aims at improving the tolerance of IEEE802.16-2004 measuremts in OFDM PHY,” IEEE c802.16maint-05/082.
based system to jamming via link adaptation. To facilitate the
study, the system performances under two types of jamming,
multitone pilot and partial-band jamming, are first evaluated
by simulation. The newly introduced mode BPSK 1/2 is found
to be robust to most of the jamming scenarios. The system Juan Li received the B.S. degree in Automatic Control from Central South
performance receives more severe deterioration from University, Changsha, China, in 1995. Later she received the M.S degree and
the Licentiate degree in Communications Engineering from Helsinki
multitone jamming than from partial-band jamming, when University of Technology (HUT), Helsinki, Finland, in 2002 and 2006
jamming power is fixed. respectively. She is currently a Ph.D student and working as a researcher in
A mean CINR based link adaptation algorithm is therefore Communications Laboratory. During the years 2002 and 2003, she worked
proposed and tested. The mean CINR is selected as the also as a special teacher assistant in the Communications Laboratory. She has
been involved in several research projects including System Technology for
channel quality metric because its measurement and reporting Future Wireless Telecommunications, OCDMA, Ad Hoc architecture. She is
are mandated by the standard. The system with link adaptation interested in mobile communications systems, optical fiber network and
is compared with systems with fixed operation modes in terms WLAN. In particular, she is interested in resource management for fixed and
of throughput statistics. The results confirm the superior wireless networks, performance evaluation, OFDM, and channel modeling.
performance of the system with link adaptation, in both Sven-Gustav Häggman received his master’s, licentiate and doctor’s degrees
quantity and quality of the service. in Communications Engineering from Helsinki University of Technology in
An imperfectness parameter is introduced to evaluate the 1970, 1979, and 1991, respectively. He has been with the Communications
efficiency of the proposed link adaptation algorithm. The Laboratory at HUT since 1970, until 1991 in various teaching and research
positions, since 1991 as associate professor and since 1998 as professor in
calculated imperfectness indicates that the link adaptation radio communications. His activities have included research in microwave
algorithm is more efficient for the system under partial-band terrestrial radio relay system planning and l.o.s.-channel measurement and
jamming. The imperfectness range of system under multitone modeling. Presently he is conducting research on mobile radio channel
pilot jamming is relatively larger. In general, the more measurement and modeling, radio interface techniques, cellular radio network
planning, and radio resource management methods.
subcarriers are jammed, the lower imperfectness link
adaptation can achieve.
The influence of α used for mean CINR estimation is also
investigated. The optimal value is found to be around 0.3,
when the system put relatively larger weight on the historical
mean CINR values.

REFERENCES
[1] IEEE std 802.16-2004, ™ IEEE Standard for Local and metropolitan
area networks Part 16: Air Interface for Fixed Broadband Wireless
Access Systems, The Institute of Electrical and Electronic Engineers,
Inc., October 1, 2004.
[2] Dan O’Shea, “A Standard Argument: Why WiMAX will Rule”,
[Online]. Available:

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.

You might also like