Document 14132961

advertisement
International Research Journal of Engineering Science, Technology and Innovation (IRJESTI) Vol. 1(7) pp. 185-194, October 2012
Available online http://www.interesjournals.org/IRJESTI
Copyright © 2012 International Research Journals
Full Length Research Paper
Analyzing the effect of FEC coding on BER
performance of M-Ary modulation scheme based fixed
WiMax wireless communication system with application
of digital audio transmission under the influence of
realistic communication channel
*Md. Ashraful Islam, Halida Homyara, Mustari Zaman and Md. Mizanur Rahman
*Department of ICE, Rajshahi University, Rajshahi, Bangladesh
Accepted October 15, 2012
The aim of this paper is to analysis the effect of FEC coding of M-ary modulation (BPSK, QAM and 16QAM) based WiMAX wireless communication system over different communication channels AWGN
and fading channels (Rician) with application of digital audio transmission. FEC channel coding
incorporates Reed-Solomon (RS) encoder with Convolutional encoder with 1/2 and 2⁄3 rated codes. A
computer program written in the MATLAB source code is developed under noisy situation to evaluate
the effect of FEC coding on WiMAX communication system. The simulation results of estimated Bit
Error Rate (BER) displays that the implementation of FEC coding is highly effective to combat in the
Wimax communication system. A segment of audio signal is used for analysis the performance of
Wimax based systems. The transmitted audio message is found to have retrieved effectively under
noisy situation.
Keywords: FEC coding, fixed WiMAX, PCM, AWGN, rician channel.
INTRODUCTION
To find the solution of broadband wireless access (BWA),
WiMAX known as Worldwide Interoperability for
Microwave Access came to in front. WiMAX is actually an
IEEE 802.16 standard which promises high bandwidth
over long range transmission (Islam et al., 2011). The
name "WiMAX" was created by the WiMAX Forum, which
was formed in June 2001 to promote conformity and
Interoperability ssof the standard. The forum describes
WIMAX as "a standards-based technology enabling the
delivery of last mile wireless broadband access as an
alternative to cable and DSL". WiMAX is designed to
provide 30 to 40 megabit-per-second data rates, with
the 2011 update providing up to 1 Gbit/s for fixed
stations. It is a part of a “fourth generation,” or 4G, of
wireless-communication technology. WiMAX far surpass-
*Corresponding
Author
E-mail: ras5615@gmail.com
es the 30-metre (100-foot) wireless range of a
conventional Wi-Fi local area network (LAN), offering a
metropolitan area network with a signal radius of about
50 km (30 miles). (Hasan, 2007).
Figure 1 represents a common view of current and
future wireless systems. Only two dimensions are present
in this picture. Power consumption is also an important
dimension along with these metrics (Das, 2007). The
history of broadband wireless as it relates to WiMAX can
be traced back to the desire to find a competitive
alternative to traditional wireline-access technologies.
These systems varied widely in their performance
capabilities, protocols, frequency spectrum used,
applications supported, and a host of other parameters.
WiMAX technology has evolved through four stages,
albeit not fully distinct or clearly sequential: (1)
narrowband wireless local-loop systems, (2) firstgeneration line-of-sight (LOS) broadband systems, (3)
second-generation non-line-of-sight (NLOS) broadband
systems, and (4) standards-based broadband wireless
186 Int. Res. J. Eng. Sci. Technol. Innov.
Figure 1. Wireless System (Das SS, 2007)
systems (Andrews et al., 2007). Now, with the
standardization of WiMAX in 802.16 and the pending
addition of mobility, carriers are expressing a greater
interest. In addition, Intel has mounted an effective
marketing campaign around WiMAX touting the benefits
of this technology. For example, WiMAX standards
promise to lower costs by providing standardization and
multivendor interoperability. IEEE only defined the
Physical (PHY) and Media Access Control (MAC) layers
in 802.16. This approach has worked well for
technologies such as Ethernet and WiFi, which rely on
other bodies such as the IETF (Internet Engineering Task
Force) to set the standards for higher layer protocols
such as TCP/IP, SIP, VoIP and IPSec. The first version of
the IEEE 802.16 standard operates in the 10–66GHz
frequency band and requires line-of-sight (LOS) towers.
Later the standard extended its operation through
different PHY specification to 2-11 GHz frequency band
enabling non line of sight (NLOS) connections, which
require techniques that efficiently mitigate the impairment
of fading and multipath. Taking the advantage of OFDM
technique the PHY is able to provide robust broadband
service in hostile wireless channel. The OFDM-based
physical layer of the IEEE 802.16 standard has been
standardized in close cooperation with the European
Telecommunications Standards Institute (ETSI) High
Performance Metropolitan Area Network (HiperMAN).
Thus, the HiperMAN standard and the OFDM-based
physical layer of IEEE 802.16 are nearly identical. Both
OFDM-based physical layers shall comply with each
other and a global OFDM system should emerge. The
WiMAX forum certified products for BWA comply with the
both standards (Hasan, 2007).
In this paper, we focus on the physical layer of WiMAX
system simulating on IEEE802.16 standards, which data
transmitted on the transmission channel and performance
is measured in term of with FEC coding and without FEC
coding.
Simulation Model
The transmitter and receiver sections of the WiMAX
Physical layer are shown in the block diagram of Figure
2. In the transmitting section, at first a segment of
recorded audio signal is taken which is then sent to pulse
code modulator to produce the required input binary data
stream. This Binary data stream then sent to Forward
Error Correction (FEC) coding block. FEC techniques
typically use error-correcting codes (e.g., RS, CC) that
can detect with high probability the error location. These
codes improve the bit error rate performance by adding
redundant bits in the transmitted bit stream that are
employed by the receiver to correct errors introduced by
the channel. Such an approach reduces the
signal transmitting power for a given bit error rate at the
Islam et al. 187
Figure 2. A block diagram represents WiMAX communication system
expense of additional overhead and reduced data
throughput (even when there are no errors).The FEC
coding part is composed of two steps outer ReedSolomon (RS) and inner Convolution Code (CC). We do
not explain each block in details. Here we only give the
emphasis on Reed-Solomon (RS), Convolution Code
(CC), Digital Modulation Techniques and Communication
Channels.
Reed-Solomon Encoding
Reed-Solomon Codes, abbreviated RS codes, are
designed by over sampling a polynomial constructed from
the data. The message to send is mapped to a
polynomial and the codeword is defined by evaluating it
at several points. The purpose of using Reed-Solomon
code to the data is to add redundancy to the data
sequence. This redundancy addition helps in correcting
block errors that occur during transmission of the signal.
The encoding process for RS encoder is based on Galois
Field Computations to do the calculations of the
redundant bits. Galois Field is widely used to represent
data in error control coding and is denoted by GF (2m).
Eight tail bits are added to the data just before it is
presented to the Reed Solomon Encoder stage. This
stage requires two polynomials for its operation called
code generator polynomial g(x) and field generator
polynomial p(x). The code generator polynomial is used
for generating the Galois Field Array whereas the field
188 Int. Res. J. Eng. Sci. Technol. Innov.
X(1)
D
D
D
+
+
X(3)
D
D
+
C(1)
C(2)
C(3)
Figure 3. 2/3 rated Convolutional Encoder.
generator polynomial is used to calculate the redundant
information bits which are appended at the start of the
output data. The RS code is derived from a systematic
RS (N = 255, K = 239, T = 8) code using GF (28). Reed
Solomon Encoder that encapsulates the data with coding
blocks and these coding blocks are helpful in dealing with
the burst errors. The following polynomials are used for
code generator and field generator:
(
)(
) (
)
G ( x ) = x + λ0 x + λ0 ........ x + λ2T − 1 , λ = 02
HEX
….(1)
8
4
3
2
P ( x ) = x + x + x + x + 1 ………………….. (2)
The encoder support shortened and punctured code to
facilitate variable block sizes and variable error correction
capability. A shortened block of k´ bytes is obtained
through adding 239k´ zero bytes before the data block
and after encoding, these 239-k´ zero bytes are
discarded (Khan and Ghauri, 2008).
Convolutional Encoding
The outer RS encoded block is fed to inner binary
convolutional encoder. A convolutional code introduces
redundant bits into the data stream through the use of
linear shift registers as shown in Figure 3. The
information bits are input into shift registers and the
output encoded bits are obtained by modulo-2 addition of
the input information bits and the contents of the shift
registers. The connections to the modulo-2 adders were
developed heuristically with no algebraic or combinatorial
foundation. The code rate r for a convolutional code is
defined as
k …………………… (3)
r=
n
Where k is the number of parallel input information bits
and n is the number of parallel output encoded bits at one
time interval. The constraint length K for a convolutional
code is defined as
K=m+1 …………………… (4)
Where m is the maximum number of stages (memory
size) in any shift register. The shift registers store the
state information of the convolutional encoder and the
constraint length relates the number of bits upon which
the output depends. For the convolutional encoder shown
in Figure 3, the code rate r=2/3, the maximum memory
size m=3, and the constraint length K=4. A convolutional
code can become very complicated with various code
rates and constraint lengths. A simple convolutional code
with rate of 1/2 and constraint length of 3 describe in
Figure 4. Also, the main decoding strategy for
convolutional codes is based on the Viterbi Algorithm.
Digital Modulation Technique
There are several M-ary digital modulation techniques.
For our research work we only implement 2-ary phase
shift keying known as BPSK, 4-ary quadrature amplitude
modulation known as QAM and 16-ary quadrature
amplitude modulation known as 16-qam. In the
following section these modulation techniques are
described.
Islam et al. 189
Figure 4. 1/2 rated Convolutional Encoder.
Figure 5. Constellation for a QAM Signal.
BPSK
pulse shapes. Then the transmitted signal may be
represented as (Rapaport TS, 2004)(Figure 5).
In binary phase shift keying (BPSK), the phase of a
constant amplitude carrier signal is switched between two
values according to the two possible signals m1 and m2
corresponding to binary 1 and 0, respectively. Normally,
the two phases are separated by 180°. If the sinusoidal
carrier has an amplitude AC and energy per bit Eb
=1/2AcTb then the transmitted BPSK signal is either
S BPSK (t ) =
2E b
Tb
cos( 2πf c t + θ c )
0 ≤ t ≤ Tb (binary 1)
….……………………. (5)
Or
2E b
2E
S BPSK (t ) =
cos( 2πf c t + π + θ c ) = −
cos( 2πf ct + θc )
Tb
Tb
b
0 ≤ t ≤ Tb (binary 0) …(6)
It is often convenient to generalize m1 and m2 as a binary
data signal m(t), which takes on one of two possible
S BPSK (t ) = m(t )
2E b
Tb
cos(2πf c t + θ c ) ………(7)
QAM
To obtain higher spectral efficiency, which potentially
results in higher throughput of packetized data,
Quadrature Amplitude Modulation (QAM) can be used to
modify both the amplitude and the phase of the bandpass
signal. QAM derives its name from the technique that is
typically used to generate the modulated signal. QAM
signals are normally generated by summing two
amplitude modulated signals with carriers that are ninety
degrees out of phase. The ninety degree phase
difference between the signals is referred to as a
quadrature phase offset and the two signals are referred
to as the in phase and quadrature signals. The summa-
190 Int. Res. J. Eng. Sci. Technol. Innov.
Table 1. Summary of Model Parameters.
Parameters
Number Of Bits
Number Of Subscribers
FFT Size
Audio Sampling Rate
CP
FEC Coding
CC Code rate
RS Code
Constraint length
K-factor
Maximum Doppler shift
SNR
Modulation
Noise Channels
Values
44000
200
256
8 KHz
1/4
Convolutional Coding(CC), Reed-Solomon(RS) Coding
2/3, 1/2
(255,239,8)
7
3
100/40Hz
0-25
QAM, 16-QAM, BPSK
AWGN, Rician
tion of two quadrature signals can be shown to be
mathematically equivalent to the amplitude and phase
modulated signal shown in Equation 8.
s(t)=A(t)cos(2πfct+Ø(t)) …… (8)
where A(t) is the amplitude modulation, φ(t) is the
phase modulation, and f c is the frequency of the carrier.
Information is transmitted by varying the amplitude and
the phase of the carrier signal. Using trigonometric
identities equation 8 is rewritten in Equation 9
s(t)=A(t)[ cos(Ø(t)) cos(2πf ct) -sin(Ø(t))sin(2πfct)] .
…………… (9)
Equation 8 can be simplified as shown in Equation 10
s(t)=AI(t)cos(2πf ct) - AQ(t)sin(2πf ct) …… (10)
Where the modulating signals AI(t)=A(t)cos(Ø(t)) and
AQ(t)=A(t)sin(Ø(t)). When the number of bits per word, N,
is even, both the in-phase (I) and the quadrature (Q)
signals are modulated to one of L=2N/2 amplitude levels;
hence, L is equal to the square root of the total number of
symbols in the constellation, M (Couch L,1997). The I
and Q amplitude levels can be visualized in a
constellation diagram as shown in Figure 6. In this case,
the constellation diagram represents the instantaneous
amplitude and phase of the modulated carrier in the
modulation plane at the centre of the symbol period
(Aspel, 2004).
16-QAM
“16-QAM” results when 16 = M for M-ary QAM. QAM
transmits K=log2M bits of information during each symbol
period. For 16-QAM, there are 16 possible symbols each
containing 4 bits, two bits for the I component and two
bits for the Q component. The mapping of the bits into
symbols is frequently done in accordance with the Gray
code which helps to minimize the number of bit errors
occurring for every symbol error. Because Gray-coding is
given to a bit assignment where the bit patterns in
adjacent symbols only differ by one bit (Bateman, 1999),
this code ensures that a single symbol in error likely
corresponds to a single bit in error. The 16 symbols in the
16-QAM rectangular constellation diagram are equally
spaced and independent, and each is represented by a
unique combination of amplitude and phase (Jingxin,
2004).(Table 1)
At the receiving section we have just reversed the
procedures that we have performed at the transmission
section. After ensuring that the WiMAX PHY layer
simulator is working properly we started to evaluate the
performance of our developed system. For this purpose
we have varied FEC encoding techniques and digital
modulation schemes under AWGN and Rician channels.
Bit Error Rate (BER) calculation against different Signalto-Noise ratio (SNR) was adopted to evaluate the
performance.
SIMULATION RESULT
In this part of our research work, we represent various
BER vs. SNR plots to evaluate the effect of FEC coding
technique of M-ary Modulated Fixed WiMAX
communication system over different communication
channel (AWGN and Rician). Figure 6, 7 and 8 displays
the effect of FEC coding performance BPSK, QAM
16QAM modulated WIMAX system on Additive White
Gaussian Noise (AWGN) channel models respectively.
Similarly Figure 9, 10 and 11 displays the effect of FEC
coding performance BPSK, QAM 16QAM modulated
WIMAX system on Additive White Gaussian Noise
(AWGN) channel models respectively. The Bit Error Rate
(BER) plot obtained in the performance analysis showed
Islam et al. 191
Figure 6. Effect of FEC in 1/2 and 2/3 rated BPSK modulations on AWGN Channel.
Figure 7. Effect of FEC in 1/2 and 2/3 rated QAM modulations on AWGN Channel.
Figure 8. Effect of FEC in 1/2 and 2/3 rated 16QAM modulations on AWGN channel.
Figure 9. Effect of FEC in 1/2 and 2/3 rated BPSK modulations on Rician channel.
192 Int. Res. J. Eng. Sci. Technol. Innov.
Figure 10. Effect of FEC in 1/2 and 2/3 rated QAM modulation On Rician channel.
Figure 11. Effect of FEC in 1/2 and 2/3 rated 16QAM modulation on Rician channel.
that model works well on Signal to Noise Ratio (SNR)
less than 25 dB.
Figure 6 shows the effect of FEC over AWGN channel
for 1/2 and 2/3 rated CC-RS BPSK modulation schemes.
We know that FEC is used to detect and correct error.
This figure shows that the uncoded data contain much
more error than coded data. When FEC is applied error
reduces to a considerable label. For a typical SNR value
of 3, the BER value for 1/2 rated CC-RS BPSK
modulations are 0.0003681 and 6.27e-05 respectively,
and for uncoded BPSK modulation is 0.003708. Hence
the system performance is improved by 17.71 dB for the
case of 2/3 rated FEC encoded BPSK modulation
scheme over uncoded BPSK modulation scheme.
Figure 7 shows the effect of FEC over AWGN channel
for 1/2 and 2/3 rated CC-RS encoded QAM modulation
schemes. For a typical SNR value of 6, the system
performance is improved by 20.94 dB for the case of 2/3
rated FEC encoded QAM modulation scheme over
uncoded QAM modulation scheme in AWGN channel.
Figure 8 shows the effect of FEC over AWGN channel
for 1/2 and 2/3 rated CC-RS encoded 16QAM modulation
scheme. For a typical SNR value of 14, the system
performance is improved by 22.63 dB for the case of 2/3
rated FEC encoded 16QAM modulation scheme over
uncoded 16QAM modulation scheme in AWGN channel.
Figure 9 shows the effect of FEC over Rician channel
for 1/2 and 2/3 rated CC-RS encoded BPSK modulation
scheme. For a typical SNR value of 8, the system
performance is improved by 12.15 dB for the case of 1/2
rated FEC encoded BPSK modulation scheme over
uncoded BPSK modulation scheme in Rician channel.
Here 2/3 rated FEC encoded BPSK modulation scheme
provide better BER for higher SNR value.
Figure 10 shows the effect of FEC over Rician channel
for 1/2 and 2/3 rated CC-RS encoded QAM modulation
scheme. For a typical SNR value of 7, the system
performance is improved by 11.93 dB for the case of 1/2
rated FEC encoded QAM modulation scheme over
uncoded QAM modulation scheme in Rayleigh channel.
Figure 11 shows the effect of FEC over Rician channel
for 1/2 and 2/3 rated CC-RS encoded 16QAM modulation
scheme. For a typical SNR value of 14, the BER value for
1/2 rated CC-RS encoded16QAM modulations are
0.0001353 and 0.005473 respectively. Hence the system
performance is improved by 16.71 dB for the case of 1/2
rated FEC encoded 16QAM modulation scheme over
uncoded 16QAM modulation scheme in Rayleigh chan-
Islam et al. 193
(a)
(b)
(c)
Figure 12. A segment of an audio signal, (a) Transmitted (b) Retrieved on AWGN Channel (c)
Retrieved on Rician Channel
nel. Here 2/3 rated FEC encoded 16QAM provide better
performance after SNR value of 16.
The transmitted and received audio signal for such a
case corresponding with time and amplitude coordinates
is shown in Figure 12.
on the effects of the FEC (Forward Error Correction)
coding on WiMAX system in the form of BER.
Performance results highlight the impact of FEC coding
and show that the implementation of FEC coding under
BPSK modulation technique under AWGN and Rician
channels provides satisfactory performance among the
three considered modulations.
CONCLUSION
The key contribution of this thesis was the
implementation of the WiMAX (Worldwide Interoperability
for Microwave Access) PHY layer using MATLAB in order
to evaluate the PHY layer performance under AWGN and
fading channels. The implemented PHY layer supports all
the modulation and coding schemes as well as CP
lengths defined in the specification. This paper focuses
REFERENCE
Andrews JG, Ghosh A, Muhamed R (2007). “Fundamentals of WiMAX”,
Prentice Hall Communications Engineering and Emerging
Technology Series, February
Aspel D (2004). Adaptive Multilevel Quadrature, mplitude Radio
Implementation in Programmable Logic, April.
Bateman A (1999). Digital Communications: Design for the real world,
Addison- Wesley Longman Limited, New York, NY
194 Int. Res. J. Eng. Sci. Technol. Innov.
Couch L (1997) Digital and Analog Communication Systems, Prentice
Hall, Upper Saddle River,
Das SS (2007). Techniques to Enhance Spectral Efficiency of OFDM
Wireless System Aalborg University
Hasan MA (2007). Performance Evaluation of WiMAX/IEEE 802.16
OFDM Physical Layer. Espoo. June
Islam MA, Julkarnine MC, Kader MA (2011) .BER Performance Analysis
of a Real Data communication through WiMAX-PHY Layer over an
AWGN and Fading Channels, Int. J. Electri. Comput. Sci. IJECSIJENS 10: (04)13-16
Jingxin Chen J (2004). Carrier Recovery in Brust-Mode 16-QAM, June.
Khan MN, Ghauri S (2008). The WiMAX 802.16e Physical Layer Model,
IET International Conference on Volume:117–120
Pahlavan K, Krishnamurthy P (2002). Principles of Wireless Networks,
Prentice-Hall of India Private Limited.
PAIZI WFB (2006). BER PERFORMANCE STUDY OF PSK-BASED
DIGITAL MODULATION SCHEMES IN MULTIPATH FADING
ENVIRONMENT, JUNE
Proakis JG (1995). Digital Communications, McGraw-Hill Inc., New
York, NY, (Third Edition)
Rapaport TS (2004). Wireless
Communications Principles and Practice.
Download