Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
EC2401- Wireless Communication Notes VII semester ECE Wireless Communication PART A-UNIT 1 1. What is meant by frequency reuse? 2. What are the trends in cellular radio systems? 3. What do you mean by forward and reverse channel? 4. What is the function of control channel? What are the types? 5. What is channel assignment? What are the types? 6. What is fixed channel assignment? 7. What is dynamic channel assignment? 8. Define MS, BS and MSC. 9. Define had off and mode of hand off. 10. Write the types of hand off. 11. Define Cell, Cluster. 12. What do you mean by foot print and dwell time? 13. What are the major types of cellular interference? 14. What are the techniques used to expand the capacity of cellular system? 15. Define frequency reuse ratio. 16. Define FDMA, TDMA and CDMA. 17. Define Grade of service. 18. What is blocked call clear system(BCC)? 19. What is blocked call delay system? 20. Define cell splitting. 21. What is sectoring? 22. What are the features of TDMA? 23. What are the features of FDMA? 24. Differentiate cellular telephony and cordless telephony. Nov. 2011 25. When does a WLAN become a personal area network (PAN)? Nov. 2011 26. What are the different types of multiple access schemes? May 2012 27. Mention the significance of frequency reuse in cellular networks. May 2012 28. What is flat fading? Nov. 2012 29. Define signal to self-interference ratio. Nov. 2012 30. What are the three most important effects of small scale multipath propagation. Nov/Dec. 2013 31.What is a multiple access technique? Nov/Dec. 2013 Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 1 EC2401- Wireless Communication Notes VII semester ECE PART B-UNIT 1 1. i. Compare and contrast wired and wireless communication. (8) Nov. 2011 ii. Discuss briefly about the requirements of services for a wireless system. (8) 2. i. Discuss in detail the constructive and destructive interferences. (8) Nov. 2011 ii. Explain how Inter Symbol Interference is caused and how it is eliminated. (8) 3. i. Explain in detail Wide Area Data Services and Broadband Wireless Access services offered to wireless networks. (10) May 2012 ii. What are paging systems? Explain. (6) 4. i. With a neat block diagram, explain the cellular network architecture.(10) May 2012 ii. Explain any one type of Multiple Access scheme. (6) 5. i. Explain about the factors that influence small scale fading. (10) Nov 2012 ii. Find the average fade duration for threshold levels ρ = 0.01, ρ = 0.1 and ρ = 1, when the Doppler frequency is 200 Hz. 6. i. Write a note on Noise and Interference Limited Systems. ii. Discuss the principles of cellular networks. (8) (8) Nov. 2012 7. i. Discuss the types of services, requirements, spectrum limitations and noise considerations of wireless communication. Nov/Dec. 2013. ii. Explain the principle of cellular networks and various types of Handoff techniques. Nov/Dec. 2013. 2MARKS: UNIT 1 1.1.What is meant by frequency reuse? If an area is served by a single Base Station, then the available spectrum can be divided into N frequency channels that can serve N users simultaneously. If more than N users are to be served, multiple BSs are required, and frequency channels have to be reused in different locations. Since Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 2 EC2401- Wireless Communication Notes VII semester ECE spectrum is limited, the same spectrum has to be used for different wireless connections in different locations. This method of reusing the frequency is called as frequency reuse. 1.2. What are the trends in cellular radio systems? The trends in personal cellular radio systems are: i. ii. PCS – Personal Communication Services PCN – Personal Communication Networks 1.3. What do you mean by forward and reverse channel? Forward channel is a radio channel used for transmission of information from base station to mobile.Reverse channel is a radio channel used for transmission from mobile to base station. 1.4. What is the function of control channel? What are the types? The function of control channel is to transmit call setup, call request, call initiation and Control. There are two types of control channels, i. ii. Forward control channel Reverse control channel 1.5. What is channel assignment? What are the types? For efficient utilization of radio spectrum a frequency reuse scheme with increasing capacity and minimizing interference is required. For this channel assignment is used. The types of channel assignment are: i. ii. Fixed channel assignment Dynamic channel assignment. 1.6. What is fixed channel assignment? Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 3 EC2401- Wireless Communication Notes VII semester ECE If the channels in each cell are allocated to the users within the cell, it will be called as fixed channel assignment. If all channels are occupied, the call will be blocked. 1.7. What is dynamic channel assignment? If the voice channels are not allocated permanently in a cell, it will be called as dynamic channel assignment. In this assignment, channels are dynamically allocated to users by the MSC. 1.8. Define MS, BS and MSC. MS – Mobile station. A station in the cellular radio service intended for use. BS – Base Station. A fixed station in a mobile radio system used for radio communication with MS. MSC – Mobile Switching Centre. Mobile switching centre coordinates the routing of calls in large service area. It connects the base station and mobiles to PSTN. It is also called as MTSO(Mobile telephone switching office. 1.9. Define hand off and mode of hand off. A handoff refers to the process of transferring an active call or data session from one cell in a cellular network to another or from one channel in a cell to another. A well-implemented handoff is important for delivering uninterrupted service to a caller or data session user. Modes of hand off are: i. ii. iii. MCHO – Mobile Controlled Hand off NCHO – Network Controlled Hand off MAHO – Mobile Assisted Hand off 1.10. Write the types of hand off. Types of handoff are: i. Hard hand off – Mobile monitors BS and new cell is allocated to a call with strong signal. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 4 EC2401- Wireless Communication Notes ii. VII semester ECE Soft hand off – MS with 2 or more calls at the same time and find which is the strongest signal BS, the MSC automatically transfers the call to that BS. 1.11. Define Cell, Cluster. For a large geographic coverage area, a high powered transmitter therefore has to be used. But a high power radio transmitter causes harm to environment. Mobile communication thus calls for replacing the high power transmitters by low power transmitters by dividing the coverage area into small segments, called cells. Each cell uses a certain number of the available channels and a group of adjacent cells together use all the available channels. Such a group is called a cluster. 1.12. What do you mean by foot print and dwell time? The region over which the signal strength lies above this threshold value x dB is known as the coverage area of a BS and it must be a circular region, considering the BS to be isotropic radiator. Such a circle, which gives this actual radio coverage, is called the foot print of a cell.The time over which a call may be maintained within a cell without hand off is called the dwell time. 1.13. What are the major types of cellular interference? The major types of cellular interferences are as follows i. ii. CCI – Co-channel interference is the interference between signals from co-channel cells. ACI – Adjacent channel interference resulting from signals which are adjacent in frequency to the desired signal. 1.14. What are the techniques used to expand the capacity of cellular system? Cell splitting, Sectoring, Coverage Zone approaches are the techniques used to expand the capacity of cellular system. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 5 EC2401- Wireless Communication Notes VII semester ECE Cell splitting – Cell-splitting is a technique which has the capability to add new smaller cells in specific areas of the system. i.e. divide large cell size into small size. Sectoring – use of directional antennas to reduce Co-channel interference. Coverage Zone approaches – large central BS is replaced by several low power transmitters on the edge of the cell. 1.15. What is frequency reuse ratio? If the cell size and the power transmitted at the base stations are same then co-channel interference will become independent of the transmitted power and will depend on radius of the cell (R) and the distance between the interfering co-channel cells (D). If D/R ratio is increased, then the effective distance between the co-channel cells will increase and interference will decrease. The parameter Q is called the frequency reuse ratio and is related to the cluster size. For hexagonal geometry Q = = From the above equation, small of `Q' means small value of cluster size `N' and increase in cellular capacity. 1.16. Define FDMA, TDMA and CDMA. FDMA - the total bandwidth is divided into non-overlapping frequency subbands. TDMA – divides the radio spectrum into time slots and in each slot only one user is allowed to either transmit or receive. CDMA – many users share the same frequency same tome with different coding. 1.17. Define Grade of service. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 6 EC2401- Wireless Communication Notes VII semester ECE Grade of service is defined as the measure of the ability of a user to access a trunked system during the busiest hour. 1.18. What is blocked call clear system (BCC)? In a system, a user is blocked without access by a system when no channels are available in the system. The call blocked by the system is cleared and the user should try again .This is called BCC system. 1.19. What is blocked call delay system? If a channel is not available immediately, the call request may be delayed until a channel becomes available. This is called as blocked call delay system. 1.20. Define cell splitting. Cell splitting is the process of subdividing congested cells into smaller cells each with its own base stations and a corresponding reduction in antenna height and transmitter power. It increases the capacity of cellular system. 1.21. What is sectoring? Sectoring is a technique for decreasing co-channel interference and thus increasing the system performance by using directional antennas. 1.22. What are the features of TDMA? Features of TDMA are: i. TDMA shares a single carrier frequency with several users, where each user makes use of non overlapping time slots. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 7 EC2401- Wireless Communication Notes ii. iii. iv. VII semester ECE Data transmission occurs in bursts. Handoff process is much simpler Duplexers are not required, since transmission and reception occurs at different time slots. 1.23. What are the features of FDMA? Features of FDMA are: i. ii. FDMA channel carries only one phone circuit at a time The bandwidth of FDMA channels are relatively narrow as each channel supports only one circuit per carrier. Part A- UNIT 2 1. What are the propagation mechanisms of EM waves? 2. What is the significance of propagation model? 3. What do you mean by small scale fading? 4. What are the factors influencing small scale fading? 5. Define large scale propagation. 6. Differentiate the propagation effects with mobile radio. 7. Define Doppler shift. 8. Differentiate time selective and frequency selective channel. 9. Define coherence time and coherence bandwidth. 10. What do you mean by WSSUS channels? 11. What is free space propagation model? 12. Define EIRP. 13. Explain path loss? 14. What is intrinsic impedance& Brewster angle? 15. What is scattering? 16. Define radar cross section? 17. Name some of the outdoor propagation models? 18. Define indoor propagation models? 19. Mention some indoor propagation models? 20. What are merits and demerits of Okumara’s model? 21. List the advantages and disadvantages of Hata model? 22. What is the necessity of link budget? 23. Distinguish between narrow band and wideband systems. Nov. 2012 Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 8 EC2401- Wireless Communication Notes VII semester ECE 24. What is link budget calculation? Nov. 2012 25. List the different types of wireless channels. May 2012 26. What is frequency selective fading? How to avoid fading problem? May 2012 27. Compute the Rayleigh distance of a square antenna with 20 dB gain. Nov. 2011 28. List out any two properties of wide band channel. Nov. 2011. 29.State the difference between narrowband and wideband systems. Nov./Dec.2013. 30.Find the far field distance for an antenna with maximum dimension of 1m and operating frequency of 900 MHZ. Nov./Dec.2013. PART B-UNIT II 1. i. Describe any two methods of diffraction by multiple screens. (8) Nov. 2011 ii. Discuss about ultra wide band channel. (8) 2. i. Compare coherence bandwidth and coherence time. (8) Nov. 2011 ii. Discuss the mathematical formulation for narrowband and wideband system, with relevant figures. (8) 3. i. Explain the free space path loss and derive the gain expression. (8) May 2012 ii. Describe in detail Two Ray Model propagation mechanism. (8) 4. i. Define the following: Auto correlation, Cross correlation and Power spectral density for narrow band fading model. (8) May 2012 ii. What is the need for link calculation? Explain with suitable example. (8) 5. i. How the received signal strength is predicted using the free space propagation model? Explain. (10) Nov. 2012 ii. Find the far-field distance for an antenna with maximum dimension of 1 m and operating frequency of 900 MHz. (6) 6. i. With system theoretic description, explain the characteristics of time-dispersive channels. (8) ii. Explain the three basic propagation mechanisms in a mobile communication system. (8) 7.a.i. Briefly explain the factors that influence small scale fading.(8). Nov./Dec.2013. ii.If a transmitter produces 50 W of power , express the transmit power in units of dBM and dBW. If 50 W is applied to a unity gain antenna with a 900 MHz carrier frequency, find the received power in dBM at a free space distance of 100 m from the antenna. What is Pr (10 km)? assume unity gain for the receiver antenna.(8). Nov./Dec.2013. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 9 EC2401- Wireless Communication Notes VII semester ECE b. i. Briefly explain the three basic propagation mechanisms which impact propagation in a mobile communication system (8). Nov./Dec.2013. ii. What is Brewster angle? Calculate the Brewster angle for a wave impinging on ground having a premitivity of 4. Nov./Dec.2013. UNIT 2 2.1. What are the propagation mechanisms of EM waves? The four propagation mechanisms of EM waves are i. ii. iii. iv. Free space propagation Reflection Diffraction Scattering 2.2. What is the significance of propagation model? The major significance of propagation model are: i. ii. Propagation model predicts the parameter of receiver. It predicts the average received signal strength at a given distance from the transmitter. 2.3. What do you mean by small scale fading? Rapid fluctuations of the amplitude, phase as multipath delays of a radio signal over a short period of time is called small scale fading. 2.4. What are the factors influencing small scale fading? The factors which influence small scale fading are: Multipath propagation, Speed of the mobile, Speed of surrounding objects and the transmission bandwidth of the signal. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 10 EC2401- Wireless Communication Notes VII semester ECE 2.5. When does large scale propagation occur? Large scale propagation occurs due to general terrain and the density and height of buildings and vegetation, large scale propagation occurs. 2.6. Differentiate the propagation effects with mobile radio. Slow Fading Fast Fading Slow variations in the signal strength. Rapid variations in the signal strength. Mobile station (MS) moves slowly. Local objects reflect the signal causes fast fading. It occurs when the large reflectors and It occurs when the user terminal (MS) moves diffracting objects along the transmission for short distances. paths are distant from the terminal. Eg. Rayleigh fading, Rician fading and Doppler shift 2.7. Define Doppler shift. If the receiver is moving towards the source, then the zero crossings of the signal appear faster and the received frequency is higher.The opposite effect occurs if the receiver is moving away from the source. The resulting chance in frequency is known as the Doppler shift (fD). FD = fr – f0 = -f0V/C Where f0 -> transmission frequency fr -> received frequency 2.8. Differentiate time selective and frequency selective channel. The gain and the signal strength of the received signal are time varying means then the channel is described as time selective channel. The frequency response of the time selective channel is constant so that frequency flat channel. The channel is time invariant but the impulse Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 11 EC2401- Wireless Communication Notes VII semester ECE response of the channel show a frequency-dependent response so called frequency selective channel. 2.9. Define coherence time and coherence bandwidth. Coherence time is the maximum duration for which the channel can be assumed to be approximately constant. It is the time separation of the two time domain samples. Coherence bandwidth is the frequency separation of the two frequency domain samples. 2.10. What do you mean by WSSUS channels? In multipath channels, the gain and phase shift at one delay are uncorrelated with another delay is known as uncorrelated scattering of WSSUS. 2.11. What is free space propagation model? The free space propagation model is used to predict received signal strength, when unobstructed line-of-sight path between transmitter & receiver. Friis free space equation is given by, The factor λ/4πd 2 is also known as the free space loss factor. 2.12.Define EIRP. EIRP (Equivalent Isotropically Radiated Power) of a transmitting system in a given direction is defined as the transmitter power that would be needed, with an isotropic radiator, to produce the same power density in the given direction. EIRP=PtGt Where Pt-transmitted power in W Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 12 EC2401- Wireless Communication Notes VII semester ECE Gt-transmitting antenna gain 2.13. Explain path loss. The path loss is defined as the difference (in dB) between the effective transmitted power and the received power. Path loss may or may not include the effect of the antenna gains. 2.14. What is intrinsic impedance and Brewster angle? Intrinsic impedance is defined by the ratio of electric to magnetic field for a uniform plane wave in the particular medium. Brewster angle is the angle at which no reflection occurs in the origin. Brewster angle is de oted y θB as shown below, 2.15. What is scattering? When a radio wave impinges on a rough surface, the reflected energy is spread out in all directions due to scattering. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 13 EC2401- Wireless Communication Notes VII semester ECE 2.16. Define radar cross section. Radar Cross Section of a scattering object is defined as the ratio of the power density of the signal scattered in the direction of the receiver to the power density of the radio wave incident upon the scattering object & has units of squares meters 2.17. Name some of the outdoor propagation models? Some of the commonly used outdoor propagation models are i. ii. iii. Longely-Rice model Du ki ’s odel Okumura model. 2.18. Define indoor propagation models. The indoor propagation models are used to characterizing radio propagation inside the buildings. The distances covered are much smaller, and the variability of the environment is much greater for smaller range of Transmitter and receiver separation distances. Features such as lay-out of the building, the construction materials, and the building type strongly influence the propagation within the building. 2.19. Mention some indoor propagation models? Some of the indoor propagation models are: i. ii. iii. Long –distance path loss model Ericession multiple break point model Attenuation factor model. . 0.What are erits a d de erits of Oku ara’s odel? Merits: Accuracy in parameter prediction. Suitable for modern land mobile radio system. Urban, suburban areas are analyzed. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 14 EC2401- Wireless Communication Notes VII semester ECE Demerits: Rural areas are not analyzed. Analytical explanation is not enough. 2.21.List the advantages and disadvantages of Hata model? Advantages: Suitable for large cell mobile system. Cell radius on the order of 1km is taken for analysis. Disadvantages: Not suitable for PCS model. This model does not have any path specific correction. 2.22.What is the necessity of link budget? The necessities of link budget are: i. ii. iii. iv. A link budget is the clearest and most intuitive way of computing the required Transmitter power. It tabulates all equations that connect the Transmitter power to the received SNR It is reliable for communications. It is used to ensure the sufficient receiver power is available. To meet the SNR requirement link budget is calculated. PART A -Unit 3 1. List the advantages of digital modulation techniques. 2. What are the factors that influence the choice of digital modulation? 3. Define power efficiency and bandwidth efficiency. 4. What is QPSK? 5. Define offset QPSK and π/4 differential QPSK. 6. What is meant by MSK? 7. List the salient features of MSK scheme. 8. Why GMSK is preferred for multiuser, cellular communications? 9. How can we improve the performance of digital modulation under fading channels? 10. Write the advantages of MSK over QPSK. 11. Define M-ary transmission system? Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 15 EC2401- Wireless Communication Notes VII semester ECE 12. What is quadrature modulation? 13. What is QAM? 14. Define QPSK? 15. What is linear modulation? 16. Define non linear modulation? 17. What is the need of Gaussian filter? 18. Mention some merits of MSK 19. Give some examples of linear modulation? 20. What are the techniques used to improve the received signal quality? 21.What is the need of equalization? 22. What is diversity? 23. Define spatial diversity? 24. Define STCM. 25. Define adaptive equalization? 26. Define training mode in an adaptive equalizer? 27. What is tracking mode in an adaptive equalizer? 28. Write a short note on linear equalizers and non linear equalizers? 29. Why non linear equalizers are preferred? 30. What are the nonlinear equalization methods used? 31. What are the factors used in adaptive algorithms? 32. Define diversity concept? 33. Draw the mathematical link model for analysis of modulation schemes. Nov. 2011 34. What is OQPSK? Nov. 2011 35. List the advantages of QPSK. May 2012 36. Differentiate between MSK and GMSK. May 2012 37. Find the 3-dB bandwidth for a Gaussian low pass filter used to produce 0.25 GMSK with a channel data rate of Rb = 270 Kbps. What is the 90 % power bandwidth in the RF channel? Nov. 2012 38. What is slotted frequency hopping? Nov. 2012 39.Give the expression for bit error probability of Gaussian minimum shift keying modulation. Nov./Dec.2013. 40. What is fading and Doppler spread? Nov./Dec.2013. PART B-UNIT III UNIT 3 Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 16 EC2401- Wireless Communication Notes VII semester ECE 1. Compute the ratio of signal power to adjacent channel interference when using (i) raised cosine pulses (ii) root raised cosine pulses with ∝ = 0.5, when two considered signals have center frequencies 0 and 1.25 / T. (16) Nov. 2011 2. i. Discuss in detail any two demodulation techniques of minimum shift keying method. (8) Nov. 2011 ii. Explain in detail about optimum receiver structure for non-coherent detection. (8) 3. Explain with neat signal diagrams, the modulation and demodulation technique of QPSK. (16) May 2012 4. i. Describe with a block diagram, offset – Quadrature phase shift keying and its advantages. (8) May 2012 ii. Explain the concept of GMSK and mention its advantages. (8) 5. i. Briefly explain the structure of a wireless communication link. (6) Nov. 2012 ii. With block diagram, explain the MSK transmitter and receiver. Derive an expression for MSK and its power spectrum. (10) Nov. 2012 6. Derive an expression for: i. M-ary Phase Shift Keying and ii. M-ary Quadrture amplitude modulation. (8) (8) Also derive an expression for their bit error probability. 7.i. Explain the Nyquist criterion for ISI cancellation. (8) Nov./Dec.2013. ii. Explain the performance of digital modulation in slow flat-fading channels.(8) Nov./Dec.2013. 8. i. Explain the QPSK transmission and detection techniques. (8) Nov./Dec.2013. ii. with transfer function, explain the raised cosine roll off filter. (8) Nov./Dec.2013. UNIT 3 3.1.List the advantages of digital modulation techniques. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 17 EC2401- Wireless Communication Notes VII semester ECE The advantages of digital modulation techniques are: i. ii. iii. iv. v. vi. Immunity to channel noise and external interference. Flexibility operation of the system. Security of information. Reliable since digital circuits are used. Multiplexing of various sources of information into a common format is possible. Error detection and correction is easy. 3.2.What are the factors that influence the choice of digital modulation? The factors that influence the choice of digital modulation are: i. ii. iii. iv. v. Low BER at low received SNR. Better performance in multipath and fading conditions. Minimum bandwidth requirement. Better power efficiency. Ease of implementation and low cost. 3.3.Define power efficiency and bandwidth efficiency. Power efficiency describes the ability of a modulation technique to preserve the fidelity of the digital message at low power levels. ɳp = Eb/N0 = Bit energy / Noise power spectral density Ability of a modulation scheme to accommodate data within a limited bandwidth is called bandwidth efficiency. ɳB = R/B = Datarate / Bandwidth in bps/Hz 3.4. What is QPSK? The Quadrature Phase Shift Keying (QPSK) is a 4-ary PSK signal. The phase of the carrier in the QPSK takes 1 of 4 equally spaced shifts. Two successive bits in the data sequence are grouped together. 1 symbol = 2 bits This reduces bit rate and bandwidth of the channel. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 18 EC2401- Wireless Communication Notes VII semester ECE Coherent QPSK = 2 x coherent BPSK system The phase of the a ie takes o o e of fou e ually spa ed alues su h as π/ , π/ , π/ a d 7π/ . . . Defi e offset QPSK a d π/ differe tial QPSK. In offset QPSK the amplitude of data pulses are kept constant. The time alignment of the even and odd bit streams are offset by one bit period in offset QPSK. I π/ QP“K, sig ali g poi ts of the odulated sig al a e sele ted f o t o QP“K o stellatio s hi h a e shifted y π/ ith espe t to ea h othe . It is diffe e tially e oded a d dete ted so called π/ diffe e tial QP“K. 3.6. What is meant by MSK? A continuous phase FSK signal with a deviation ratio of one half is referred to as MSK. It is a spectrally efficient modulation scheme. 3.7. List the salient features of MSK scheme. Salient features of MSK are: i. ii. iii. iv. It has constant envelope, smoother waveforms than QPSK. Relatively narrow bandwidth. Coherent detection suitable for satellite communications. Side lobes are zero outside the frequency band, so it has resistance to co-channel interference. 3.8. Why GMSK is preferred for multiuser, cellular communication? It is a simple binary modulation scheme. Premodulation is done by Gaussian pulse shaping filter, so side lobe levels are much reduced. GMSK has excellent power efficiency and spectral efficiency than FSK. For the above reasons GMSK is preferred for multiuser, cellular communication. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 19 EC2401- Wireless Communication Notes VII semester ECE 3.9.How can we improve the performance of digital modulation under fading channels? By the using of diversity technique, error control coding and equalization techniques performance of the digital modulation under fading channels are improved. 3.10.Write the advantages of MSK over QPSK. Advantages of MSK over QPSK: i. ii. In QPSK the phase changes by 90degree or 180 degree .This creates abrupt amplitude variations in the waveform, Therefore bandwidth requirement of QPSK is more filters of other methods overcome these problems , but they have other side effects. MSK overcomes those problems. In MSK the output waveform is continuous in phase hence there are no abrupt changes in amplitude. 3.11.Define M-ary transmission system? In digital modulations instead of transmitting one bit at a time, two or more bits are transmitted simultaneously. This is called M-ary transmission. 3.12.What is quadrature modulation? Sometimes two or more quadrature carriers are used for modulation. It is called quadrature modulation. 3.13.What is QAM? At high bit rates a combination of ASK and PSK is employed in order to minimize the e o s i the e ei ed data. This ethod is k o as Quad atu e A plitude Modulatio . 3.14.Define QPSK QPSK is defined as the multilevel modulation scheme in which four phase shifts are used for representing four different symbols. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 20 EC2401- Wireless Communication Notes VII semester ECE 3.15. What is linear modulation? In linear modulation technique the amplitude of the transmitted signal varies linearly with the modulating digital signal. In general, linear modulation does not have a constant envelope. 3.16. Define non linear modulation. In the non linear modulation the amplitude of the carrier is constant, regardless of the variation in the modulating signals. Non-linear modulations may have either linear or constant envelopes depending on whether or not the baseband waveform is pulse shaped. 3.17. What is the need of Gaussian filter? Need for Gaussian Filter: i. ii. Gaussian filter is used before the modulator to reduce the transmitted bandwidth of the signal. It uses less bandwidth than conventional FSK. 3.18. Mention some merits of MSK. Merits of MSK: i. ii. iii. iv. v. Constant envelope Spectral efficiency Good BER performance Self-synchronizing capability MSK is a spectrally efficient modulation scheme and is particularly attractive for use in mobile radio communication systems. 3.19. Give some examples of linear modulation. Examples of linear modulation: Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 21 EC2401- Wireless Communication Notes i. ii. VII semester ECE Pulse shaped QPSK OQPSK 3.20. What are the techniques used to improve the received signal quality? Techniques such as,  Equalization  Diversity  Channel coding are used to improve the received signal quality. 3.21. What is the need of equalization? Equalization can be used to compensate the Inter Symbol Interference created by multipath within time dispersion channel. 3.22. What is diversity? Diversity is used to compensate the fading channel impairments and is usually implemented by using two or more receiving antennas. Diversity improves transmission performance by making use of more than one independently faded version of the transmitted signal. 3.23. Define spatial diversity. The most common diversity technique is spatial diversity, whereby multiple antennas are strategically spaced and connected to a common receiving system. While one antenna sees a signal null, one of the other antenna may sees a signal peak, and the receiver is able to select the antenna with the best signals at any time. 3.24. Define STCM. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 22 EC2401- Wireless Communication Notes VII semester ECE Channel coding can also be combined with diversity a technique called Space-Time Coded Modulation. The space-time coding is a bandwidth and power efficient method for wireless communication. 3.25. Define adaptive equalization? To combine Inter Symbol Interference, the equalizer coefficients should change according to the channel status so as to break channel variations. Such an equalizer is called an adaptive equalizer since it adapts to the channel variations. 3.26. Define training mode in an adaptive equalizer? First, a known fixed length training sequence is sent by the transmitter then the receivers equalizers may adapt to a proper setting of minimum bit error detection where the training sequence is a pseudo random binary signal or a fixed and prescribed bit pattern. 3.27. What is tracking mode in an adaptive equalizer? Immediately following this training sequence the user data is sent and the adaptive equalizer at the receiver utilizes a recursive algorithm to evaluate the channel and estimate filter coefficients to compensate for the distortion created by multipath in the channel. 3.28. Write a short note on linear equalizers and non linear equalizers? Linear equalizers: If the output d(t) is not used in the feedback path to adapt the equalizer. This type of equalizers is called linear equalizer. Nonlinear equalizers: If the output d(t) is fed back to change the subsequent outputs of the equalizers is called non linear equalizers. 3.29. Why non linear equalizers are preferred? Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 23 EC2401- Wireless Communication Notes VII semester ECE The linear equalizers are very effective in equalizing channels where ISI is not severe.The severity of the ISI is directly related to the spectral characteristics. In this case that there are spectral noise in the transfer function of the effective channel, the additive noise at the receiver input will be dramatically enhanced by the linear equalizer. To overcome this problem non linear equalizers are used. 3.30. What are the nonlinear equalization methods used? Commonly used non linear equalization methods are: i. ii. iii. Decision feedback equalization Maximum likelihood symbol detection Maximum likelihood sequence estimation 3.31. What are the factors used in adaptive algorithms? Rate of convergence Mis adjustments Computational complexity 3.32. Define diversity concept. If one radio path undergoes a deep fade, another independent path may have a strong signal. By having more than one path to select from, both the instantaneous and average SNRs at the receiver may be improved often by as much as 20dB to 30dB. The principle of diversity is to ensure that the same information reaches the receiver on statistically independent channels. PART A -Unit 4 1. 2. 3. 4. 5. 6. 7. How the link performance can be improved? Why diversity and equalization techniques are used? What is diversity? Differentiate selection diversity and combining diversity. Define switched diversity. Define feedback or scanning diversity. Define temporal diversity. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 24 EC2401- Wireless Communication Notes VII semester ECE 8. What is meant by frequency diversity? 9. Differentiate micro and macro diversity. 10. What is transmit diversity? 11. What is an equalizer? 12. What is linear and non-linear equalizer? 13. Assume four branch diversity is used, where each branch receives an independent Rayleigh fading signal. If the average SNR is 20 dB, determine the probability that the SNR will drop below 10 dB. Compare this with the case of a single receiver without diversity. Nov. 2012 14. Define coding gain. Nov. 2012 15. List the different types of speech coding techniques. May 2012 16. State the significance of linear and decision feedback equalizer. May 2012 17. Mention any four common methods of micro diversity. Nov. 2011 18. Define hamming distance and Euclidean distance between two codes. Nov. 2011. 19. What is Diversity? Nov./Dec.2013. 20. What is Equalization? Nov./Dec.2013. PART B -UNIT IV 1. Explain the viterbi decoding scheme if the decoder input sequence is ‘010 000 100 001 011 110 001’. (16) Nov. 2011 2. i. With a neat block diagram, discuss the structure of a decision feedback equalizer. (8) Nov. 2011 ii. Discuss linear predictive vocoder with block diagram. (8) 3. i. With a neat block diagram, explain the principle of diversity. (8) May 2012 ii. Explain in detail Decision feedback equalizer. (8) 4. i. Explain any one method of channel coding. (8) May 2012 ii. What are the advantages of speech coding? Explain any one technique of speech coding. (8) 5. Explain in detail about: Nov. 2012 i. Polarization diversity (6) ii. Time diversity (5) iii. Frequency diversity (5) 6. i. Explain the basic idea about linear and behind decision feedback equalizers and derive an expression for its minimum mean square error. (8) Nov. 2012 ii. With a suitable diagram, explain the channel coding and speech coding techniques. (8) 7. i. Explain in detail about Linear Equalizers (8). Nov./Dec.2013. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 25 EC2401- Wireless Communication Notes VII semester ECE ii. Explain in detail about non linear equalizers. (8) Nov./Dec.2013. 8. i. With block diagram, explain the operation of a RAKe receiver. (8) Nov./Dec.2013. ii. Briefly explain the frequency domain coding for speech signals. (8). Nov./Dec.2013. UNIT 4 4.1. How the link performance can be improved? Link performance can be improved by various techniques such as i. ii. iii. Equalization Diversity Channel coding 4.2. Why diversity and equalization techniques are used? To reduce ISI, Equalization technique is used. Diversity is used to reduce fading effects. 4.3.What is diversity? Signal is transmitted by more than one antenna via channel. It ensures that the same information reaches the receiver on statistically independent channels. 4.4.Differentiate selection diversity and combining diversity. Selection Diversity Combining Diversity The best signal is selected and processed while All signals are combined before processing and all other signals are discarded. the combined signal is decoded. Simple circuits are used. At individual receiver, phasing circuits are Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 26 EC2401- Wireless Communication Notes VII semester ECE needed. None of the signal is not in acceptable SNR. It works well. 4.5. Define Switched Diversity If the signal level falls below the threshold, then the receiver switches to a new antenna which is called as switched diversity. 4.6. Define feedback or scanning diversity. All the signals are scanned in a fixed sequence until one signal is found to be above a predetermined threshold. 4.7. Define temporal diversity. Wireless propagation channel is time variant, so for sufficient decorrelation, the temporal distance between antennas must be atleast the half of maximum Doppler frequency. 4.8.What is meant by frequency diversity? Correlation is increased by transmitting information on more than one carrier frequency. Frequencies are separated by more than one coherence bandwidth of the channel. So the signals will not experience same fades. 4.9.Differentiate micro and macro diversity. Micro diversity Macro diversity Used to reduce small scale fading effects. Used to reduce large scale fading effects. Multiple reflection causes deep fading. This Deep shadow causes fading. This effect is effect is reduced. reduced. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 27 EC2401- Wireless Communication Notes BS-MS are separated by small distance. VII semester ECE BS-MS are separated by large distance. 4.10.What is transmit diversity? Diversity effect is achieved by transmitting signals from several transmit antenna. 4.11.What is an equalizer? Equalizer is a linear pulse shaping circuit which is used to reduce ISI. 4.12.What is linear and non-linear equalizer? Linear equalizer: the current and past values of the received signal are linearly weighted by the filter coefficients and summed to produce the output. No feedback path is used. Simple and easy to implement. Not suitable for severely distorted channel. Noise power signal is enhanced. Nonlinear equalizer: If the past decisions are correct, then the ISI contributed by present symbol can be cancelled exactly, feedback path is used. Suitable for severely distorted channel. Noise power signal is not enhanced. Complex in structure. channels with low SNR. Suffers from error propagation. PART A -Unit 5 1. 2. 3. 4. 5. 6. 7. 8. Write the two types of spread spectrum. What do you mean by spread spectrum? What is PN sequence? When is the PN sequence called as maximal length sequence? Write the properties which a PN sequence should have. Define chip duration and chip rate. What do you mean by processing gain of a spread spectrum? List the advantages and disadvantages of DS-SS. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 28 EC2401- Wireless Communication Notes VII semester ECE 9. Define jamming and jamming margin. 10. What is meant by anti-jamming? 11. List the advantages and disadvantages of FH-SS. 12. List the types of FH-SS. 13. Compare slow and fast FH-SS. 14. Compare DS-SS and FH-SS. 15. State the principles of CDMA. 16. How the capacity can be increased in CDMA? 17. Write short notes on OFDM. 18. Why cyclic prefix? 19. Write the goals of GSM standard. 20. What is W-CDMA? 21. What are the services offered by GSM? 22. Discuss the principle of OFDM modulation scheme. Nov. 2011 23. Give three important functional blocks of GSM system. Nov. 2011 24. State the effects of multipath propagation on CDMA. May 2012 25. List a few wireless network standards. May 2012 26. What is duplexing? Nov. 2012 27. What is the speech codes used in IS-95 system? Why? 28. What is a PN sequence? Give its significance in spread spectrum modulation technique. Nov./Dec.2013. 29. What is DECT? Nov./Dec.2013. PART B-UNIT 5 1. i. Explain the principle of direct sequence spread spectrum technique.(8) Nov. 2011 ii. Discuss some methods to increase the capacity of wireless communication system. (8) 2. i. Explain in detail about the GSM logic channels. (8) ii. Explain the block diagram of IS-95 transmitter. (8) Nov. 2011 3. Explain: Code Division Multiple Access (CDMA) and compare its performance with TDMA. (16) May 2012 4. What is orthogonal frequency division multiplexing? Explain OFDM technique and mention its merits, demerits and application. (16) May 2012 Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 29 EC2401- Wireless Communication Notes VII semester ECE 5. i. Discuss in detail about cellular code division multiple access systems with neat diagrams. (8) Nov. 2012 ii. Write a short notes on transceiver implementation. (8) 6. i. Explain with neat diagram of orthogonal frequency division multiplexing. (8) Nov. 2012 ii. Write a note on second generation and third generation wireless networks and standards. (8) 7. Discuss in detail about second generation(2G) and third generation (3G) wireless networks and standards. (16). Nov./Dec.2013. 8.i. Explain in detail about direct sequence spread spectrum technique (8) Nov./Dec.2013. ii. Explain in detail about frequency hopped spread spectrum technique. (8). Nov./Dec.2013. UNIT 5 5.1. Write the two types of spread spectrum? Types of spread spectrum are: Direct Sequence Spread Spectrum (DS-SS) Frequency hop spread spectrum (FH-SS) 5.2. What do you mean by spread spectrum? Spread spectrum multiple access uses signals which have a transmission bandwidth whose magnitude is greater than the minimum required RF bandwidth. A pseudo noise (PN) sequence converts a narrowband signal to a wideband noise like signal before transmission 5.3. What is PN sequence? Pseudo oise se ue e is a oded se ue e of ’s a d ’s ith auto o elatio p ope ties. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 30 EC2401- Wireless Communication Notes VII semester ECE 5.4. When is the PN sequence called as maximal length sequence? When the pseudo-noise sequence generated by linear feedback shift register has the length (N) of 2m-1 where m is number of stages in shift register is called maximal length sequence. 5.5. Write the properties which a PN sequence should have. Properties of PN sequence are: i. ii. iii. Balance property Run property Correlation property 5.6. Define chip duration and chip rate. The duration of every bit in PN sequence is known as chip duration. The number of bits (chips) per second is called chip rate. 5.7. What do you mean by processing gain of a spread spectrum? Bandwidth of spreaded data signal Processing gain = __________________________________ Bandwidth of unspreaded data signal Bit Duration = __________ Bandwidth = Chip duration Prepared By A.Devasena., Associate Professor., Dept/ ECE ___________ Information rate Page 31 EC2401- Wireless Communication Notes VII semester ECE 5.8.List the advantages and disadvantages of DS-SS. Advantages of DS-SS: i. The performance of DS-SS in presence of noise is superior to FH-SS. ii. Good antijamming capability. iii. Low multipath interference. Disadvantages of DS-SS: i. ii. iii. Poor synchronization. Requires large bandwidth. Long acquisition time so that the system is slow. 5.9. Define jamming and jamming margin. Jamming is a multitone or powerful broad band noise. It is the ratio of the average interference power and the signal power. Jamming margin in dB as the difference between the processing gain in dB and minimum SNR in dB. 5.10. What is meant by anti-jamming? With the help of spread spectrum method, the transmitted signals are spread over the mid frequency band. Hence these signals appear as noise. Then it becomes difficult for the jammers to attack our signal. This method is called antijamming. 5.11.List the advantages and disadvantages of FH-SS. Advantages of FH-SS: i. High processing gain than DS-SS. ii. Shorter acquisition time makes the system fast. Disadvantages of FH-SS: i. FH-SS requires large bandwidth. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 32 EC2401- Wireless Communication Notes ii. VII semester ECE Circuit used for FH-SS is complex. Expensive frequency synthesizers are required. 5.12.List the types of FH-SS. Types of FH-SS are: i. ii. Slow frequency hopping Fast frequency hopping 5.13.Compare slow and fast FH-SS. Slow FH-SS Fast FH-SS More than one symbol is transmitted per hop. One symbol is transmitted with more than one hops. Chip rate is equal to the symbol rate. Chip rate is equal to the hop rate. Same carrier frequency is used to transmit one One symbol is transmitted over multiple or more symbols. carriers in different hops. 5.14.Compare DS-SS and FH-SS. DS-SS FH-SS PN sequence is multiplied with narrow band Data bits are transmitted in different frequency slots which are changed by PN signal. sequence. Modulation used is BPSK-coherent. Modulation used is M-ary FSK noncoherent. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 33 EC2401- Wireless Communication Notes VII semester ECE Faster than DS-SS. Fixed chip rate. Variable chip rate. Long acquisition time is required. Short acquisition time. Effect of distance is high. Effect of distance is less. 5.15. State the principles of CDMA. Principles of CDMA: i. ii. Many users share the same frequency. Each user is assigned a different spreading code. 5.16. How the capacity can be increased in CDMA? Capacity in CDMA can be increased by i. ii. iii. iv. Quiet periods during speech transmission is shared by many users. Flexible data rate. Soft capacity. Error Correction coding used. 5.17.Write short notes on OFDM. OFDM splits the information into N parallel streams which are modulated by N distinct carriers and then transmitted. In order to separate the subcarriers by the receiver, they have to be orthogonal. 5.18. Why cyclic prefix? In delay dispersive channel, inter carrier interference occur. To overcome the effect of inter carrier interference and ISI, cyclic prefix is introduced. It is a cyclically extended guard interval whereby each symbol sequence is preceded by a periodic extension of the sequence itself. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 34 EC2401- Wireless Communication Notes VII semester ECE 5.19. Write the goals of GSM standard. Better and more efficient technical solution for wireless communication. Single standard was to be realized all over Europe enabling roaming across borders. 5.20. What is W-CDMA? It is a 3G wireless standard for cellular telephony. It provides better efficiency, higher peak rates upto 2 Mbps. Bandwidth of 5 MHz. Supports multimedia applications. 5.21.What are the services offered by GSM? Services offered by GSM are: i. ii. iii. Telephone services Bearer or Data services Supplementary services Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 35 EC2401- Wireless Communication Notes VII semester ECE WIRELESS COMMUNICATION PART B UNIT 1 7. i. Compare and contrast wired and wireless communication. (8) Nov. 2011 ii. Discuss briefly about the requirements of services for a wireless system. (8) 8. i. Discuss in detail the constructive and destructive interferences. (8) Nov. 2011 ii. Explain how Inter Symbol Interference is caused and how it is eliminated. (8) 9. i. Explain in detail Wide Area Data Services and Broadband Wireless Access services offered to wireless networks. (10) May 2012 ii. What are paging systems? Explain. (6) 10. i. With a neat block diagram, explain the cellular network architecture.(10) May 2012 ii. Explain any one type of Multiple Access scheme. (6) 11. i. Explain about the factors that influence small scale fading. (10) Nov 2012 ii. Find the average fade duration for threshold levels ρ = 0.01, ρ = 0.1 and ρ = 1, when the Doppler frequency is 200 Hz. 12. i. Write a note on Noise and Interference Limited Systems. ii. Discuss the principles of cellular networks. (8) Nov. 2012 (8) 1.Compare and contrast wired and wireless communication (8) Nov. 2011 Wired communication Wireless communication The communication takes place over a more or less stable medium like copper wires or optical fibers. The properties of the medium are well defined and time-invariant. Due to user mobility as well as multipath propagation, the transmission medium varies strongly with time. The range over which communications can be performed without repeater stations is mostly limited by attenuation by the medium (and thus noise); for optical fibers, the distortion of transmitted pulses can also limit the speed of data transmission. The range that can be covered is limited both by the transmission medium (attenuation, fading, and signal distortion) and by the requirements of spectral efficiency (cell size). Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 36 EC2401- Wireless Communication Notes Increasing the transmission capacity can be achieved by using a different frequency on an existing cable, and/or by stringing new cables. Interference and crosstalk from other users either do not happen or the properties of the interference are stationary. The delay in the transmission process is also constant, determined by the length of the cable and the group delay of possible repeater amplifiers. The Bit Error Rate (BER) decreases strongly (approximately exponentially) with increasing Signal-to-Noise Ratio (SNR). This means that a relatively small increase in transmit power can greatly decrease the error rate. Due to the well-behaved transmission medium, the quality of wired transmission is generally high. Jamming and interception of dedicated links with wired transmission is almost impossible without consent by the network operator Establishing a link is location based. In other words, a link is established from one outlet to another, independent of which person is connected to the outlet. Power is either provided through the communications network itself (e.g., for traditional landline telephones), or from traditional power mains (e.g., fax). In neither case is energy consumption a major concern for the designer of the device. VII semester ECE Increasing the transmit capacity must be achieved by more sophisticated transceiver concepts and smaller cell sizes (in cellular systems), as the amount of available spectrum is limited. Interference and crosstalk from other users are inherent in the principle of cellular communications. Due to the mobility of the users, they also are time-variant. The delay of the transmission depends partly on the distance between base station and Mobile Station (MS), and is thus time-variant. For simple systems, the average BER decreases only slowly (linearly) with increasing average SNR. Increasing the transmit power usually does not lead to a significant reduction in BER. However, more sophisticated signal processing helps. Due to the difficult medium, transmission quality is generally low unless special measures are used. Jamming a wireless link is straightforward, unless special measures are taken. Interception of the on-air signal is possible. Encryption is therefore necessary to prevent unauthorized use of the information. Establishing a connection is based on the (mobile) equipment, usually associated with a specific person. The connection is not associated with a fixed location. MSs use rechargeable or one-way batteries. Energy efficiency is thus a major concern. 2.Explain about the factors that influence small scale fading. (10) Nov 2012 Many physical factors in the radio propagation channel influence small scale fading. These include the following: Multipath propagation — The presence of reflecting objects and scatterers in the channel creates a constantly changing environment that dissipates the signal energy in amplitude, phase, and time. These effects result in multiple versions of the transmitted signal that arrive at the receiving antenna, displaced with respect to one another in time and spatial orientation. The random phase and amplitudes of the different multipath components cause fluctuations in signal strength, thereby inducing small-scale fading, signal distortion, or both. Multipath propagation often lengthens the time required for the baseband portion of the signal to reach the receiver which can cause signal smearing due to intersymbol interference. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 37 EC2401- Wireless Communication Notes VII semester ECE Speed of the mobile — The relative motion between the base station and the mobile results in random frequency modulation due to different Doppler shifts on each of the multipath components. Doppler shift will be positive or negative depending on whether the mobile receiver is moving toward or away from the base station. Speed of surrounding objects — If objects in the radio channel are in motion, they induce a time varying Doppler shift on in multipath components. If the surrounding objects move at a greater rate than the mobile, then this effect dominates the small-scale fading. Otherwise, motion of surrounding objects may be ignored, and only the speed of the mobile need be considered. The transmission bandwidth of the signal — If the transmitted radio signal bandwidth is greater than the "bandwidth" of the multipath channel, the received signal will be distorted, but the received signal strength will not fade much over a local area (i.e., the small-scale signal fading will not be significant). As will be shown, the bandwidth of the channel can be quantified by the coherence bandwidth which is related to the specific multipath structure of the channel. The coherence bandwidth is a measure of the maximum frequency difference for which signals are still strongly correlated in amplitude. If the transmitted signal has a narrow bandwidth as compared to the channel, the amplitude of the signal will change rapidly, but the signal will not be distorted in time. Thus, the statistics of small-scale signal strength and the likelihood of signal smearing appearing over smallscale distances are very much related to the specific amplitudes and delays of the multipath channel, as well as the bandwidth of the transmitted signal. 3.Write a note on Noise and Interference Limited Systems. (8) Nov. 2012 Noise-Limited Systems Wireless systems are required to provide a certain minimum transmission quality . This transmission quality in turn requires a minimum Signal-to-Noise Ratio (SNR) at the receiver (RX). Consider now a situation where only a single BS transmits, and a Mobile Station (MS) receives; thus, the performance of the system is determined only by the strength of the (useful) signal and the noise. As the MS moves further away from the BS, the received signal power decreases, and at a certain distance, the SNR does not achieve the required threshold for Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 38 EC2401- Wireless Communication Notes VII semester ECE reliable communications. Therefore, the range of the system is noise limited; equivalently, we can call it signal power limited . Depending on the interpretation, it is too much noise or too little signal power that leads to bad link quality. P RX = P TXGRXGTX (λ / 4πd)2 .----------------------------------------------- (1) where GRX and GTX are the gains of the receive and transmit antennas, respectively, λ is the wavelength, and P TX is the transmit power The noise that disturbs the signal can consist of several components, as follows Thermal noise: The power spectral density of thermal noise depends on the environmental temperature Te that the antenna “sees.” The temperature of the Earth is around 300 K, while the temperature of the (cold) sky is approximately Te ≈ 4K (the temperature in the direction of the Sun is of course much higher). As a first approximation, it is usually assumed that the environmental temperature is isotropically 300 K. Noise power spectral density is then N0 = kBTe -------------------------------------------------------------------- (2) where kB is Boltzmann’s constant, kB = 1.38 ・ 10−23 J/K, and the noise power is Pn = N0B--------------------------------------------------------------------------------(3) where B is RX bandwidth (in units of Hz). It is common to write Eq. (.2) using logarithmic units (power P expressed in units of dBm is 10 log10 (P/1 mW)) N0 = −174 dBm/Hz --------------------------------------------- (4) This means that the noise power contained in a 1-Hz bandwidth is −174 dBm. The noise power contained in bandwidth B is −174 + 10 log10(B) dB.--------------------------------------------------------------(5) The logarithm of bandwidth B, specifically 10 log10(B), has the units dBHz. Man-made noise: We can distinguish two types of man-made noise: (a) Spurious emissions: Many electrical appliances as well as radio transmitters (TXs) designed for other frequency bands have spurious emissions over a large bandwidth that includes the frequency range in which wireless communications systems operate. For urban outdoor environments, car ignitions and other impulse sources are especially significant sources of noise. In contrast to thermal noise, the noise created by impulse sources decreases with Frequency At 150 MHz, it can be 20 dB stronger than thermal noise; at 900 MHz, it is typically 10 dB stronger. At Universal Mobile Telecommunications System (UMTS) frequencies, Note that frequency regulators in most countries impose limits on “spurious” or “out-ofband” emissions for all electrical devices. Furthermore, for communications operating in licensed bands, such spurious emissions are the only source of man-made noise. It lies in the nature of the license (for which the license holder usually has paid) that no other intentional emitters are allowed to operate in this band. In contrast to thermal noise, man-made noise is not necessarily Gaussian distributed. However, as a matter of convenience, most system-planning tools, as well as theoretical designs, assume Gaussianity anyway. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 39 EC2401- Wireless Communication Notes VII semester ECE (b) Other intentional emission sources: Several wireless communications systems operate in unlicensed bands. In these bands, everybody is allowed to operate (emit electromagnetic radiation) as long as certain restrictions with respect to transmit power, etc. are fulfilled. The most important of these bands is the 2.45-GHz Industrial, Scientific, and Medical (ISM) band. The amount of interference in these bands can be considerable. Receiver noise: The amplifiers and mixers in the RX are noisy, and thus increase the total noise power. This effect is described by the noise figure F, which is defined as the SNR at the RX input (typically after down conversion to baseband) divided by the SNR at the RX output. As the amplifiers have gain, noise added in the later stages does not have as much of an impact as noise added in the first stage of the RX. Mathematically, the total noise figure F eq of a cascade of components is Feq = F1 + F2 – 1 + F3 – 1 + ・・ ・ G1 G1G2 where Fi and Gi are noise figures and noise gains of the individual stages in absolute units (not in decibels (dB)). Note that for this equation, passive components, like attenuators with gain m < 1, can be interpreted as either having a noise figure of F = 1/m and unit gain of G = 1, or unit noise figure F = 1, and gain G = m. Interference-Limited Systems Consider now the case that the interference is so strong that it completely dominates the performance, so that the noise can be neglected. Let a BS cover an area (cell) that is approximately described by a circle with radius R and center at the location of the BS. Furthermore, there is an interfering TX at distance D from the “desired” BS, which operates at the same frequency, and with the same transmit power. How large does D have to be in order to guarantee satisfactory transmission quality 90% of the time, assuming that the MS is at the cell boundary (worst case)? As a first approximation, we treat the interference as Gaussian. This allows us to treat the interference as equivalent noise, and the minimum SIR, SIRmin, takes on the same values as SNRmin in the noise-limited case One difference between interference and noise lies in the fact that interference suffers from fading, while the noise power is typically constant (averaged over a short time interval). For determination of the fading margin, we thus have to account for the fact that (i) the desired signal is weaker than its median value during 50% of the time and (ii) the interfering signal is stronger than its median value 50% of the time. Mathematically speaking, the cumulative distribution function of the SIR is the probability that the ratio of two random variables is larger than a certain value in x% of all cases (where x is the percentage of locations in which transmission quality is satisfactory), As a first approximation, we can add the fading margin for the desired signal (i.e., the additional power we have to transmit to make sure that the desired signal level exceeds a certain value, x%, of the time, instead of 50%) and the fading margin of the interference –i.e., the power reduction to make sure that the interference exceeds a certain value only (100 − x)% of the time, instead of 50% of the time. This results in an overestimation of the true fading margin. Therefore, if we use that value in system planning, we are on the safe side. 4. Explain how Inter- Symbol Interference is caused and how it is eliminated. (8) Nov. 2011 The runtimes for different MPCs are different. This can lead to different phases of MPCs, which lead to interference in narrowband systems. In a system with large bandwidth, and thus good resolution in the time domain,3 the major consequence is signal dispersion: in other words, the impulse response of the Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 40 EC2401- Wireless Communication Notes VII semester ECE channel is not a single delta pulse but rather a sequence of pulses (corresponding to different MPCs), each of which has a distinct arrival time in addition to having a different amplitude and phase). This signal dispersion leads to Inter-Symbol Interference (ISI) at the RX. MPCs with long runtimes, carrying information from bit k, and MPCs with short runtimes, carrying contributions from bit k + 1 arrive at the RX at the same time, and interfere with each other. Assuming that no special measures4 are taken, this ISI leads to errors that cannot be eliminated by simply increasing the transmit power, and are therefore often called irreducible errors. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 41 EC2401- Wireless Communication Notes VII semester ECE ISI is essentially determined by the ratio between symbol duration and the duration of the impulse response of the channel. This implies that ISI is not only more important for higher data rates but also for multiple access methods that lead to an increase in transmitted peak data rate (e.g., time division multiple access,). Finally, it is also noteworthy that ISI can even play a role when the duration of the impulse response is shorter (but not much shorter) than bit duration. 5. Explain any one type of Multiple Access scheme. (6) May 2012 Frequency Division Multiple Access (FDMA) Frequency division multiple access (FDMA) assigns individual channels to individual users. It can be seen from Figure 1 that each user is allocated a unique frequency band or channel. These channels are assigned on demand to users who request service. During the period of the call, no other user can share the same frequency band. In FDD systems, the users are assigned a channel as a pair of frequencies; one frequency is used for the forward channel, while the other frequency is used for the reverse channel. The features of FDMA are as follows: • The FDMA channel carries only one phone circuit at a time. If an FDMA channel is not in use, then it sits idle and cannot be used by other users to increase or share capacity. It is essentially a wasted resource. • After the assignment of a voice channel, the base station and the mobile transmit simultaneously and continuously. • The bandwidths of FDMA channels are relatively narrow (30 kHz) as each channel supports only one circuit per carrier that is, FDMA is usually implemented in narrowband systems. • The symbol time is large as compared to the average delay spread. This implies that the amount of intersymbol interference is low and, thus, little or no equalization is required in FDMA narrowband systems. • The complexity of FDMA mobile systems is lower when compared to TDMA systems, though this is changing as digital signal processing methods improve for TDMA. • Since FDMA is a continuous transmission scheme, fewer bits are needed for overhead purposes (such as synchronization and framing bits) as compared to TDMA. • FDMA systems have higher cell site system costs as compared to TDMA systems, because of the single channel per carrier design, and the need to use costly band pass filters to eliminate spurious radiation at the base station. • The FDMA mobile unit uses duplexers since both the transmitter and receiver operate at the same time. This results in an increase in the cost of FDMA subscriber and base stations. • FDMA requires tight RF filtering to minimize adjacent channel interference. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 42 EC2401- Wireless Communication Notes VII semester ECE Nonlinear Effects in FDMA— In a FDMA system, many channels share the same antenna at the base station. The power amplifiers or the power combiners, when operated at or near saturation for maximum power efficiency, are nonlinear. The nonlinearities cause signal spreading in the frequency domain and generate intermodulation (IM) frequencies. IM is undesired RF radiation which can interfere with other channels in the FDMA systems, spreading of the spectrum results in adjacent-channel interference. Inter-modulation is the generation of undesirable harmonics. Harmonics generated outside the mobile radio band cause interference to adjacent services, while those present inside the band cause interference to other users in the mobile system Frequency Division Multiple Access 6.What are paging systems? Explain. (6) May 2012 Similar to broadcast, paging systems are unidirectional wireless communications systems. They are characterized by the following properties .  The user can only receive information, but cannot transmit. Consequently, a “call” (message) can only be initiated by the call center, not by the user. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 43 EC2401- Wireless Communication Notes VII semester ECE  The information is intended for, and received by, only a single user.  The amount of transmitted information is very small. Originally, the received information Consisted of a single bit of information, which indicated to the user that “somebody has sent you a message.” The user then had to make a phone call (usually from a payphone) to the call center, where a human operator repeated the content of the waiting message. Later, paging systems became more sophisticated, allowing the transmission of short messages (e.g., a different phone number that should be called, or the nature of an emergency). Still, the amount of information was rather limited. Due to the unidirectional nature of the communications, and the small amount of information, the bandwidth required for this service is small. This in turn allows the service to operate at lower carrier frequencies – e.g., 150MHz – where only small amounts of spectrum are available. As we will see later on, such lower carrier frequencies make it much easier to achieve good coverage of a large area with just a few transmitters. Pagers were very popular during the 1980s and early 1990s. For some professional groups, like doctors, they were essential tools of the trade, allowing them to react to emergencies in shorter time. However, the success of cellular telephony has considerably reduced their appeal. Cellphones allow provision of all the services of a pager, plus many other features as well. The main appeal of paging systems, after the year 2000, lies in the better area coverage that they can achieve. Pagers were very popular during the 1980s and early 1990s. For some professional groups, like doctors, they were essential tools of the trade, allowing them to react to emergencies in shorter time. However, the success of cellular telephony has considerably reduced their appeal. Cellphones allow provision of all the services of a pager, plus many other features as well. The main appeal of paging systems, after the year 2000, lies in the better area coverage that they can achieve. 7. Discuss in detail the constructive and destructive interferences. Prepared By A.Devasena., Associate Professor., Dept/ ECE (8) Nov. 2011 Page 44 EC2401- Wireless Communication Notes VII semester ECE For wireless communications, the transmission medium is the radio channel between transmitter TX and receiver RX. The signal can get from the TX to the RX via a number of different propagation paths. In some cases, a Line Of Sight (LOS) connection might exist between TX and RX. Furthermore, the signal can get from the TX to the RX by being reflected at or diffracted by different Interacting Objects (IOs) in the environment: houses, mountains (for outdoor environments), windows, walls, etc. The number of these possible propagation paths are very large. As shown in figure 1 , each of the paths has a distinct amplitude, delay (runtime of the signal), direction of departure from the TX, and direction of arrival; most importantly, the components have different phase shifts with respect to each other. In the following, we discuss some implications of the multipath propagation for system design. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 45 EC2401- Wireless Communication Notes VII semester ECE Fading A simple RX cannot distinguish between the different Multi Path Components (MPCs); it just adds Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 46 EC2401- Wireless Communication Notes VII semester ECE them up, so that they interfere with each other. The interference between them can be constructive or destructive, depending on the phases of the MPCs, (Figure.2). The phases, in turn, depend mostly on the run length of the MPC, and thus on the position of the Mobile Station (MS) and the IOs. For this reason, the interference, and thus the amplitude of the total signal, changes with time if either TX, RX, or IOs is moving. This effect – namely, the changing of the total signal amplitude due to interference of the different MPCs – is called small-scale fading. At 2-GHz carrier frequency, a movement by less than 10 cm can already effect a change from constructive to destructive interference and vice versa. In other words, even a small movement can result in a large change in signal amplitude. A similar effect is known to all owners of car radios – moving the car by less than 1m (e.g., in stop-and-go traffic) can greatly affect the quality of the received signal. For cellphones, it can often be sufficient to move one step in order to improve signal quality. As an additional effect, the amplitudes of each separate MPC change with time (or with location). Obstacles can lead to a shadowing of one or several MPCs. Imagine, e.g., the MS in Figure3 that at first (at position A) has LOS to the Base Station (BS). As the MS moves behind the high-rise building (at position B), the amplitude of the component that propagates along the direct connection (LOS) between BS and MS greatly decreases. This is due to the fact that the MS is now in the radio shadow of the high-rise building, and any wave going through or around that building is greatly attenuated – an effect called shadowing. Of course, shadowing can occur not only for an LOS component but also for any MPC. Note also that obstacles do not throw “sharp” shadowsμ the transition from the “light” (i.e., LOS) zone to the “dark” (shadowed) zone is gradual. The MS has to move over large distances (from a few meters up to several hundreds of meters) to move from the light to the dark zone. For this reason, shadowing gives rise to large-scale fading. 8.Discuss briefly about the requirements of services for a wireless system.(8) Nov. 2011 Requirements for the Services Data Rate Data rates for wireless services span the gamut from a few bits per second to several gigabit per second, depending on the application Sensor networks usually require data rates from a few bits per second to about 1 kbit/s. Typically, a sensor measures some critical parameter, like temperature, speed, etc., and transmits the current value (which corresponds to just a few bits) at intervals that can range from milliseconds to several hours. Higher data rates are often required for the central nodes of sensor networks that collect the information from a large number of sensors and forward it for further processing. In that case, data rates of up to 10Mbit/s can be required. These “central nodes” show more similarity to WLANs or fixed wireless access. • Speech communications usually require between 5 and 64 kbit/s depending on the required quality and the amount of compression. Elementary data services require between 10 and 100 kbit/s. One category of these services uses the display of the cellphone to provide Internet-like information. Another type of data service provides a Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 47 EC2401- Wireless Communication Notes VII semester ECE wireless mobile connection to laptop computers. In this case, speeds that are at least comparable with dial-up (around 50 kbit/s) are demanded by most users, though elementary services with 10 kbit/s Communications between computer peripherals and similar devices: for the replacement of cables that link computer peripherals, like mouse and keyboard, to the computer (or similarly for cellphones), wireless links with data rates around 1Mbit/s are used. The functionality of these links is similar to the previously popular infrared links, but usually provides higher reliability. High-speed data services: WLANs and 3G cellular systems are used to provide fast Internet access, with speeds that range from 0.5 to 100 Mbit/s (currently under development). Personal Area Networks (PANs) is a newly coined term that refers mostly to the range of a wireless network (up to 10m), but often also has the connotation of high data rates (over 100 Mbit/s), mostly for linking the components of consumer entertainment systems (streaming video from computer or DVD player to a TV) or high-speed computer connections (wireless Universal Serial Bus (USB)). Range and Number of Users Another distinction among the different networks is the range and the number of users that they serve. By “range,” we mean here the distance between one transmitter and receiver. The coverage area of a system can be made almost independent of the range, by just combining a larger number of BSs into one big network. Body Area Networks (BANs) cover the communication between different devices attached to one body – e.g., from a cellphone in a hip holster to a headset attached to the ear. The range is thus on the order of 1m. BANs are often subsumed into PANs. Personal Area Networks include networks that achieve distances of up to or about 10 m, covering the “personal space” of one user. Examples are networks linking components of computers and home entertainment systems. Due to the small range, the number of devices within a PAN is small, and all are associated with a single “owner.” Also, the number of overlapping PANs (i.e.sharing the same space or room) is small – usually less than five. That makes cell planning and multiple access much simpler. WLANs, as well as cordless telephones cover still larger ranges of up to 100 m. The number of users is usually limited to about 10. When much larger numbers occur (e.g., at conferences or meetings), the data rates for each user decrease. Similarly, cordless phones have a range of up to 300m and the number of users connected to one BS is of the same order as for WLANs. Cellular systems have a range that is larger than, e.g., the range of WLANs. Microcells typically cover cells with 500m radius, while macrocells can have a radius of 10 or even 30 km. Fixed wireless access services cover a range that is similar to that of cellphones – namely, between 100m and several tens of kilometers. Also, the number of users is of a similar order as for cellular systems. Satellite systems provide even larger cell sizes, often covering whole countries and even continents. Cell size depends critically on the orbit of the satellite: geostationary satellites provide larger cell sizes (1,000-km radius) than LEOs. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 48 EC2401- Wireless Communication Notes VII semester ECE Mobility Wireless systems also differ in the amount of mobility that they have to allow for the users. The ability to move around while communicating is one of the main charms of wireless communication for the user. Still, within that requirement of mobility, different grades exist. Fixed devices are placed only once, and after that time communicate with their BS, or with each other, always from the same location. The main motivation for using wireless transmission techniques for such devices lies in avoiding the laying of cables. Even though the devices are not mobile, the propagation channel they transmit over can change with time. Nomadic devices: nomadic devices are placed at a certain location for a limited duration of time (minutes to hours) and then moved to a different location. This means that during one “drop” (placing of the device), the device is similar to a fixed device. However, from one drop to the next, the environment can change radically. Laptops are typical examples: people do not operate their laptops while walking around, but place them on a desk to work with them. Low mobility: many communications devices are operated at pedestrian speeds. Cordless phones, as well as cellphones operated by walking human users are typical examples. The effect of the low mobility is a channel that changes rather slowly, and – in a system with multiple BSs. High mobility usually describes speed ranges from about 30 to 150 km/h. Cellphones operated by people in moving cars are one typical example. Extremely high mobility is represented by high-speed trains and planes, which cover speeds between 300 and 1000 km/h. These speeds pose unique challenges both for the design of the physical layer (Doppler shift, see Chapter 5) and for the handover between cells. Energy Consumption Energy consumption is a critical aspect for wireless devices. Most wireless devices use (one-way or rechargeable) batteries, as they should be free of any wires – both the ones used for communication and the ones providing the power supply. Rechargeable batteries: nomadic and mobile devices, like laptops, cellphones, and cordless phones, are usually operated with rechargeable batteries. Standby times as well as operating times are one of the determining factors for customer satisfaction. Energy consumption is determined on one hand by the distance over which the data have to be transmitted (remember that a minimum SNR has to be maintained), and on the other hand, by the amount of data that are to be transmitted (the SNR is proportional to the energy per bit). One-way batteries: sensor network nodes often use one-way batteries, which offer higher energy density at lower prices. Furthermore, changing the battery is often not an option; rather, the sensor including the battery and the wireless transceiver is often discarded after the battery has run out. Power mains: BSs and other fixed devices can be connected to the power mains. Therefore, energy efficiency is not a major concern for them. It is thus desirable, if possible, to shift as much functionality (and thus energy consumption) from the MS to the BS. Use of Spectrum Spectrum can be assigned on an exclusive basis, or on a shared basis. That determines to a large Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 49 EC2401- Wireless Communication Notes VII semester ECE degree the multiple access scheme and the interference resistance that the system has to provide: Spectrum dedicated to service and operator: in this case, a certain part of the electromagnetic spectrum is assigned, on an exclusive basis, to a service provider. A prime point in case is cellular telephony, where the network operators buy or lease the spectrum on an exclusive basis (often for a very high price). Due to this arrangement, the operator has control over the spectrum and can plan the use of different parts of this spectrum in different geographical regions, in order to minimize interference. Spectrum allowing multiple operators: ◦ Spectrum dedicated to a service: in this case, the spectrum can be used only for a certain service (e.g., cordless telephones in Europe and Japan), but is not assigned to a specific operator. Rather, users can set up qualified equipment without a license. Such an approach does not require (or allow) interference planning. Rather, the system must be designed in such a way that it avoids interfering with other users in the same region ◦ Free spectrum: is assigned for different services as well as for different operators. The ISM band at 2.45 GHz is the best known example – it is allowed to operate microwave ovens, WiFi LANs, and Bluetooth wireless links, among others, in this band. Also for this case, each user has to adhere to strict emission limits, in order not to interfere too much with other systems and users. However, coordination between users (in order to minimize interference) becomes almost impossible – different systems cannot exchange coordination messages with each other, and often even have problems determining the exact characteristics (bandwidth, duty cycle) of the interferers. Direction of Transmission Simplex systems send the information only in one direction – e.g., broadcast systems and pagers. • Semi-duplex systems can transmit information in both directions. However, only one direction is allowed at any time. Walkie-talkies, which require the user to push a button in order to talk, are a typical example. Note that one user must signify (e.g., by using the word “over”) that (s)he has finished his/her transmission; then the other user knows that now (s)he can transmit. • Full-duplex systems allow simultaneous transmission in both directions – e.g., cellphones and cordless phones. • Asymmetric duplex systems: for data transmission, we often find that the required data rate in one direction (usually the downlink) is higher than in the other direction. However, even in this case, full duplex capability is maintained. Service Quality The requirements for service quality also differ vastly for different wireless services. The first main indicator for service quality is speech quality for speech services and file transfer speed for data services. Speech quality is usually measured by the Mean Opinion Score (MOS). It represents the average of a large number of (subjective) human judgments (on a scale from 1 to 5) about the quality of received speech . The speed of data transmission is simply measured in bit/s – obviously, a higher speed is better. An even more important factor is the availability of a service. For cellphones and other speech Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 50 EC2401- Wireless Communication Notes VII semester ECE services, the service quality is often computed as the complement of “fraction of blocked calls. plus 10 times the fraction of dropped calls. Explain in detail Wide Area Data Services and Broadband Wireless Access services offered to wireless networks. (10) May 2012 Wireless Local Area Networks The functionality of Wireless Local Area Networks (WLANs) is very similar to that of cordless phones – connecting a single mobile user device to a public landline system. The “mobile user device” in this case is usually a laptop computer and the public landline system is the Internet. As in the cordless phone case, the main advantage is convenience for the user, allowing mobility. Wireless LANs can even be useful for connecting fixed-location computers (desktops) to the Internet, as they save the costs for laying cables to the desired location of the computer. A major difference between wireless LANs and cordless phones is the required data rate. While cordless phones need to transmit (digitized) speech, which requires at most 64 kbit/s, wireless LANs should be at least as fast as the Internet that they are connected to. For consumer (home) applications, this means between 700 kbit/s (the speed of DSLs in the U.S.A.) and 3–5 Mbit/s (speed of cable providers in the U.S.A. and Europe) to ≥20 Mbit/s (speed of DSLs in Japan). For companies that have faster Internet connections, the requirements are proportionately higher. In order to satisfy the need for these high data rates, a number of standards have been developed, all of which carry the identifier IEEE 802.11. The original IEEE 802.11 standard enabled transmission with 1Mbit/s, the very popular 802.11b standard (also known under the name WiFi) allows up to 11 Mbit/s and the 802.11a standard extends that to 55 Mbit/s. Even higher rates are realized by the 802.11n standard that was introduced in 2008/2009. WLAN devices can, in principle, connect to any BS (access point) that uses the same standard. However, the owner of the access point can restrict the access – e.g., by appropriate security settings. Personal Area Networks When the coverage area becomes even smaller than that of WLANs, we speak of Personal Area Networks (PANs). Such networks are mostly intended for simple “cable replacement” duties. For example, devices following the Bluetooth standard allows to connect a hands-free headset to a phone without requiring a cable; in that case, the distance between the two devices is less than a meter. In such applications, data rates are fairly low (< 1Mbit/s). Recently, wireless communications between components in an entertainment system (DVD player to TV), between computer and peripheral devices (printer, mouse), and similar applications have gained importance, and a number of standards for PANs have been developed by the IEEE 802.15 group. For these applications, data rates in excess of 100 Mbit/s are used. Networks for even smaller distances are called Body Area Networks (BANs), which enable communications between devices located on various parts of a user’s body. Such BANs play an increasingly important role in the monitoring of patients’ health and of medical devices (e.g., pacemakers). Fixed Wireless Access Fixed wireless access systems can also be considered as a derivative of cordless phones or WLANs, essentially replacing a dedicated cable connection between the user and the public landline system. The main difference from a cordless system is that (i) there is no mobility of the user devices and (ii) the BS almost always serves multiple users. Furthermore, the distances bridged by fixed wireless access devices are much larger (between 100m and several tens of kilometers) than those bridged by cordless Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 51 EC2401- Wireless Communication Notes VII semester ECE telephones. The purpose of fixed wireless access lies in providing users with telephone and data connections without having to lay cables from a central switching office to the office or apartment the user is in. Considering the high cost of labor for the cable-laying operations, this can be an economical approach. However, it is worth keeping in mind that most buildings, especially in the urban areas of developed countries, are already supplied by some form of cable – regular telephone cable, cable TV, or even optical fiber. Rulings of the telecom regulators in various countries have stressed that incumbent operators (owners of these lines) have to allow competing companies to use these lines. As a consequence, fixed wireless access has its main market for covering rural areas, and for establishing connections in developing countries that do not have any wired infrastructure in place. In general, the business cases for fixed wireless has been disappointing. The IEEE 802.16 (WiMAX) standard tries to alleviate that problem by allowing some limited mobility in the system, and thus blurs the distinction from cellular telephony. _____________________________________________________________________________ Unit II – Part B 1. Compare coherence Bandwidth and Coherence time (8) Nov. 2011 Coherence Bandwidth The delay spread is a natural phenomenon caused by reflected and scattered propagation paths in the radio channel, the coherence bandwidth Bc, is a defined relation derived from the rms delay spread. Coherence bandwidth is a statistical measure of the range of frequencies over which the channel can be considered "flat" (i.e., a channel which passes all spectral components with approximately equal gain and linear phase); In other words, coherence bandwidth is the range of frequencies over which two frequency components have a strong potential for amplitude correlation. Two sinusoids with frequency separation greater than are affected quite differently by the channel. If the coherence bandwidth is defined as the bandwidth over which the frequency correlation function is above 0.9, then the coherence bandwidth is approximately Bc = (1 /50 στ) ----------------------- (1) If the definition is relaxed so that the frequency correlation function is above 0.5. then the coherence bandwidth is approximately Bc = / στ)-----------------------------(2) It is important to note that an exact relationship between coherence bandwidth and rms delay spread does not exist, and equations (1) and (2) are "ball park estimates". Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 52 EC2401- Wireless Communication Notes VII semester ECE Coherence time Tc: Coherence time Tc, is the time domain dual of Doppler spread and is used to characterize the time varying nature of the frequency dispersiveness of the channel in the time domain. The Doppler spread and coherence time are inversely proportional to one another. That is, Tc = ( 1/ fm) ------------------(3) Coherence time is actually a statistical measure of the time duration over which the channel impulse response is essentially invariant, and quantifies the similarity of the channel response at different times. In other words, coherence time is the time duration over which two received signals have a strong potential for amplitude correlation. If the reciprocal bandwidth of the baseband signal is greater than the coherence time of the channel, then the channel will change during the transmission of the baseband message, thus causing distortion at the receiver. If the coherence time is defined as the time over which the time correlation function is above 0.5, then the coherence time is approximately Tc = (λ / 16π fm) ------------------(4) where fm is the maximum Doppler shift given by fm = v/λ. __________________________________________________________________ 2. Describe any two methods of diffraction by multiple screens. (8) Nov. 2011 Diffraction by Multiple Screens Diffraction by a single screen is a problem that has been widely studied, because it is amenable to closed-form mathematical treatment, and forms the basis for the treatment of more complex problems. However, in practice, we usually encounter situations where multiple IOs are located between TX and RX. Such a situation occurs, e.g., for propagation over the rooftops of an urban environment. (See figure 1) Such a situation can be well approximated by diffraction by multiple screens. Unfortunately, diffraction by multiple screens is an extremely challenging mathematical problem, and – except for a few special cases – no exact solutions are available. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 53 EC2401- Wireless Communication Notes VII semester ECE Fig.1 . Fig. 2 Bullington’s Method Bullington’s method replaces the multiple screens by a single, “equivalent” screen. This equivalent screen is derived in the following way: put a tangential straight line from the TX to the real obstacles, and select the steepest one (i.e., the one with the largest elevation angle), so that all obstacles either touch this tangent, or lie below it. Similarly, take the tangents from the RX to the obstacles, and select the steepest one. The equivalent screen is then determined by the intersection of the steepest TX tangent and the steepest RX tangent (see Figure 2). The major attraction of Bullington’s method is its simplicity. However, this simplicity also leads to considerable inaccuracies. Most of the physically existing screens do not impact the location of the equivalent screen. Even the highest obstacle might not have an impact. Consider Figure 2 if the highest obstacle lies between screens 01 and 02, it could lie below the tangential lines, and thus not influence the “equivalent” screen, even though it is higher than either screen 01 or screen 02. In reality, these high obstacles do have an effect on propagation loss, and cause an additional attenuation. The Bullington method thus tends to give optimistic predictions of the received power. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 54 EC2401- Wireless Communication Notes VII semester ECE The Epstein–Petersen Method The low accuracy of the Bullington method is due to the fact that only two obstacles determine the equivalent screen, and thus the total diffraction coefficient. This problem can be somewhat mitigated by the Epstein–Petersen method [Epstein and Peterson 1953]. This approach computes the diffraction losses for each screen separately. The attenuation of a specific screen is computed by putting a virtual “TX” and “RX” on the tips of the screens to the left and right of this considered screen (see Figure 3). The diffraction coefficient, and the attenuation, of this one screen can be Fig. 3 Attenuations by the different screens are then added up (on a logarithmic scale). The method thus includes the effects of all screens. Despite this more refined modeling, the method is still only approximate. It uses the diffraction attenuation that is based on the assumption that the RX is in the far field of the screen. If, however, two of the screens are close together, this assumption is violated, and significant errors can occur. The inaccuracies caused by this “far-field assumption” can be reduced considerably by the slope diffraction method. In this approach, the field is expanded into a Taylor series. In addition to the zeroth-order term (far field), which enforces continuity of the electrical field at the screen, also the first-order term is taken into account, and used to enforce continuity of the first derivative of the field. This results in modified coefficients A and D, which are determined by recursion equations The Bullington method is independent of the number of screens, and thus obviously gives a wrong functional dependence. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 55 EC2401- Wireless Communication Notes VII semester ECE The Epstein–Petersen method adds the attenuations on a logarithmic scale and thus leads to an exponential increase of the total attenuation on a linear scale. ________________________________________________________________ 3. Discuss about wide band Model . Tapped Delay Line Models The most commonly used wideband model is an N-tap Rayleigh-fading model. This is a fairly generic structure, and is basically just the tapped delay line structure with the added restriction that the amplitudes of all taps are subject to Rayleigh fading. Adding an LOS component does not pose any difficulties; the impulse response then just becomes where the LOS component a0 does not vary with time, while the ci (t ) are zero-mean complex Gaussian random processes, whose autocorrelation function is determined by their associated Doppler spectra (e.g., Jakes spectra). In most cases, τ0 = τ1, so the amplitude distribution of the first tap is Rician. The model is further simplified when the number of taps is limited to N = 2, and no LOS component is allowed. This is the simplest stochastic fading channel exhibiting delay dispersion,and thus very popular for theoretical analysis. It is alternatively called the twopath channel, two delaychannel, or two-spike channel. Another popular channel model consists of a purely deterministic LOS component plus one fading tap (N = 1) whose delay τ0 can differ from τ1. This model is widely used for satellite channels – in these channels, there is almost always an LOS connection, and the reflections from buildings near the RX give rise to a delayed fading component. The channel reduces to a flat-fading Rician channel when τ0 = τ1. Models for the Power Delay Profile It has been observed in many measurements that the Power Delay Profile (PDP) can be approximated by a one-sided exponential function --------------- (1) Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 56 EC2401- Wireless Communication Notes VII semester ECE In a more general model (see also Section 7.3.3), the PDP is the sum of several delayed exponential functions, corresponding to multiple clusters of Interacting Objects (IOs) -------------------------(2) Where are the power, delay, and delay spread of the lth cluster, respectively. The sum of all cluster powers has to add up to the narrowband power described.For a PDP in the form of Eq. (1), the rms delay spread characterizes delay dispersion. In the case of multiple clusters, Eq. (2), the rms delay spread is defined mathematically, but often has a limited physical meaning. Still, the vast majority of measurement campaigns available in the literature use just this parameter for characterization of delay dispersion.Typical values of the delay spread for different environments are as follows: • Indoor residential buildings: 5–10 ns are typical; but up to 30 ns have been measured. • Indoor office environments: these show typical delay spreads of between 10 and 100 ns, but even 300 ns have been measured. Room size has a clear influence on delay spread. Building size and shape have an impact as well. • Factories and airport halls: these have delay spreads that range from 50 to 200 ns. • Microcells: in microcells, delay spreads range from around 5–100 ns (for LOS situations) to 100–500 ns (for non-LOS). • Tunnels and mines: empty tunnels typically show a very small delay spread (on the order of 20 ns), while car-filled tunnels exhibit larger values (up to 100 ns). • Typical urban and suburban environments: these show delay spreads between 100 and 800 ns, although values up to 3 s have also been observed. • Bad Urban (BU) and Hilly Terrain (HT) environments: these show clear examples of multiple clusters that lead to much larger delay spreads. Delay spreads up to 18 s, with cluster delays of up to 50 s, have been measured in various European cities, while American cities show somewhat smaller values. Cluster delays of up to 100 s occur in mountainous terrain. 4. Discuss about ultra wide band channel. (8) Nov.2011. Ultra Wideband Channels UWB Signals with Large Relative Bandwidth Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 57 EC2401- Wireless Communication Notes VII semester ECE The above models are wideband in the sense that they model the delay dispersion caused by multipath propagation. However, they are still based on the following two assumptions. 1.The reflection, transmission, and diffraction coefficients of the IOs are constant over the considered bandwidth. 2. The relative bandwidth of the system (bandwidth divided by carrier frequency) is much Smaller than unity. Note that these conditions are met for the bandwidth of most currently used wireless systems. However, in recent years, a technique called UltraWide Band (UWB) transmission has gained increased interest. UWB systems have a relative bandwidth of more than 20%. In that case, the different frequency components contained in the transmitted signal “see” different propagation environments. For example, the diffraction coefficient of a building corner is different at 100MHz compared with 1 GHz; similarly, the reflection coefficients of walls and furniture can vary over the bandwidth of interest. Channel impulse realization is then given by --------------------------- (1) where χi (τ ) denotes the distortion of the ith MPC by the frequency selectivity of IOs. One example for a distortion of a short pulse by diffraction by a screen is shown in Figure 1. Fig.1 Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 58 EC2401- Wireless Communication Notes VII semester ECE For UWB systems, propagation effects can also show frequency dependence. path loss is a function of frequency if the antennas have constant gain. Similarly, diffraction and reflection are frequency dependent. Thus, the higher frequency components of the transmitted signal are usually attenuated more strongly by the combination of antenna and channel. Also, this effect leads to a distortion of individual MPCs since any frequency dependence of the transfer function leads to delay dispersion, and thus distortion of an MPC. As a consequence of the distortion of the frequency dependence, statistical channel models also change. _____________________________________________________________________________ 5. What is the need for link calculation? Explain with suitable example. (8) May 2012 Link Budget A link budget is the clearest and most intuitive way of computing the required TX power. It tabulates all equations that connect the TX power to the received SNR. As most factors influencing the SNR enter in a multiplicative way, it is convenient to write all the equations in a logarithmic form – specifically, in dB. It has to be noted, however, that the link budget gives only an approximation (often a worst case estimate) for the total SNR, because some interactions between different effects are not taken into account. Before showing some examples, the following points should be stressed:  The attenuation due to propagation effects, between TX and RX. For the purpose of this chapter, we use a simple model, the so-called “breakpoint” model. For distances d < d break, the received power is proportional to d−2, according to Eq. (3.1). Beyond that point, the power is proportional to d−n, where n typically lies between 3.5 and 4.5. The received power is thus -------------------(1) Wireless systems, especially mobile systems, suffer from temporal and spatial variations of the transmission channel (fading). In other words, even if the distance is approximately constant, the received power can change significantly with small movements of the TX and/or RX. The power computed from Eq. (1) is only a mean value; the ratio of the transmit power to this mean received power is also known as the path loss (inverse of the path gain). If the mean received power is used as the basis for the link budget, then the transmission quality will be above the threshold only in approximately 50% of the times and locations. This Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 59 EC2401- Wireless Communication Notes VII semester ECE is completely unacceptable quality of service. Therefore, we have to add a fading margin, which makes sure that the minimum received power is exceeded in at least, e.g., 90% of all cases (see Figure 1). The value of the fading margin depends on the amplitude statistics of the fading Fig.1.Fading Margin To guarantee a certain outage Probability Uplink (MS to BS) and downlink (BS to MS) are reciprocal, in the sense that the voltage and currents at the antenna ports are reciprocal (as long as uplink and downlink use the same carrier frequency). However, the noise figures of BSs and MSs are typically quite different. As MSs have to be produced in quantity, it is desirable to use low-cost components, which typically have higher noise figures. Furthermore, battery lifetime considerations dictate that BSs can emit more power than MSs. Finally, BSs and MSs differ with respect to antenna diversity, how close they are to interferers, etc. Thus, the link budgets of uplinks and downlinks are different. Example: Consider the downlink of a GSM system .The carrier frequency is 950MHz and the RX sensitivity is (according to GSM specifications) −102 dBm. The output power of the TX amplifier is 30 W. The antenna gain of the TX antenna is 10 dB and the aggregate attenuation of connectors, combiners, etc. is 5 dB. The fading margin is 12 dB and the breakpoint dbreak is at a distance of 100 m. What distance can be covered? TX side: TX power P TX 30W Antenna gain GTX 10 Losses (combiner, connector, etc.) Lf 45 dBm 10 dB −5dB Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 60 EC2401- Wireless Communication Notes VII semester ECE EIRP (Equivalent Isotropically Radiated Power) 50 dBm _________ RX side: RX sensitivity P min −102 dBm Fading margin 12 dB Minimum RX power (mean) −90 dBm Admissible path loss (difference EIRP and min. RX power) Path loss at dbreak = 100m [λ/(4πd)]2 Path loss beyond breakpoint ∝ d−n 140 dB 72 dB 68 dB Depending on the path loss exponent, n = 1.5 . . . 2.5 (line-of-sight)3 n = 3.5 . . . 4.5 (non-line-of-sight) we obtain the coverage distance, dcov = 100 ・ 1068/(10n)m (3.9) If, e.g., n = 3.5, then the coverage distance is 8.8 km. This example was particularly easy, because RX sensitivity was prescribed by the system specifications. __________________________________________________________________________ 6.How the received signal strength is predicted using the free space propagation model? Explain.(10) Nov. 2012 The free space propagation model is used to predict received signal strength when the transmitter and receiver have a clear, unobstructed line-of-sight path between them. Satellite communication systems and microwave line-of-sight radio links typically undergo free space propagation. As with most large-scale radio wave propagation models, the free space model predicts that received power decays as a function of the T-R separation distance raised to some power (i.e. a power law function). The free space power received by a receiver antenna which is separated from a radiating transmitter antenna by a distance d, is given by the Friis free space equation, _____________(1) where Pt is the transmitted power, Pr(d) is the received power which is a function of the T-R separation, GT is the transmitter antenna gain, Gr is the receiver antenna gain, d is the T-R Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 61 EC2401- Wireless Communication Notes VII semester ECE separation distance in meters, L is the system loss factor not related to propagation (L >1 1 ), and X is the wavelength in meters. The gain of an antenna is related to its effective aperture, Ae is ________________________ (2) effective aperture, Ae is related to the physical size of the antenna, and frequency by is related to the carrier ___________________ ( 3) where f is the carrier frequency in Hertz, ωc is the carrier frequency in radians per second, and c is the speed of light given in meters/s. The values for Pt and Pr must be expressed in the same units, and Gt and Gr are dimensionless quantities. The miscellaneous losses L (L _ 1) are usually due to transmission line attenuation, filter losses, and antenna losses in the communication system. A value of L = I indicates no loss in the system hardware. The Friis free space equation of (1) shows that the received power falls off as the square of the T-R separation distance. This implies that the received power decays with distance at a rate of 20 dB/decade. An isotropic radiator is an ideal antenna which radiates power with unit gain uniformly in all directions, and is often used to reference antenna gains in wireless systems. The effective isotropic radiated power (EIRP) is defined as EIRP = Pt Gt ___________________________ (4) direction of maximum antenna gain, as compared to an isotropic radiator. In practice, effective radiated power (ERP) is used instead of EIRP to denote the maximum radiated power as compared to a half-wave dipole antenna (instead of an isotropic antenna), Since a dipole antenna has a gain of 1.64 (2.15 dB above an isotrope), the ERP will be 2.15 dB smaller than the EIRP for the same transmission system. In practice, antenna gains are given in units of dBi (dB gain with respect to an isotropic source) or dBd (dB gain with respect to a half-wave dipole) The path loss, which represents signal attenuation as a positive quantity measured in dB, is defined as the difference (in dB) between the effective transmitted power and the received power, and may or may not include the effect of the antenna gains. The path loss for the free space model when antenna gains are included is given by Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 62 EC2401- Wireless Communication Notes VII semester ECE ___________________( 5) When antenna gains are excluded, the antennas are assumed to have unity gain, and path loss is given by ____________________(6) The Friis free space model is only a valid predictor for Pr, for values of d which are in the farfield of the 'transmitting antenna. The far-field, or Fraunhofer region, of a transmitting antenna is defined as the region beyond the farfield distance df, which is related to the largest linear dimension of the transmitter antenna aperture and the carrier wavelength. The Fraunhofer distance is given by _______________________________________(7 a) where D is the largest physical linear dimension of the antenna. Additionally, to be in the farfield region, df must satisfy _______________________________________(7b) and ________________________________________(7c) Furthermore, it is clear that equation (1) does not hold for d = 0. For this reason, large-scale propagation models use a close-in distance, d0, as a known received power reference point. The received power, Pr(d), at any distance d > d0, may be related to at d0. The value (d0) may be predicted from equation (1), or may be measured in the radio environment by taking the average received power at many points located at a close-in radial distance d0 from the transmitter. The reference distance must be chosen such that it lies in the far-field region, that is, d0 _ d1, and d0 is chosen to be smaller than any practical distance used in the mobile communication system. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 63 EC2401- Wireless Communication Notes VII semester ECE Thus, using equation (1), the received power in free space at a distance greater than d0 is given by __________________ (8) In mobile radio systems, it is not uncommon to find that Pt may change by many orders of magnitude over a typical coverage area of several square kilometers. Because of the large dynamic range of received power levels, often dBm or dBW units are used to express received power levels. Equation(8) may be expressed in units of dBm or dBW by simply taking the logarithm of both sides and multiplying by 10. For example, that Pr if is in units of dBm, the received power is given by ________ (9) Where Pr( d0) The reference distance d0 for practical systems using low-gain antennas in the 1-2 GHz region is typically chosen to be 1 m in indoor environments and 100 m or 1 km in outdoor environments, so that the numerator in equations (8) and (9) is a multiple of 10. This makes path loss computations easy in dB units. ________________________________________________________________________ UNIT IV Part B 1. With a neat block diagram, discuss the structure of a decision feedback equalizer. (8)Nov. 2011 2. Explain in detail Decision feedback equalizer. (8) May 2012 Decision Feedback Equalizer The basic idea behind decision feedback equalization is that once an information symbol has been detected and decided upon, the 1ST that it induces on future symbols can be estimated and subtracted out before detection of subsequent symbols [Pro891. The DFE can be realized in either the direct transversal form or as a lattice filter. The direct form is shown in Figure 6.8. It consists of a feedforward filter (FFF) and a feedback filter (FBF). The FBF is driven by decisions on the output of the detector, and its coefficients can be adjusted to cancel the ISI on the current symbol from past detected symbols. The Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 64 EC2401- Wireless Communication Notes VII semester ECE equalizer has N1 + N2 + I taps in the feed forward filter and N3 taps in the feedback filter, and its output can be expressed as: ------(1) where c*n, and yn, are tap gains and the inputs, respectively, to the forward filter, F1 are tap gains for the feedback filter, and d1 (i ck) is the previous decision made on the detected signal. That is, once dk is obtained using equation (1),dk is decided from it. Then, dk along with previous decisions dk – 1,dk –2, arefed back into the equalizer, and d^k +1 is obtained using equation ( 1) The minimum mean squared error a DFE can achieve is ___________ (2) It can be shown that the minimum MSE for a DFE in equation (2) is always smaller than that of an LTE ________________ (3) in equation (3) unless is a constant (i.e, when adaptive equalization is not needed). If there are nulls Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 65 EC2401- Wireless Communication Notes VII semester ECE In a DFE has significantly smaller minimum MSE than an LTE. Therefore,an LTE is well behaved when the channel spectrum is comparatively flat, but if the channel is severely distorted or exhibits nulls in the spectrum, the performance of an LTE deteriorates and the mean squared error of a DFE is much better than a LTE. Also, an LTE has difficulty equalizing a non minimum phase channel, where the strongest energy arrives after the first arriving signal component. Thus, a DFE is more appropriate for severely distorted wireless channels. The lattice implementation of the DFE is equivalent to a transversal DFE having a feed forward filter of length N1 and a feedback filter of length N2, where N1 > N2. Another form of DFE proposed by Belfiore and Park is called a predictive DFE, and is shown in Figure 6.9. It also consists of a feed forward filter (FFF) as in the conventional DFE. However, the feedback filter (FBF) is driven by an input equence fonned by the difference of the output of the detector and the output of the feed forward filter. Hence, the FBF here is called a noise predictor because it predicts the noise and the residual 151 contained in the signal at the FFF output and subtracts from it the detector output after some feedback delay. The predictive DFE performs as well as Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 66 EC2401- Wireless Communication Notes VII semester ECE the conventional DFE as the limit in the number of taps in the FFF and the FBF approach infinity. The FEF in the predictive DFE can also be realized as a lattice structure The RLS lattice algorithm can be used in this case to yield fast convergence. 3.Explain in detail about: Polarization diversity Time diversity Frequency diversity Nov. 2012 (6) (5) (5) Diversity Techniques Diversity is a powerful communication receiver technique that provides wireless link improvement at relatively low cost. Unlike equalization, diversity requires no training overhead since a training sequence is not required by the transmitter. Furthermore, there are a wide range of diversity implementations, many which are very practical and provide significant link improvement with little added cost. Diversity exploits the random nature of radio propagation by finding independent (or at least highly uncorrelated) signal paths for communication. In virtually all applications, diversity decisions are made by the receiver, and are unknown to the transmitter. The diversity concept can be explained simply. If one radio path undergoes a deep fade, another independent path may have a strong signal. By having more than one path to select from, both the instantaneous and average SNRs at the receiver may be improved, often by as much as 20 dB to 30 dB. There are two types of fading — small-scale and large-scale fading. Small-scale fades are characterized by deep and rapid amplitude fluctuations which occur as the mobile moves over distances of just a few wavelengths. These fades are caused by multiple reflections from the surroundings in the vicinity of the mobile. Small-scale fading typically results in a Rayleigh fading distribution of signal strength over small distances. In order to prevent deep fades from occurring, microscopic diversity techniques can exploit the rapidly changing signal. For example, the small-scale fading shown in Figure 1 reveals that if two antennas are separated by a fraction of a meter, one may receive a null while the other receives a strong signal. By selecting the best signal at all times, a receiver can mitigate small-scale fading effects (this is called antenna diversity or space diversity). Large-scale fading is caused by shadowing due to variations in both the terrain profile and the nature of the surroundings. In deeply shadowed Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 67 EC2401- Wireless Communication Notes VII semester ECE conditions, the received signal strength at a mobile can drop well below that of free space. In Chapter 3, large-scale fading was shown to be log-normally distributed with a standard deviation of about 10 dB in urban environments. By selecting a base station which is not shadowed when others are, the mobile can improve substantially the average ratio on the forward link. This is called macroscopic diversity, since the mobile is taking advantage of large separations between the serving base stations. Macroscopic diversity is also useful at the base station receiver. By using base station antennas that are sufficiently separated in space, the base station is able to improve the reverse link by selecting the antenna with the strongest signal from the mobile. Polarization Diversity At the base station, space diversity is considerably less practical than at the mobile because the narrow angle of incident fields requires large antenna spacings. The comparatively high cost of using space diversity at the base station prompts the consideration of using orthogonal polarization to exploit polarization diversity. While this only provides two diversity branches it does allow the antenna elements to be co-located. In the early days of cellular radio, all subscriber units were mounted in vehicles and used vertical whip antennas. 'Today, however, over half of the subscriber units are portable. This means that most subscribers are no longer using vertical polarization due to hand-tilting when the portable cellular phone is used. This recent phenomenon has sparked interest in polarization diversity at the base station. Measured horizontal and vertical polarization paths between a mobile and a base station are reported to be uncorrelated by Lee and Yeh .The decorrelation for the signals in each polarization is caused by multiple reflections in the channel between the mobile and base station antennas. The reflection coefficient for each polarization is different, which results in different amplitudes and phases for each, or at least some, of the reflections. After sufficient random reflections, the polarization state of the signal will be independent of the transmitted polarization. In practice, however, there is some dependence of the received polarization on the transmitted polarization. Circular and linear polarized antennas have been used to characterize multipath inside buildings. When the path was obstructed, polarization diversity was found to dramatically reduce the multipath delay spread without significantly decreasing the received power. While polarization diversity has been studied in the past, it has primarily been used for fixed radio links which vary slowly in time. Line-of-sight microwave links, for example, typically use polarization diversity to support two simultaneous users on the same radio channel. Since the channel does not change much in such a link, there is little likelihood of cross polarization interference. As portable users proliferate, polarization diversity is likely to become more important for improving link margin and capacity. Time Diversity Time diversity repeatedly transmits information at time spacings that exceed the coherence time of the channel, so that multiple repetitions of the signal will be received with independent fading conditions, thereby providing for diversity. One modem implementation of time diversity Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 68 EC2401- Wireless Communication Notes VII semester ECE involves the use of the RAKE receiver for spread spectrum CDMA, where the multipath channel provides redundancy in the transmitted message. RAKE Receiver In CDMA spread spectrum systems (see Chapter 5), the chip rate is typically much greater than the flat fading bandwidth of the channel. Whereas conventional modulation techniques require an equalizer to undo the inter-symbol interference between adjacent symbols, CDMA spreading codes are designed to provide very low correlation between successive chips. Thus, propagation delay spread in the radio channel merely provides multiple versions of the transmitted signal at the receiver. If these multipath components are delayed in time by more than chip duration, they appear like uncorrelated noise at a CDMA receiver, and equalization is not required. However, since there is useful information in the multipath components. CDMA receivers may combine the time delayed versions of the original signal transmission in order to improve the signal to noise ratio at the receiver. A RAKE receiver does just this — it attempts to collect the time-shifted versions of the original signal by providing a separate correlation receiver for each of the multipath signals. The RAKE receiver, shown in Figure 1., is essentially a diversity receiver designed specifically for CDMA, where the diversity is provided by the fact that the multipath components are practically uncorrelated from one another when their relative propagation delays exceed a chip period. Figure 1.RAKE Receiver A RAKE receiver utilizes multiple correlators to separately detect the M strongest multipath components. The outputs of each correlator are weighted to provide a better estimate of the transmitted signal than is provided by a single component. Demodulation and bit decisions are then based on the weighted outputs of the M correlators. The basic idea of a RAKE receiver was first proposed by Price and Green. In outdoor environments, the delay between multipath Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 69 EC2401- Wireless Communication Notes VII semester ECE components is usually large and, if the chip rate is properly selected, the low autocorrelation properties of a CDMA spreading sequence can assure that multipath components will appear nearly uncorrelated with each other. Frequency Diversity Frequency diversity transmits information on more than one carrier frequency. The rationale behind this technique is that frequencies separated by more than the coherence bandwidth of the channel will not experience the same fades. Theoretically, if the channels are uncorrelated, the probability of simultaneous fading will be the product of the individual fading probabilities . Frequency diversity is often employed in microwave line-of-sight links which carry several channels in a frequency division multiplex mode (FDM). Due to tropospheric propagation and resulting refraction, deep fading sometimes occurs. In practice, 1:N protection switching is provided by a radio licensee, wherein one frequency is nominally idle but is available on a stand-by basis to provide frequency diversity switching for any one of the N other carriers (frequencies) being used on the same link, each carrying independent traffic. When diversity is needed, the appropriate traffic is simply switched to the backup frequency. This technique has the disadvantage that it not only requires spare bandwidth but also requires that there be as many receivers as there are channels used for the frequency diversity. However, for critical traffic, the expense may be justified. 4. With a neat block diagram, explain the principle of diversity. (8) May 2012 Principle of Diversity We treated conventional transceivers that transmit an uncoded bitstream over fading channels. For Additive White Gaussian Noise (AWGN) channels, such an approach can be quite reasonable: the Bit Error Rate (BER) decreases exponentially as the Signal-to-Noise Ratio (SNR) increases, and a 10-dB SNR leads to BERs on the order of 10−4. However, in Rayleigh fading the BER decreases only linearly with the SNR. We thus would need an SNR on the order of 40 dB in order to achieve a 10−4 BER, which is clearly unpractical. The reason for this different performance is the fading of the channel: the BER is mostly determined by the probability of channel attenuation being large, and thus of the instantaneous SNR being low. A way to improve the BER is thus to change the effective channel statistics – i.e., to make sure that the SNR has a smaller probability of being low. Diversity is a way to achieve this. The principle of diversity is to ensure that the same information reaches the receiver (RX) on statistically independent channels. Consider the simple case of an RX with two antennas. The antennas are assumed to be far enough from each other that small-scale fading is independent at the two antennas. The RX always chooses the antenna that has instantaneously larger receive power. As the signals are statistically independent, the probability that both antennas are in a fading dip simultaneously is Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 70 EC2401- Wireless Communication Notes VII semester ECE low – certainly lower than the probability that one antenna is in a fading dip. The diversity thus changes the SNR statistics at the detector input. Diversity reception in a two-state fading channel. To quantify this effect, let us consider a simple numerical example: the noise power within the RX filter bandwidth is 50 pW, the average received signal power is 1 nW, the SNR is thus 13 dB. In an AWGN channel, the resulting BER is 10−9, assuming that the modulation is differentially detected Frequency Shift Keying (FSK). Now consider a fading channel where during 90% of the time the received power is 1.11 nW, and the SNR is thus 13.5 dB, while for the remainder, it is zero. This means that during 90% of the time, the BER is 10−10; the remainder of the time, it is 0.5; the average BER is thus 0.9 · 10−10 + 0.1 · 0.5 = 0.05 -----------------(1) For the case of two-antenna diversity, the probability that the received signal power is 0 at both antennas simultaneously is 0.1 · 0.1 = 0.01. The probability that the received power is 1.11nW at both antennas simultaneously is 0.9 · 0.9 = 0.81; the probability that it is 1.11nW at one antenna and 0 at the other is 0.18. Assuming selection diversity, in both the latter cases, the SNR at the detector is 13.5 dB. The total BER is thus 0.01 · 0.5 + 0.99 · 10−10 = 0.005 --------------(2) 0.02 This is approximately the square of the BER for a single-antenna system. If we have three antennas, then the probability that the signal power is 0 at all three antennas simultaneously is 0.13; the total BER is then 0.5 · 0.001 + 0.999 · 10−10 = 0.0005; this is approximately the third power of the BER for a single-antenna system. 5.With a suitable diagram, explain the channel coding and speech coding techniques. (8) Nov.2012. Fundamentals of Channel Coding Channel coding protects digital data from errors by selectively introducing redundancies in the transmitted data. Channel codes that are used to detect errors are called error detection codes, while codes that can detect and correct errors are called error correction codes. In 1948, Shannon demonstrated that by proper encoding of the information, errors induced by a noisy channel can be reduced to any desired level without sacrificing the rate of information transfer. Shannon's channel capacity formula is applicable to the AWGN channel and is given by _________________ (1) where C is the channel capacity (bits per second), B is the transmission bandwidth (Hz), P is the received signal power (watts), and N0 is the single-sided noise power density (watts/liz). The received power at a receiver is given as Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 71 EC2401- Wireless Communication Notes VII semester ECE ____________________________ (2) where Eb is the average bit energy, and Rb is the transmission bit rate. Equation (1) can be normalized by the transmission bandwidth and is given by _____________________ (3) where C/B denotes bandwidth efficiency. The basic purpose of error detection and error correction techniques is to introduce redundancies in the data to improve wireless link performance. The introduction of redundant bits increases the raw data rate used, in the link, hence increases the bandwidth requirement for a fixed source data rate. This reduces the bandwidth efficiency of the link in high SNR conditions, but provides excellent BER performance at low SNR values. It is well known that the use of orthogonal signaling allows the probability of error to become arbitrarily small by expanding the signal set, i.e., by making the number of waveforms M provided that the SNR per bit exceeds the Shannon limit of SN/lb > —1.6 dB EVit79]. In the limit, Shannon's result indicates that extremely wideband signals could be used to achieve error free communications, as long as sufficient SNR exists. Error control coding waveforms, on the other hand, have bandwidth expansion factors that grow only linearly with the code block length. Error correction coding thus offers advantages in bandwidth limited applications, and also provides link protection in power limited applications. A channel coder operates on digital message (or source) data by encoding the source information into a code sequence for transmission through the channel. There are two basic types of error correction and detection codes: block codes and convolutional codes. Speech Coding Speech coders have assumed considerable importance in communication systems as their performance, to a large extent, determines the quality of the recovered speech and the capacity of the system. In mobile communication systems, bandwidth is a precious commodity, and service providers are continuously met with the challenge of accommodating more users within a limited allocated bandwidth. Low bit-rate speech coding offers a way to meet this challenge. The lower the bit rate at which the coder can deliver toll quality speech, the more speech channels can be compressed within a given bandwidth. For this reason, manufacturers and service providers are continuously in search of speech codes that will provide toll quality speech at lower bit rates. In mobile communication systems, the design and subjective test of speech coders has been extremely difficult. Without low data rate speech coding, digital modulation schemes offer little in the way of spectral efficiency for voice traffic. To make speech coding practical, implementations must consume little power and provide tolerable, if not excellent speech quality. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 72 EC2401- Wireless Communication Notes VII semester ECE The goal of all speech coding systems is to transmit speech with the highest possible quality using the least possible channel capacity. This has to be accomplished while maintaining certain required levels of complexity of implementation and communication delay. In general, there is a positive correlation between coder bit-rate efficiency and the algorithmic complexity required to achieve it. The more complex an algorithm is, the more its processing delay and cost of implementation. A balance needs to be struck between these conflicting factors, and it is the aim of all speech processing developments to shift the point at which this balance is made towards ever lower bit rates Speech coders differ widely in their approaches to achieving signal compression. Based on the means by which they achieve compression, speech coders are broadly classified into two categories: Waveform Coders and Vocoders. Waveform coders essentially strive to reproduce the time waveform of the speech signal as closely as possible. They are, in principle, designed to be source independent and can hence code equally well a variety of signals. They have the advantage of being robust for a wide range of speech characteristics and for noisy environments. All these advantages are preserved with minimal complexity, and in general this class of coders achieves only moderate economy in transmission bit rate. Examples of waveform coders include pulse code modulation (PCM), differential pulse code modulation (DPCM), and adaptive differential pulse code modulation (ADPCM), delta modulation (DM), and continuously variable slope delta modulation (CVSDM), and adaptive predictive coding. Vocoders on the other hand Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 73 EC2401- Wireless Communication Notes VII semester ECE achieve very high economy in transmission bit rate and are in general more complex. They are based on using a priori knowledge about the signal to be coded, and for this reason, they are, in general, signal specific. 6. Explain any one method of channel coding. (8) May 2012 A channel coder operates on digital message (or source) data by encoding the source information into a code sequence for transmission through the channel. There are two basic types of error correction and detection codes: block codes and convolutional codes. Block Codes Block codes are forward error correction (FEC) codes that enable a limited number of errors to be detected and corrected without retransmission. Block codes can be used to improve the performance of a communications system when other means of improvement (such as increasing transmitter power or using a more sophisticated demodulator) are impractical. In block codes, parity bits are added to blocks of message bits to make code- words or code blocks. In a block encoder. k information bits are encoded into n code bits. A total of n — k redundant bits are added to the k information bits for the purpose of detecting and correcting errors. The block code is referred to as an (n,k) code, and the rate of the code is defined as = k/n and is equal to the rate of information divided by the raw channel rate. The ability of a block code to correct errors is a function of the code distance. Many families of codes exist that provide varying degrees of error protection Besides the code rate, other important parameters are the distance and the weight of a code. These are defined below. Distance of a Code — The distance of a codeword is the number of elements in which two codewords and Ci and Cj differ __________________ (1) where d is the distance of the codeword and q is the number of possible values of Ci and Cj If the code used is binary, the distance is known as the Hamming distance. The minimum distance dmin is the smallest distance for the given set and is given as Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 74 EC2401- Wireless Communication Notes VII semester ECE _________________________________ (2) Weight of a Code The weight of a codeword is given by the number of nonzero elements in the codeword. For a binary code, the weight is basically the number of l's in the codeword and is given as _____________________________________ (3) Properties of Block Codes Linearity — Suppose C. and C1 are two code words in an (n. k) block code. Let α1 and α2 be any two elements selected from the alphabet. Then the code is said to be linear if and only if α1C1 + α2C2 is also a code word. A linear code must contain the all-zero code word. Consequently, a constant-weight code is nonlinear. Sytematic — A systematic code is one in which the parity bits are appended to the end of the information bits. For an (n, k) code, the first k bits are identical to the information bits, and the remaining n — k bits of each code word are linear combinations of the k information bits. Cyclic — Cyclic codes are a subset of the class of linear codes which satisfies the following cyclic shift property: If C = , cn-1, Cn-2, ……..n c0J is a code word of a cyclic code, then [en 2' .., J , obtained by a cyclic shift of the elements of C, is also a code word. That is, all cyclic shifts of C are code words. As a consequence of the cyclic property, the codes possess a considerable amount of structure which can be exploited in the encoding and decoding operations. Encoding and decoding techniques make use of the mathematical constructs know as finite fields. Finite fields are algebraic systems which contain a finite set of elements. Addition, subtraction, multiplication, and division of finite field elements is accomplished without leaving the set (i.e., the sum/product of two field elements is a field element). Addition and multiplication must satisfy the commutative, associative, and distributive laws. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 75 EC2401- Wireless Communication Notes VII semester ECE UNIT 5 Part B 1. Explain: Code Division Multiple Access (CDMA) and compare its performance with TDMA. (16) May 2012 Code Division Multiple Access (CDMA) In code division multiple access (CDMA) systems, the narrowband message signal is multiplied by a very large bandwidth signal called the spreading signal. The spreading signal is a pseudo-noise code sequence that has a chip rate which is orders of magnitudes greater than the data rate of the message. All users in a CDMA system, as seen from Figure 8.5, use the same carrier frequency and may transmit simultaneously. Each user has its own pseudorandom code word which is approximately orthogonal to all other codewords. The receiver performs a time correlation operation to detect only the specific desired codeword. All other code words appear as noise due to decorrelation. For detection of the message signal, the receiver needs to know the codeword used by the transmitter. Each user operates independently with no knowledge of the other users. In CDMA, the power of multiple users at a receiver determines the noise floor after decorrelation. If the power of each user within a cell is not controlled such that they do not appear equal at the base station receiver, then the near-far problem occurs. The near-far problem occurs when many mobile users share the same channel. In general, the strongest received mobile signal will capture the demodulator at a base station. In CDMA, stronger received signal levels raise the noise floor at the base station demodulators for the weaker signals, thereby decreasing the probability that weaker signals will be received. lb combat the near-far problem, power control is used in most CDMA implementations. Power control is provided by each base station in a cellular system and assures that each mobile within the base station coverage area provides the same signal level to the base station receiver. This solves the problem of a nearby subscriber overpowering the base station receiver and drowning out the signals of far away subscribers. Power control is implemented at the base station by rapidly sampling the radio signal strength indicator (RSSI) levels of each mobile and then sending a power change command over the forward radio link. Despite the use of power control within each cell, out-of-cell mobiles provide interference which is not under the control of the receiving base station. The features of CDMA including the following:  Many users of a CDMA system share the same frequency. Either TDD or FDD may be used. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 76 EC2401- Wireless Communication Notes      VII semester ECE Unlike TDMA or FDMA, CDMA has a soft capacity limit. Increasing the Thus, there is no absolute limit on the number of users in CDMA. Rather, the system performance gradually degrades for all users as the number of users is increased, and improves as the number of users is decreased. Multipath fading may be substantially reduced because the signal is spread over a large spectrum. If the spread spectrum bandwidth is greater than the coherence bandwidth of the channel, the inherent frequency diversity will mitigate the effects of small-scale fading. Channel data rates are very high in CDMA systems. Consequently, the symbol (chip) duration is very short and usually much less than the channel delay spread. Since PN sequences have low autocorrelation, multipath which is delayed by more than a chip will appear as noise. A RAKE receiver can be used to improve reception by collecting time delayed versions of the required signal. Since CDMA uses co-channel cells, it can use macroscopic spatial diversity to provide soft handoff. Soft handoff is performed by the MSC, which can simultaneously monitor a particular user from two or more base stations. The MSC may chose the best version of the signal at any time without switching frequencies. Self-jamming is a problem in CDMA system. Self-jamming arises from the fact that the spreading sequences of different users are not exactly orthogonal, hence in the despreading of a particular PN code, non-zero contributions to the receiver decision statistic for a desired user arise from the transmissions of other users in the system. The near-far problem occurs at a CDMA receiver if an undesired user has a high detected power as compared to the desired user. Time Division Multiple Access (TDMA) Time division multiple access (TDMA) systems divide the radio spectrum into time slots, and in each slot only one user is allowed to either transmit or receive. It can be seen from Figure 8.3 that each user occupies a cyclically repeating time slot, so a channel may be thought of as articular time slot that reoccurs every frame, where N time slots comprise a frame. TDMA systems transmit data in a buffer-and-burst method, thus the transmission for any user is noncontinuous. This implies that, unlike in FDMA systems which accommodate analog FM, digital data and digital modulation must be used with TDMA. The transmission from various users is interlaced into a repeating frame structure as shown in Figure 8.4. It can be seen that a frame consists of a number of slots. Each frame is made up of a preamble, an information message, and tail bits. In TDMAITDD, half of the time slots in the frame information message would be used for the forward link channels and half Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 77 EC2401- Wireless Communication Notes VII semester ECE would be used for reverse link channels. In TDMAIFDD systems, an identical or similar frame structure would be used solely for either forward or reverse transmission, but the carrier frequencies would be different for the forward and reverse links. In general, TDMAJFDD systems intentionally induce several time slots of delay between the forward and reverse time slots of a particular user, so that duplexers are not required in the subscriber unit. In a TDMA frame, the preamble contains the address and synchronization information that both the base station and the subscribers use to identify each other. Guard times are utilized to allow synchronization of the receivers between different slots and frames. Different TDMA wireless standards have different TDMA frame structures, and some are described in Chapter 10. The features of TDMA include the following:        TDMA shares a single carrier frequency with several users, where each user makes use of nonoverlapping time slots. The number of time slots per frame depends on several factors, such as modulation technique, available bandwidth, etc. Data transmission for users of a TDMA system is not continuous, but occurs in bursts. This results in low battery consumption, since the subscriber transmitter can be turned off when not in use (which is most of the time). Because of discontinuous transmissions in TDMA, the handoff process is much simpler for a subscriber unit, since it is able to listen for other base stations during idle time slots. An enhanced link control, such as that provided by mobile assisted handoff (MAHO) can be carried out by a subscriber by listening on an idle slot in the TDMA frame. TDMA uses different time slots for transmission and reception, thus duplexers are not required. Even if FDD is used, a switch rather than a duplexer inside the subscriber unit is all that is required to switch between transmitter and receiver using TDMA. Adaptive equalization is usually necessary in TDMA systems, since the transmission rates are generally very high as compared to FDMA channels. In TDMA, the guard time should be minimized. If the transmitted signal at the edges of a time slot are suppressed sharply in order to shorten the guard time, the transmitted spectrum will expand and cause interference to adjacent channels. High synchronization overhead is required in TDMA systems because of burst transmissions. TDMA transmissions are slotted, and this requires the receivers to be Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 78 EC2401- Wireless Communication Notes VII semester ECE synchronized for each data burst. In addition, guard slots are necessary to separate users, and this results in the TDMA systems having larger overheads as compared to FDMA.  TDMA has an advantage in that it is possible to allocate different numbers of time slots per frame to different users. Thus bandwidth can be supplied on demand to different users by concatenating or reassigning time slots based on priority. 2. What is orthogonal frequency division multiplexing? Explain OFDM technique and mention its merits, demerits and application. (16) May 2012. 3.Explain with neat diagram of orthogonal frequency division multiplexing. (8)Nov. 2012. Orthogonal Frequency Division Multiplexing (OFDM) is a modulation scheme that is especially suited for high-data-rate transmission in delay-dispersive environments. It converts a high-rate data stream into a number of low-rate streams that are transmitted over parallel, narrowband channels that can be easily equalized. Principle of Orthogonal Frequency Division Multiplexing OFDM splits a high-rate data stream into N parallel streams, which are then transmitted by modulating N distinct carriers (henceforth called subcarriers or tones). Symbol duration on each subcarrier thus becomes larger by a factor of N. In order for the receiver to be able to separate signals carried by different subcarriers, they have to be orthogonal. Conventional Frequency Division Multiple Access (FDMA), and depicted again in Figure 1, can achieve this by having large (frequency) spacing between carriers. This, however, wastes precious spectrum. A much narrower spacing of subcarriers can be achieved. Specifically, let subcarriers be at the frequencies fn = nW/N, where n is an integer, and W the total available bandwidth; in the most simple case, W = N/Ts. We furthermore assume for the moment that modulation on each of the subcarriers is Pulse Amplitude Modulation (PAM) with rectangular basis pulses. We can then easily see that subcarriers are mutually orthogonal, since the relationship __________________ (1) Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 79 EC2401- Wireless Communication Notes VII semester ECE Figure.1. Implementation of Transceivers OFDM can be interpreted in two waysμ one is an “analog” interpretation following from the picture of Figure .2a. we first split our original data stream into N parallel data streams, each of which has a lower data rate. We furthermore have a number of local oscillators (LOs) available, each of which oscillates at a frequency fn = nW/N, where n = 0, 1, . . .,N − 1. Each of the parallel data streams then modulates one of the carriers. This picture allows an easy understanding of the principle, but is ill suited for actual implementation – the hardware effort of multiple local oscillators is too high. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 80 EC2401- Wireless Communication Notes VII semester ECE Fig.2. An alternative implementation is digital . It first divides the transmit data into blocks of N symbols. Each block of data is subjected to an Inverse Fast Fourier Transformation (IFFT), and then transmitted (see Figure.2b). This approach is much easier to implement with integrated circuits. In the following, we will show that the two approaches are equivalent. Let us first consider the analog interpretation. Let the complex transmit symbol at time instant i on the nth carrier be cn,i . The transmit signal is then Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 81 EC2401- Wireless Communication Notes VII semester ECE _____________________(2) where the basis pulse gn(t ) is a normalized, frequency-shifted rectangular pulse: _______________(3) consider the signal only for i = 0, and sample it at instances tk = kTs/N ______________________(4) Now, this is nothing but the inverse Discrete Fourier Transform (DFT) of the transmit symbols. Therefore, the transmitter can be realized by performing an Inverse Discrete Fourier Transform(IDFT) on the block of transmit symbols (the blocksize must equal the number of subcarriers).In almost all practical cases, the number of samples N is chosen to be a power of 2, and theIDFT is realized as an IFFT. In the following, we will only speak of IFFTs and Fast Fourier Transforms (FFTs). Note that the input to this IFFT is made up of N samples (the symbols for the different subcarriers), and therefore the output from the IFFT also consists of N values. These N values now have to be transmitted, one after the other, as temporal samples – this is the reason why we have a P/S (Parallel to Serial) conversion directly after the IFFT. At the receiver, we can reverse the process: sample the received signal, write a block of N samples into a vector – i.e., an S/P (Serial to Parallel) conversion – and perform an FFT on this vector. The result is an estimate ˜ cn of the original data cn. Analog implementation of OFDM would require multiple LOs, each of which has to operate with little phase noise and drift, in order to retain orthogonality between the different subcarriers. This is usually not a practical solution. The success of OFDM is based on the above-described digital implementation that allows an implementation of the transceivers that is much simpler and cheaper. In particular, highly efficient structures exist for the implementation of an FFT (so-called “butterfly structures”), and the computational effort (per bit) of performing an FFT increases only with log (N). OFDM can also be interpreted in the time–frequency plane. Each index i corresponds to a (temporal) pulse; each index n to a carrier frequency. This ensemble of functions spans a grid in the time–frequency plane. 4. Explain the principle of direct sequence spread spectrum technique.(8) Nov. 2011 Direct Sequence Spread Spectrum (DS-SS): Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 82 EC2401- Wireless Communication Notes VII semester ECE A direct sequence spread spectrum (DS-SS) system spreads the baseband data by directly multiplying the baseband data pulses with a pseudo-noise sequence that is produced by a pseudonoise code generator. A single pulse or symbol of the PN waveform is called a chip. Figure 1 shows a functional block diagram of a DS system with binary phase modulation. This system is one of the most widely used direct sequence implementations. Synchronized data symbols, which may be information bits or binary channel code symbols, are added in modulo-2 fashion to the chips before being phase modulated. A coherent or differentially coherent phase-shift keying (PSK) demodulation may be used in the receiver. Fig.1. Block diagram of a DS-SS system with binary phase modulation: (a) transmitter Fig.1. Block diagram of a DSSS system with binary phase modulation: (b) Receiver The received spread spectrum signal for a single user can be represented as Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 83 EC2401- Wireless Communication Notes VII semester ECE _____________________ (1) where m(t) is the data sequence, p(t) is the PN spreading sequence, fc is the carrier frequency, and θ is the carrier phase angle at t = 0. The data waveform is a time sequence of non overlapping rectangular pulses, each of which has amplitude equal to +1 or -1. Each symbol in m(t) represents a data symbol and has duration Each pulse in p(t) represents a chip, is usually rectangular with an amplitude equal to +1 or -1, and has a duration of The transitions of the data symbols and chips coincide such that the ratio Tç to is an integer. If is the bandwidth of and B is the bandwidth of SSS(t),and B is the bandwidth due to m(t) cos2πfc(t) ,the spreading due to p(t) gives Wss >B. Figure 1(b) illustrates a DS receiver. Assuming that code synchronization has been achieved at the receiver, the received signal passes through the wideband filter and is multiplied by a local replica of the PN code sequence p(t). If p(t) = ±1, then p2(t) = I, and this multiplication yields the despread signal s(t) given by ____________________________ (2) at the input of the demodulator. Because s1 (t) has the form of a BPSK signal, the corresponding demodulation extracts m(t). Figure 2.a.shows the received spectra of the desired signal and the interference at the output of the receiver wideband filter. Multiplication by the input. The signal bandwidth is reduced to fig.2.b, while the interference energy is spread over a bandwidth exceeding The filtering action of the demodulator removes most of the interference spectrum that does not overlap with the signal spectrum. Thus, most of the original interference energy is eliminated and does not affect the receiver performance. An approximate measure of the interference rejection capability is given by the ratio WSS/B, which is equal to the processing gain defined as ___________________________________ (3) The greater the processing gain of the system, the greater will be its ability to suppress in-band interference. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 84 EC2401- Wireless Communication Notes VII semester ECE Figure 2. 5. Explain in detail about the GSM logic channels. (8) Nov. 2011 GSM Logical Channels: In addition to the actual payload data, GSM also needs to transmit a large amount of signaling information. These different types of data are transmitted via several logical channels. The name stems from the fact that each of the data types is transmitted on specific timeslots that are parts of physical channels. The first part of this section discusses the kind of data that is transmitted via logical channels. The second part describes the mapping of logical channels to physical channels. Logical Channels of GSM Traffic CHannels (TCHs) Payload data are transmitted via the TCHs. The payload might consist of encoded voice data or “pure” data. There is a certain flexibility regarding the data rateμ Full-rate Traffic Channels (TCH/F) and Half-rate Traffic Channels (TCH/H). Two half-rate channels are mapped to the same timeslot, but in alternating frames. Full-Rate Traffic CHannels • Full-rate voice channels: the output data rate of the voice encoder is 13 kbit/s. Channel coding increases the effective transmission rate to 22.8 kbit/s. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 85 EC2401- Wireless Communication Notes VII semester ECE • Full-rate data channels: the payload data with data rates of 9.6, 4.8, or 2.4 kbit/s are encoded with Forward Error Correction (FEC) codes and transmitted with an effective data rate of 22.8 kbit/s. Half-Rate Traffic CHannels  Half-rate voice channels: voice encoding with a data rate as low as 6.5 kbit/s is feasible. Channel coding increases the transmitted data rate to 11.4 kbit/s.  Half-rate data channels: payload data with rates of 4.8 or 2.4 kbits/s can be encoded with an FEC code, which leads to an effective transmission rate of 11.4 kbit/s.. Broadcast CHannels (BCHs) BCHs are only found in the downlink. They serve as beacon signals. They provide the MS with the initial information that is necessary to start the establishment of any kind of connection. The MS uses signals from these channels to establish a synchronization in both time and frequency. Furthermore, these channels contain data regarding, e.g., cell identity. As the BSs are not synchronized with respect to each other, the MS has to track these channels not only before a connection is established, but all the time, in order to provide information about possible HOs. Frequency Correction Channels (FCCHs) The carrier frequencies of the BSs are usually very precise and do not vary in time, as they are based on rubidium clocks. However, dimension considerations and price considerations make it impossible to implement such good frequency generators in MSs. Therefore, the BS provides the MS with a frequency reference (an un-modulated carrier with a fixed offset from the nominal carrier frequency) via the FCCH. The MS tunes its carrier frequency to this reference; this ensures that both the MS and the BS use the same carrier frequency. Synchronization Channel (SCH) In order to transmit and receive bursts appropriately, an MS not only has to be aware of the carrier frequencies used by the BS but also of its frame timing on the selected carrier. This is achieved with the SCH, which informs the MS about the frame number and the Base Station Identity Code (BSIC). Decoding of the BSIC ensures that the MS only joins admissible GSM cells and does not attempt to synchronize to signals emitted by other systems in the same band. Broadcast Control Channel (BCCH) Cell-specific information is transmitted via the BCCH. This includes, e.g., Location Area Identity (LAI),7 maximum permitted signal power of the MS, actual available TCH, frequencies of the BCCH of neighboring BSs that are permanently observed by the MS to prepare for a handover, etc. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 86 EC2401- Wireless Communication Notes VII semester ECE Common Control Channels (CCCHs) Before a BS can establish a connection to a certain MS, it has to send some signaling information to all MSs in an area, even though only one MS is the desired receiver. This is necessary because in the initial setup stage, there is no dedicated channel established between the BS and a MS. CCCHs are intended for transmission of information to all MSs. Paging CHannel (PCH) When a request – e.g., from a landline – arrives at the BS to establish a connection to a specific MS, the BSs within a location area send a signal to all MSs within their range. This signal contains either the permanent International Mobile Subscriber Identity (IMSI) or the Temporary Mobile Subscriber Identity (TMSI) of the desired MS. The desired MS continues the process of establishing the connection by requesting (via a Random Access Channel (RACH)) a TCH, as discussed below. The PCH may also be used to broadcast local messages like street traffic information or commercials to all subscribers within a cell. Evidently, the PCH is only found in the downlink. Random Access CHannel (RACH) A mobile subscriber requests a connection. This might have two reasons. Either the subscriber wants to initiate a connection, or the MS was informed about an incoming connection request via the PCH. The RACH can only be found in the uplink. Access Grant CHannel (AGCH) Upon the arrival of a connection request via the RACH, the first thing that is established is a Dedicated Control Channel (DCCH) for this connection. This channel is called the Standalone Dedicated Control Channel (SDCCH), which is discussed below. This channel is assigned to the MS via the AGCH, which can only be found in the downlink. Dedicated Control CHannels (DCCHs) Similar to the TCHs, the DCCHs are bidirectional – i.e., they can be found in the uplink and downlink. They transmit the signaling information that is necessary during a connection. As the name implies, DCCHs are dedicated to one specific connection. Standalone Dedicated Control CHannel (SDCCH) After acceptance of a connection request, the SDCCH is responsible for further establishing this connection. The SDCCH ensures that the MS and the BS stay connected during the authentification process. After this process has been finished, a TCH is finally assigned for this connection via the SDCCH. Slow Associated Control CHannel (SACCH) Information regarding the properties of the radio link are transmitted via the SACCH. This information need not be transmitted very often, and therefore the channel is called slow. The MS informs the BS about the strength and quality of the signal received from serving BSs and neighboring BSs. The BS sends data about the power control and runtime of the signal from the MS to the BS. Fast Associated Control CHannel (FACCH) Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 87 EC2401- Wireless Communication Notes VII semester ECE The FACCH is used for HOs that are necessary for a short period of time; therefore, the channel has to be able to transmit at a higher rate than the SACCH. Transmitted information is similar to that sent by the SDCCH. The SACCH is associated with either a TCH or a SDCCH; the FACCH is associated with a TCH. 6. Explain the block diagram of IS-95 transmitter. (8) Nov. 2011. In 1991, the U.S.-based company Qualcomm proposed a system that was adopted by the Telecommunications Industry Association (U.S.) (TIA) as Interim Standard 95(IS-95). This system became the first commercial Code Division Multiple Access (CDMA) system that achieved wide popularity. In the years after 1992, cellular operators in the U.S.A. started to switch from analog (Advanced Mobile Phone System (AMPS)) to digital communications. While the market remained fragmented, IS-95 was adopted by a considerable number of operators, and by 2005 was used by two of the four major operators in the U.S.A. It also obtained a dominant market position in South Korea. The original IS-95 system did not fully exploit the flexibility inherent in CDMA systems; however, later refinements and modifications did make the system more flexible, and thus ready for data communications. In the late 1990s, the need for further enhancement of data communications capabilities became apparent. The new third-generation systems needed to be able to sustain high data rates, thus enabling audio- and video-streaming, Web browsing, etc. This would require higher data rates and flexible systems that could easily support multiple data rates with fine granularity. CDMA seemed well suited to this approach, and was chosen by all major manufacturers. However, no unique standard evolved. The IS-95 proponents (mostly U.S.based) developed the so-called CDMA 2000 standard, which is backward-compatible with IS-95, and allows a seamless transition. IS-95 is a CDMA system with an additional Frequency Division Multiple Access (FDMA) component. The available frequency range is divided into frequency bands of 1.25 MHz; duplexing is done in the frequency domain. In the U.S.A., frequencies from 1850–1910MHz are used for the uplink, and 1930–1990MHz are used for the downlink band Within each band, traffic channels, control channels, and pilot channels are separated by the different codes (chip sequences) with which they are spread. IS-95 specifies two possible speech coder rates: 13.3 or 8.6 kbit/s. In both cases, coding increases the data rate to 28.8 kbit/s. The signal is then spread by a factor of 64, resulting in a chip rate of 1.2288 Mchip/s. Theoretically, each cell can sustain 64 speech users. In practice, this number is reduced to 12–18, due to imperfect power control, nonorthogonality of spreading codes, etc. The downlink signals generated by one Base Station (BS) for different users are spread by different Walsh–Hadamard sequences (see Section 18.2.6), and thus orthogonal to each other. This puts an upper limit of 64 channels on each carrier. In the uplink, different users are separated by spreading codes that are not strictly orthogonal. Furthermore, interference from other cells reduces signal quality at the BS and Mobile Station Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 88 EC2401- Wireless Communication Notes VII semester ECE (MS). BSs use transmit powers between 8 and 50 W, depending on the coverage area required. MSs use peak powers of some 200mW; accurate power control makes sure that all signals arriving at the BS have the same signal strength. Traffic channels and control channels are separated by different spreading codes. All BSs are synchronized, using signals from GPS (Global Positioning System) to obtain an accurate system time. This synchronization makes it much easier for the MS to detect signals from different BSs and manage the handover from cell to cell. The requirements for the network and switching system, as well as operating support, servicing, and billing, are quite similar to those in GSM, and will not be repeated here. Similarly, billing considerations are the same as in GSM. Block diagramof a IS-95 Transmitter. we have considered the case when the output of the channel coder actually has a data rate of 28.8 kbit/s – i.e., a source rate of 14.4 or 9.6 kbit/s. However, depending on the source, data, a lower rate (14.4 kbit/s, 7.2 kbit/s, or 3.6 kbit/s) can also be the output of a convolutional encoder. In this case, encoded symbols are repeated (several times, if necessary) until a data rate of 28.8 kbit/s is achieved. It is these repeated data that are sent to the block interleaver for further processing. However, it would waste resources to transmit all of these repeated data at full power. For the uplink, this problem is solved by gating off the transmitter part of the time. If, e.g., the coded data rate is 14.4 kbit/s (source data rate 7.2 kbit/s), then the transmitter is turned on only 1/2 of the time. As a consequence, average transmit power is only 1/2 of the full-datarate case, and the interference seen by other users is only half as large. Determination of the time for gating off the transmitter is actually quite complicated. The first issue is that gating has to be coordinated with the interleaver. For example, for the 7.2-kbit source data rate mode, Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 89 EC2401- Wireless Communication Notes VII semester ECE each 1.25-ms-long group of output symbols is repeated once. Gating thus eliminates one of these two symbol groups. 7. Write a note on second generation and third generation wireless networks and standards. (8) Nov. 2012 Second Generation Wireless Networks: Second generation wireless systems employ digital modulation and advanced call processing capabilities. Examples of second generation wireless systems include the Global System for Mobile (GSM), the TDMA and CDMA U.S. digital standards (the Telecommunications Industry Association IS-54 and 15-95 standards), Second Generation Cordless Telephone (CT2), the British standard for cordless telephony, the Personal Access Communications System (PACS) local loop standard, and Digital European Cordless Telephone (DECT), which is the European standard for cordless and office telephony. There are many other second generation systems, Second generation wireless networks have introduced new network architectures that have reduced the computational burden of the MSC. GSM has introduced the concept of a base station controller (BSC)which is inserted between several base stations and the MSC. In PACS(WACS, the BSC is called a radio port control unit. This architectural change has allowed the data interface between the base station controller and the MSC to be standardized, thereby allowing carriers to use different manufacturers for MSC and BSC components. This trend in standardization and interoperability is new to second generation wireless networks. Eventually, wireless network components, such as the MSC and BSC, will be available as off-the-shelf components, much like their wire-line telephone counterparts. All second generation systems use digital voice coding and digital modulation. The systems employ dedicated control channels within the air interface for simultaneously exchanging voice and control information between the subscriber, the base station, and the MSC while a call is in progress. Second generation systems also provide dedicated voice and signaling trunks between MSCs, and between each MSC and the PSTN. In contrast to first generation systems, which were designed primarily for voice, second generation wireless networks have been specifically designed to provide paging, and other data services such as facsimile and high-data rate network access. The network controlling structure is more distributed in second generation wireless systems, since mobile stations assume greater control functions. In second generation wireless networks, the handoff process is mobilecontrolled and is known as mobile assisted handoff . The mobile units in these networks perform several other functions not performed by first generation subscriber units, such as received power reporting, adjacent base station scanning, data encoding, and encryption. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 90 EC2401- Wireless Communication Notes VII semester ECE DECT is an example of a second generation cordless telephone standard which allows each cordless phone to communicate with any of a number of base stations, by automatically selecting the base station with the greatest signal level. In DECT, the base stations have greater control in terms of switching, signaling, and controlling handoffs. In general, second generation systems have been designed to reduce the computational and switching burden at the base station or MSC, while providing more flexibility in the channel allocation scheme so that systems may be deployed rapidly and in a less coordinated manner. Third Generation Wireless Networks Third generation wireless systems will evolve from mature second generation systems. The aim of third generation wireless networks is to provide a single set of standards that can meet a wide range of wireless applications and provide universal access throughout the world. In third generation wireless systems, the distinctions between cordless telephones and cellular telephones will disappear, and a universal personal communicator (a personal handset) will provide access to a variety of voice, data, and video communication services. Third generation systems will use the Broadband Integrated Services Digital Network (B-ISDN) to provide access to information networks, such as the Internet and other public and private databases. Third generation networks will carry many types of information (voice, data, and video), will operate in varied regions (dense or sparsely populated regions), and will serve both stationary users and vehicular users traveling at high speeds. Packet radio communications will likely be used to distribute network control while providing a reliable information transfer. The terms Personal Communication System (PCS) and Personal Comrnunication Network (PCN) are used to imply emerging third generation wireless systems for hand-held devices. Other names for PCS include Future Public Land Mobile Telecommunication Systems (FPLMTS) for worldwide use which has more recently been called International Mobile Telecommunication (IMT-2000), and Universal Mobile Telecommunication System (UMTS) for advanced mobile personal services in Europe. 8.Discuss some methods to increase the capacity of wireless communication system. (8) Nov. 2011 Improving Capacity In wireless communication Systems: As the demand for wireless service increases, the number of channels assigned to a cell eventually becomes insufficient to support the required number of users. At this point, cellular design techniques are needed to provide more channels per unit coverage area. Techniques such as cell splitting, sectoring, and coverage zone approaches are used in practice to expand the capacity of cellular systems. Cell splitting allows an orderly growth of the cellular system. Sectoring uses directional antennas to further control the interference and frequency reuse of channels. The zone microcell concept distributes the coverage of a cell and extends the cell Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 91 EC2401- Wireless Communication Notes VII semester ECE boundary to hard-to-reach places. While cell splitting increases the number of base stations in order to increase capacity, sectoring and zone microcells rely on base station antenna placements to improve capacity by reducing co-channel interference. Cell splitting and zone microcell techniques do not suffer the trunking inefficiencies experienced by sectored cells, and enable the base station to oversee all handoff chores related to the microcells, thus reducing the computational load at the MSC. These three popular capacity improvement techniques will be explained in detail. Cell Splitting: Cell splitting is the process of subdividing a congested cell into smaller cells, each with its own base station and a corresponding reduction in antenna height and transmitter power. Cell splitting increases the capacity of a cellular system since it increases the number of times that channels are reused. By defining new cells which have a smaller radius than the original cells and by installing these smaller cells (called microcells) between the existing cells, capacity increases due to the additional number of channels per unit area. Cell Splitting Sectoring Cell splitting achieves capacity improvement by essentially rescaling the system. By decreasing the cell radius R and keeping the co-channel reuse ratio D/R unchanged, cell splitting increases the number of' channels per unit area. However, another way to increase capacity is to keep the cell radius unchanged and seek methods to decrease the D/R ratio. In this approach, capacity improvement is achieved by reducing the number of cells in a cluster and thus increasing the frequency reuse. However, in order to do this, it is necessary to reduce the relative Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 92 EC2401- Wireless Communication Notes VII semester ECE interference without decreasing the transmit power. The co-channel interference in a cellular system may be decreased by replacing a single omni-directional antenna at the base station by several directional antennas, each radiating within a specified sector. By using directional antennas, a given cell will receive interference and transmit with only a fraction of the available co-channel cells. The technique for decreasing co-channel interference and thus increasing system capacity by using directional antennas is called sectoring. The factor by which the cochannel interference is reduced depends on the amount of sectoring used. A cell is normally partitioned into three 120° sectors or six 60° sectors. Prepared By A.Devasena., Associate Professor., Dept/ ECE Page 93 EC2401- Wireless Communication Notes Prepared By A.Devasena., Associate Professor., Dept/ ECE VII semester ECE Page 94