Professional Documents
Culture Documents
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
2
feedback shift register (LFSR) to scatter long data strings of III. SIMULATION
‘0’ or ‘1’. The FEC helps to correct the errors in the faded
subcarriers to a certain limit. It concatenates an outer Reed- A. Model
Solomon encoder together with an inner rate- compatible
convolutional encoder. The interleaver uses two permutations The simulation is carried out on the link level by using
to rearrange the subcarriers so that the burst errors are Monte Carlo method with the aid of Matlab. The procedures
distributed more uniformly at the demodulation input. After are depicted in Fig. 2.
channel coding, data bits are mapped and modulated onto the Randomi- RS- Conv.
Interleave Mapping OFDM
zation encode Coding
allocated subcarriers by modulations, which include BPSK,
Gray-mapped QPSK, 16-QAM and 64-QAM. Different Multipath
to Mode 7. When the modulation is done, modulated data are Fig. 2. Link level simulation
multiplexed by OFDM. In the receiver side, all the procedures In addition to jamming, the system is subjected to
that carried out in the transmitter side are implemented in a multipath fading and additive white Gaussian noise as well.
reverse direction. The channel is simulated as a frequency selective, slow fading
TABLE I channel by snapshot approach. Channel equalization is based
MANDATORY MODULATION / CODING MODES [1]
on comb type pilot channel estimation [8], which is achieved
Mode Modulation Block size (bytes) RS code CC
Uncoded Coded code rate by the channel information collected at the pilot subcarriers.
1 BPSK 12 24 (12,12,0) 1/2 At the receiver side, jamming is added to the specified
2 QPSK 24 48 (32,24,4) 2/3 subcarriers with varying signal-to-jamming ratio (SJR) values.
3 QPSK 36 48 (40,36,2) 5/6 Assuming that a total jamming power Jtot is distributed evenly
4 16-QAM 48 96 (64,48,8) 2/3 to m subjammers, and the power of each subjammer is
5 16-QAM 72 96 (80,72,4) 5/6
6 64-QAM 96 144 (108,96,6) 3/4
J0=Jtot/m. SJR is defined as
7 64-QAM 108 144 (120,108,6) 5/6 Eb Eb
SJR(linear ) = = (1)
NJ J0 W
The time duration of an OFDM symbol is composed of where Eb is the signal energy per bit, NJ is the jamming power
the useful symbol time Tb and the cyclic prefix (CP) time Tg. spectral density, and W stands for the bandwidth of one
The cyclic prefix is a duplication of the tail part of the useful subjammer.
symbol and placed in the beginning of the symbol. With The parameters adopted in the simulation and their
proper duration Tg, it may efficiently mitigate the effect of settings are listed in Table. II. In the table, Nfft is the number of
multipath. From frequency domain viewpoint, an OFDM total subcarriers (the number of points in the fast Fourier
symbol is made up from a series of subcarriers as shown in transform (FFT)). Nused is the number of used subcarriers. The
Fig. 1. For WirelessMAN-OFDM PHY air interface, the signal-to-noise ratio (SNR) is set as high as 20dB since the
number of subcarriers for one OFDM symbol is 256. They are study here focuses on jamming.
divided into three types: 192 data subcarriers which carry
payload, 8 pilot subcarriers which are mainly for channel TABLE II
estimation, and 56 null subcarriers which are for guarding SIMULATION SETTINGS
purpose. The pilot subcarriers are distributed uniformly among channel bandwidth 7 MHz Nfft 256
Nused 200 sampling factor n 8/7
the data subcarriers.
CP ratio G (Tg / Tb) 1/4 SNR 20 dB
OFDM symbol duration 40 µs
channel path gains [0 -4 -8] dB
channel path delays [0 1.5 4] µs
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
3
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
4
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
5
12 12 12
with LA with LA with LA
fix mode 1 fix mode 1 fix mode 1
10 fix mode 2 10 fix mode 2 10 fix mode 2
fix mode 3 fix mode 3 fix mode 3
Throughput (Mbps)
fix mode 4
Throughput (Mbps)
Throughput (Mbps)
fix mode 4 fix mode 4
8 8 8
fix mode 5 fix mode 5 fix mode 5
fix mode 6 fix mode 6 fix mode 6
6 fix mode 7 6 fix mode 7 6 fix mode 7
4 4 4
2 2 2
0 0 0
14500 12500 10500 8500 6500 4500 2500 500 14500 12500 10500 8500 6500 4500 2500 500 14500 12500 10500 8500 6500 4500 2500 500
Distance (m) Distance (m) Distance (m)
belongs to Mode 1, which proves the robustness of this mode unavoidable misjudgement. The non-overlapped area between
again, but too cautious protection gains itself the lowest the link adaptation curve and the envelope measures the level
throughput. of misjudgement. As the jammed bandwidth increases from
The throughput of the system with link adaptation is 30% to 100% in Fig. 6, the non-overlapped area diminishes
higher than that with any of the fixed modes. Meanwhile, its gradually. In Fig. 6 (c), the difference is so small that the two
standard deviation remains at a moderate level. This indicates curves are almost the same. Similar observations are also
the superior performance of the system, either in quantity or in obtained in jamming Scenarios 1 to 4.
quality of the service. Imperfectness is introduced here for the purpose of
comparing the link adaptation efficiencies among different
D. Efficiency of the Algorithm
jamming scenarios. It refers to the ratio between the non-
As shown in Fig. 6, the throughputs for system either with overlapped area and the area under the envelope:
or without link adaptation all decrease with the distance d2. N
The throughputs of systems with fixed mode obtain the highest ∑ Thrpt LA (i )
i =1
value alternatively but none of them can persist through the IMP = 1 −
N × 100% (5)
entire simulation time. In other words, the system performance ∑ Thrpt envelope (i )
i =1
is not optimized. When link adaptation is applied, the
throughput approaches the envelope of those throughput where N is the total number of simulation trials. ThrptLA is the
curves of fixed modes, as shown by the bold line in Fig. 6. throughput obtained by system with practical link adaptation,
In principle, an ideal link adaptation should produce a Thrhptenvelope is the throughput obtained by ideal link
throughput curve exactly the same as the envelope of the seven adaptation. The results are listed in Table V.
TABLE V
curves. However, practically it can never be realised due to IMPERFECTNESS UNDER DIFFERENT α
7.0E+06
Mean Standard Deviation Jamming 1 2 3 4 5 6 7
6.0E+06 scenario No.
5.0E+06
α = 0.1 30% 17% 9% 4% 4% 4% 1%
α = 0.3 30% 18% 8% 3% 4% 3% 1%
4.0E+06
α = 0.5 28% 20% 12% 6% 5% 4% 1%
3.0E+06 α = 0.7 28% 22% 15% 10% 6% 4% 2%
2.0E+06 α = 0.9 31% 26% 20% 14% 7% 7% 2%
1.0E+06
The imperfectness of Scenario 5 to 7 are very small. It
0.0E+00
with LA fix mode 1 fix mode 2 fix mode 3 fix mode 4 fix mode 5 fix mode 6 fix mode 7
confirms that the link adaptation algorithm adopted here is
efficient enough. The imperfectness of Scenario 1 to 4 varies
(a)
between 3% and 31%, It can be concluded that generally the
8.0E+06
Mean Standard Deviation
more subcarriers are jammed, the lower imperfectness link
7.0E+06
6.0E+06
adaptation achieves.
5.0E+06
Since the power of jammer is fixed, a large number of
4.0E+06
subjammers lowers the power allocated to each subjammer. As
3.0E+06
a result, the simulated SJR ranges for the seven scenarios are
2.0E+06
different (see Fig. 5). Instead of 0-30dB for Scenario 7, the
1.0E+06 simulated SJR for Scenario 1 varies from -23…7 dB. It
0.0E+00 indicates that the pilot subcarrier in Scenario 1 exposes to so
with LA fix mode 1 fix mode 2 fix mode 3 fix mode 4 fix mode 5 fix mode 6 fix mode 7
strong distortion that a correct mean CINR evaluation is
(b) always not possible, which leads to high ratio of misjudgment
Fig. 7. Performance comparison of systems with link adaptation and fixed in link adaptation. In Scenario 7, all the subcarriers receive
operation modes under different jamming scenarios, α=0.3 (a) scenario 5: jamming, so the jamming power is scattered and every
jamming 30% bandwidth (b) scenario 7: jamming 100% bandwidth subcarrier is only slightly affected. This gives a better
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.
6
REFERENCES
[1] IEEE std 802.16-2004, ™ IEEE Standard for Local and metropolitan
area networks Part 16: Air Interface for Fixed Broadband Wireless
Access Systems, The Institute of Electrical and Electronic Engineers,
Inc., October 1, 2004.
[2] Dan O’Shea, “A Standard Argument: Why WiMAX will Rule”,
[Online]. Available:
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:15 from IEEE Xplore. Restrictions apply.