Free Essay

Antenna Design

In:

Submitted By ramyakanna
Words 7933
Pages 32
TABLE OF CONTENTS PAGE NO.
CHAPTER 1- INTRODUCTION
1.1 INTRODUCTION 6
1.2 WHAT IS OFDMA? 9

CHAPTER 2 - SUBCARRIER ALLOCATION SCHEMES
2.1 STATIC SUBCARRIER ALLOCATION 12
2.2 DYNAMIC SUBCARRIER ALLOCATION 14 2.2.1 THE PROPOSED DSA SCHEME 15
CHAPTER 3- FLOW CHART AND ALGORITHM
4.1 FLOW CHART 17 4.1.1 MAIN FLOWCHART 17 4.1.2 WHEN 2 USERS FALL IN RANGE NUMBERED 3,5,8,14 20 4.1.3 WHEN 3 USERS FALL IN RANGE NUMBERED 3,5,8,14 22
4.2 ALGORITHM 24

CHAPTER 5-BLOCK DIAGRAMS
5.1 CONTROL FRAME TRANSCEIVER 28
5.2 DATA TRANSMISSION 29
5.3 DATA RECEPTION 31
CHAPTER 6- IMPLEMENTATION AND RESULTS 6.1 MATLAB 34 6.1.1 INSTRUCTIONS USED IN CODE 35
6.2 CONTROL FRAME TRANSMISSION AND RECEPTION 39
6.3 DATA GENERATION, TRANSMISSION AND RECEPTION 41
6.4 BER CALCULATION AND RESULTS 41

CHAPTER 7-ADVANTAGES AND CHALLENGES
7.1 ADVANTAGES 44
7.2 CHALLENGES 45

CHAPTER 8-APPLICATIONS
8.1 APPLICATIONS 47 CHAPTER 9- CONCLUSION
9.1 CONCLUSION 49

APPENDIX A
ERROR PROBABILITY FOR COHERENT BPSK 51
REFERENCES 55

LIST OF FIGURES PAGE NO.

Figure 1.1-The comparison between conventional FDM and the OFDM. 7
Figure 1.2- Traditional view of receiving signals carrying modulation. 7
Figure 1.3- OFDM Spectrum. 7
Figure1.4- Discrete-time system model of OFDMA. 9
Figure 1.5- Blocked and interleaved OFDMA. 10
Figure 2- Feature of SSA. 12
Figure 4.1.1-Main flow chart. 19
Figure 4.1.2-Flow chart when 2 users fall in 3,5,8,14. 21
Figure 4.1.3-Flow chart when all 3 user fall in 3,5,8,14. 24 Figure 5.1-Block diagram for transmitting and receiving control frame. 28 Figure 5.2-Block diagram for data transmission. 29
Figure 5.3-Characteristics of white noise (a) PSD , (b) autocorrelation. 30
Figure 5.4-signal space diagram for coherent BPSK system. 31
Figure 5.5-Block diagram for Data reception 31
Figure 6.2 - Control frame 39
Figure 6.4-BER plot after matlab simulation. 42

LIST OF ACRONYMS * OFDM – Orthogonal Frequency Division Multiplexing * OFDMA- Orthogonal Frequency Division Multiple Access * FDM - Frequency Division Multiplexing * CATV - Community Access Television/ Cable Access Television * DVB-RCT- Digital Video Broadcasting – Return Channel Terrestrial * WiMAX- Worldwide interoperability for Microwave Access * LTE - Long Term Evolution * ADSL- Asymmetric Digital Subscribers Line * WLAN- Wireless Local Area Network * ETSI –European Telecommunications Standard Institute * FFT – Fast Fourier Transform * IFFT- Inverse Fast Fourier Transform * ISI – Inter Symbol Interference * TDD- Time Division Duplexing * FDD- Frequency Division Duplexing * CP- Cyclic Prefix * CIR- Channel Impulse Response * SSA- Static Sub-Carrier Allocation * DSA- Dynamic Sub-Carrier Allocation * S/P- Serial to Parallel * P/S- Parallel to Serial * BPSK- Binary Phase Shift Keying * AWGN- Additive White Gaussian Noise * BER- Bit Error Rate * IEEE-Institute of Electrical and Electronics Engineers * PSD- Power Spectral Density * SFN- Single Frequency Networks * MoCA -Multimedia over Coax Alliance * VDSL- Very High Bit Rate Digital Subscribers Line * BPL -Broadband over Power line

CHAPTER 1
INTRODUCTION

CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
In modern communication system, due to the limitations on available bandwidth there is a need to utilize the available frequency spectrum to its best. To improve spectral efficiency in a wired or wireless system i.e., to accommodate as many users as possible with least possible degradation in the performance of the system , several multiple access schemes are devised. One of the upcoming and challenging scheme is Orthogonal Frequency Division Multiple Access (OFDMA).
The concept of OFDMA was first introduced by Sari and Karam, who investigated the application of OFDMA to send upstream information from subscriber premises to the cable head-end in CATV networks. This scheme was then adopted in the standard of digital terrestrial television (DVB-RCT) in the uplink of the interaction channel . OFDMA became popular in 2002, when it was adopted as the air interface for emerging IEEE 802.16e standards for wireless metropolitan area networks.
OFDMA is an extension of the OFDM into a multiuser environment. The main concept in OFDM is the orthogonality of the subcarriers because of which it is possible to arrange the carriers in an OFDM signal so that the sidebands of the individual carriers overlap and the signals are still received without adjacent carrier interference.

In a conventional serial data system, the symbols are transmitted sequentially, with the frequency spectrum of each data symbol allowed to occupy the entire available bandwidth. When the data rate is sufficiently high, several adjacent symbols may be completely distorted over frequency selective fading or multipath delay spread channel.

Figure 1.1 : The comparison between the conventional FDM and the OFDM.

The traditional frequency spectrum looks like as shown below

Figure 1.2 - Traditional view of receiving signals carrying modulation

The idea of OFDM technique was to use parallel data transfer and FDM with overlapping sub-channels to provide significant advantages in terms of simplified equalization, robustness to multipath distortion and increased spectral efficiency. The OFDM spectrum looks as shown below.

Figure 1.3- OFDM spectrum.

The main concept in OFDM is the orthogonality of the subcarriers because of which it is possible to arrange the carriers in an OFDM signal so that the sidebands of the individual carriers overlap and the signals are still received without adjacent carrier interference.

A baseband OFDM system model can be expressed in the following manner , where each sub carrier is of the form

Where n is a discrete time variable and fk is the carrier frequency for sub carrier k.The sub carriers frequency fk is defined as

where N is the number of sub carriers & T is the original sample time of the transmitted symbol . The baseband model of an OFDM system in discrete time is

where c(k) is the transmitted symbol on subcarrier k & x(n) is the OFDM symbol.

The sub-carriers spacing in an OFDM channel is given as: ∆f = K/Tu ( Hz) where , ∆f = subcarrier spacing K = positive integer ≈ 1 Tu = symbol duration(s)
For ‘N’ subcarriers total bandwidth is given by,
B =N.∆f ( Hz)

1.2 WHAT IS OFDMA ?
OFDMA is an extension of the OFDM into a multiuser environment . The principle of OFDMA is to divide the available subcarriers into several mutually exclusive groups (i.e., subbands) according to the subcarrier allocation strategies. Then each group of subcarriers is assigned to one user for simultaneous transmission. The OFDMA subcarrier structure can support a wide range of bandwidths, by adjusting FFT size to channel bandwidth while fixing the subcarrier spacing. [1]
In OFDMA systems, both time and/or frequency resources are used to separate the multiple user signals. Groups of OFDM symbols and/or groups of subcarriers are the units used to separate the transmissions to/from multiple users.
A general block diagram of this multiple access method can be seen in Figure 1.4. * Here user Data is modulated with a baseband modulated scheme * Baseband modulated symbols are assigned to sub-carriers,using the assignment map defined by the subcarrier allocation scheme ,then OFDM symbol is transmitted. * Data of Uth user can be received by knowledge of the subcarrier assignment * Cyclic prefix (CP) is added to combat Inter-Symbol Interference (ISI) and Inter-Channel Interference (ICI).

Figure1.4- Discrete-time system model of OFDMA

OFDMA can be employed in both, TDD(time division duplexing) and FDD (frequency division duplexing). In TDD , both downlink and uplink transmissions are made in same frequency band but in different time interval. In FDD, downlink and uplink transmissions are simultaneously done in different frequency bands.
A fraction of OFDM sub-carriers is assigned to a user in a contiguous or inter leaved manner:
Blocked OFDMA : Simple but possible throughput degradation due to channel fading.
Interleaved OFDMA: Attains channel diversity but there is need for “ stricter” synchronization.

Figure 1.5- Blocked and interleaved OFDMA The allocation of sub-carriers to the different users can be done in basically two different ways:
• Static Sub- carrier Allocation (SSA)
• Dynamic Sub- Carrier Allocation (DSA)
The use of OFDM/A as a modulation and multiple access scheme is growing for both indoor and outdoor applications. OFDM/A is being used in a number of wireless and wire-line applications including LTE, WLAN, Digital Audio and Video Broadcast, Fixed WiMAX, ADSL, and ADSL2+, Mobile WiMAX and LTE. It has been adopted in a wide range of systems, such as the IEEE 802.20 , which is supposed to be true mobile wireless technology with high capacity and high mobility, ETSI broadband radio access networks , multiuser satellite communications , and the fourth-generation cellular network .

CHAPTER 2 SUB-CARRIER ALLOCATION SCHEMES

CHAPTER 2 SUB-CARRIER ALLOCATION SCHEMES

2.1 STATIC SUBCARRIER ALLOCATION (SSA)

In OFDMA , sub-carriers are grouped into sets (sub-channels) each of which is assigned to different user . In SSA each user can have a predetermined set of subcarriers for the duration of connection. The sub-channel allocation may depend on factors like incoming data rate, available bandwidth, limiting BER etc. Interleaved , randomized , or clustered sub-carrier assignment can be used.
The features of SSA include simple implementation, cost effectiveness & minimal signaling overhead . But no frequency diversity is achieved.

Figure 2.1- Feature of SSA

Consider a subcarrier OFDMA system supporting users on the uplink .Each user is allotted subcarriers (either in block or interleaved fashion), in such a away that each subcarrier is allotted to only one user. Let Su denote the set of subcarriers allotted to the uth user.

The sequence transmitted by uth user reaches the receiver through an independent multipath channel with CIR , hu. With perfect timing of the processing window and perfect carrier frequency synchronization, the signal at the input to the N-point DFT unit in the receiver is

With all the K users perfectly aligned in time and with no Carrier frequency offset, the overall input to the N-point DFT unit in the receiver is

The kth subcarrier output of the uth user at the output of DFT unit is

The Static subcarrier allocation uses fixed resource allocation scheme in which each user is allocated a predetermined number of subcarriers. Consequently the allocated subcarriers to the users are under -utilized.

2.2 DYNAMIC SUB-CARRIER ALLOCATION (DSA) :
Dynamic subcarrier allocation enables users to adapt parameters for the appropriate use and reuse of subcarriers to minimize interference and increase overall network performance. It allocates subcarriers according to the users need and quality.
Adaptivity is one of the key requirements of DSA. By combining gathered information with knowledge of current system capabilities and limitations , DSA can perform various tasks . DSA concept is the ability to measure, sense, learn ,and be aware of important operating conditions.
An OFDM-based system can adaptively change the modulation order, coding, and transmit power of each individual subcarrier based on user needs or the channel quality. This adaptive allocation can be optimized to achieve various goals such as increasing the system throughput, reducing bit error rate (BER), limiting interferences, increasing coverage, or to prolong unit battery life. In multiuser OFDM systems, subcarriers allocation to users can be done adaptively as well to achieve the same goals.
Dynamic resource allocation can fully exploit the advantages of OFDM. Dynamic (adaptive) resource allocation can improve the performance of OFDM systems. Adaptive resource allocation strategies allow available resources to be used efficiently, by taking account of the channel conditions, and allocate to each user a subset of subcarriers which experience good channel conditions for that user.

The adaptivity in OFDMA systems can be performed either at algorithm level or at parameter level. In classical wireless systems, usually algorithm parameters, e.g. coding rate, have been adapted in order to optimize the transmission. In DSA throughput is optimized but signaling is overhead compared to SSA. DSA can be complex especially when there are large number of subcarriers present in DFT window.

2.2.1 THE PROPOSED DSA SCHEME
Depending upon the incoming data packets and the available buffer size we allocate the sub-carriers among three users . We assume that maximum of 256 buffers are available for each user. Each buffer acts as a register of length 256 bits. A total of 256x256 bits can be transmitted and received by each user on the allocated number of sub-carriers. This dynamic sub-carrier allocation scheme for 3 users will be explained in the chapter 4.
The total number of sub-carriers considered are 64 in number. We assume the wired environment to be an AWGN channel. For example, if 3 users need to send data via co-axial cables( fixed available Band width) then they have to wait until the channel is sensed to be free. By extending the concept of wireless OFDMA to wired one we want to enable simultaneous transmission of data from the 3 users in their allocated sub-carriers.
The sub-carriers allocation will change each time we read the filled buffer size. The allocated number of sub-carriers will be sent to the respective receivers in the first time slot and this is followed by the data transmission and reception. This is explained in chapter 5.

CHAPTER 3 FLOW CHART AND ALGORITHM

CHAPTER 3
FLOW CHART AND ALGORITHM

4.1 FLOW CHART
Our idea of subcarrier allocation among 3 users in an OFDMA system in a wired environment is shown graphically in the flowchart. Initially we have divided the maximum buffer size (256) into different ranges. Accordingly some numbers are assigned to each range so that it is useful for computation and initial subcarriers are assigned to each user so that even for a worst case scenario the sum of all initial subcarriers assigned will not exceed maximum number of sub-carriers(64) to be allocated. The remaining subcarriers are allocated using dynamic subcarrier allocation algorithm designed. The algorithm is divided into 3 steps. First step is when all the 3 users fall in any range from 0-255(buffer size),second step is when 2 users fall in the range numbered 3,5,8 and 14 and third step is when all 3 users fall in the range numbered 3,5,8 and 14.Based on this subcarriers are allocated accordingly.

4.1.1 MAIN FLOWCHART:
The input to each user is of random length. Hence the buffer size is also random. Maximum buffer length of 256 is assigned to each user. Initially, the buffer size for each user is found. The length of the buffer is divided into ranges i.e 0-15,16-31,32-63,64-127,128-191,192-255.The numbers 1,2,3,5,8,14 and initial subcarriers 4,8,12,15,18,21 are assigned to the users in the particular range as shown in the flowchart. The total number of subcarriers to be assigned in our algorithm is 64.Next ,the remaining number of subcarriers(X) is found by subtracting the sum of initial subcarriers assigned from the total number of subcarriers. Now, this remaining number of subcarriers are to be allocated dynamically to different users. This is done as follows- case 1: If all 3 users fall in the range numbered 1,2 which has less data to be transmitted, X/3 number of subcarriers are assigned to each user. case 2: If 2 users fall in the range numbered 1,2 then, X is assigned to the third user because it has large data to be transmitted and hence requires more number of subcarriers. case 3: If 1 user falls in the range numbered 1,2 then, assign X between other 2 users. case 4: If all 3 users fall in the range numbered 3,5,8,14 then, assign X among 3 users. case 3 and case 4 is considered in detail in step2 and step 3 respectively.
After initial and dynamic allocation of subcarriers, the sum of all the allocated subcarriers is found and checked if it is equal to 64.If this condition satisfies stop the main algorithm and if not satisfied , assign (sum-X) subcarriers to the third user.
START

Find the buffer size for each user

0-15 Nos assigned for computation Initial sub-carriers
4
1 Y

16-31

8
2
Y

32-63
12
3 Y

64-127

15
5
Y

128-191
18
8 Y

192-255
21
14 Y

Find the remaining number of sub-carriers to be assigned(X)

A A

If 3 users fall in 1,2
Assign X/3 to all three users Y

If 2 users fall in 1,2

Assign X to the 3rd user

N Y

Assign X between other two users

N
If 1 user fall in 1,2

Y

B N
C
Assign X between 3 users

Sum of sub-carriers is 64 ?

Assign (Sum-X) to the 3rd user

N

Y
STOP

Figure 4.1.1: Main flow chart

4.1.2 WHEN 2 USERS FALL IN RANGE NUMBERED 3,5,8,14:
The users falling in this range has large data to be transmitted and hence requires larger number of subcarriers. The other user is neglected and only initial subcarriers are assigned to that user. In this step, the difference between the numbers assigned to different ranges is found and depending on the difference the number of subcarriers to be allocated to different users is decided. First, the difference between the numbers assigned to 2 users is found and the following cases are checked- case 5: If diff =2,3,6; assign 0.55X to user1 and 0.45X to user2. case 6: If diff =-2,-3,-6; assign 0.45X to user1 and 0.55X to user2. case 7: If diff =5,9; assign 0.65X to user1 and 0.35X to user2. case 8: If diff =-5,-9; assign 0.35X to user1 and 0.65X to user2. case 9: If diff =11 ;assign 0.75X to user1 and 0.25X to user2. case 10: If diff=-11 ;assign 0.25X to user1 and 0.75X to user2.

If 1 of the above cases is satisfied, the subcarriers are assigned as shown above. This is as shown in Figure 4.1.2.

B

Calculate the difference of numbers assigned to the 2 users 3 5 8 14 2 3 6
If difference is 2,3,6

N
If difference is -2,-3,-6

Assign 0.55(X) to user1, Assign 0.45(X) to user2

Y N

Assign 0.45(X) to user1, Assign 0.55(X) to user2

If difference is 5,9

Y N

Y
Assign 0.65(X) to user1, Assign 0.35(X) to user2

N
If difference is 11

If difference is -5,-9

Assign 0.35(X) to user1, Assign 0.65(X) to user2

N Y

Y
Assign 0.75(X) to user1, Assign 0.25(X) to user2

Assign 0.25(X) to user1, Assign 0.75(X) to user2

RETURN
Figure 4.1.2: Flowchart when 2 users fall in 3,5,8,14.

4.1.3 WHEN 3 USERS FALL IN RANGE NUMBERED 3,5,8,14:
In this step, first find the difference of numbers assigned to each user .If difference is 0 for all users, it means all users fall in the same range. So, assign X/3 to each user. If this condition is not satisfied then the following conditions are checked-
Case 11: If any 2 user fall under the range numbered 14 then ,assign X/2 to each of the 2 user and neglect the 3rd user.
Case 12: If 1 user fall under the range numbered 14 then, assign X/2 to that user in 14 and X/4 to the other 2 users.
Case 13: If 2 users fall under the range numbered 8 then, assign X/2 to each of the 2 user and neglect the lower range user.
Case 14: If 2 users fall under the range numbered 5 then, check the difference between the numbers assigned to those 2 users. If the difference is 3, assign X/2 to each of the 2 users. If the difference is not 3 then, assign X/4 to each of the 2 users.
Case 15: If 2 users fall under the range numbered 3 then, assign X/4 to each of the 2 users.
Case 16: If 1 user fall under the range numbered 8 then, assign X/2 to that user and X/4 to each of the other 2 users.
If none of the cases from 11-16 is satisfied then, it means all 3 users fall under the range numbered 3 or 5.So assign X/3 to each user.
In this way subcarriers are utilized efficiently and the data is transmitted at high speed.
This is as shown in Figure 4.1.3.

C

Find the difference of no assigned to each user & using the numbers 3,5,8,14(we have as follows)

If all users fall in same range assign X/3 to each
Difference is 0 for all users

Y
If any 2 user fall under 14 No
X/2 to each user neglect third user

Y NoIf 1 user fall under 14

Assign X/2 to that user in 14 and (X/4) to other two users

Y No
Assign X/2, X/2 to two users in 8 , Neglecting the lower range user
If 2 user fall in 8

Y No
Assign X/2, X/2 to the two users
Diff b/w the user in 5 & other is 2
If 2 user fall in 5

Y Y Assign X/4, X/4 No No
D

D

If 2 users fall are in 3

YAssign X/4, X/4

No YAssign X/4, X/4 to other users

Assign X/2 to that user

If 1 user in 8

This shows all 3 users are in 3 or 5 so assign X/3 to each user No
RETURN
URN

Figure 4.1.3: Flow chart when all 3 user fall in 3,5,8,14. 4.2 Algorithm * STEP 1- Find the buffer size of each user. Maximum buffer size for each 3 users =256. * STEP 2- Depending upon the size of data occupied in their respective buffers , assign numbers for further computation. Such that the difference of number assigned to each user should not be same. * STEP 3- Depending upon the range of data of each user, assign the predefined number of sub-carriers. Ex: 4,8,12,15,18,21. * STEP 4- After initial assignment of sub-carriers, find the remaining number of sub- carriers left for dynamically assigning in later part.

* STEP 5- By using the numbers assigned to users, find in which category they come in our algorithm: X= Remaining number of sub-carriers. a) If 3 users fall in 1,2 . Assign X/3 to all three users. b) If 2 users fall in 1,2 . Assign X to the 3rd user. c) If 1 user fall in 1,2 . Assign X between other two users based on flow chart from “B which are explained in steps 5.1 to 5.5. * STEP 6- If all users do not come in 1,2, assign X based on flow chart from “C” further explained in steps 6.1 to 6.10 * STEP 7- After final assignment determine sum of sub-carriers=64, if not assign the remained sub-carrier to last user. * STEP 8- Stop
The algorithm from steps 5.1 to 5.5 are given below. * STEP 5.1- Find the difference of numbers assigned to the 2 users. The differences can be + ( 2 ,3,6,5,9,11.) * STEP 5.2- If the difference is 2, 3,6 . Assign 0.55(X) to user1. Assign 0.45(X) to user2.
If difference is -2,-3,-6. Assign 0.45(X) to user1, Assign 0.55(X) to user2. * STEP 5.3- Similarly If the difference is 5, 9. Assign 0.65(X) to user1, Assign 0.35(X) to user2.
Or if the difference is -5,- 9. Assign 0.35(X) to user1, Assign 0.65(X) to user2. * STEP 5.4- If difference is 11, Assign 0.75(X) to user1, Assign 0.25(X) to user2.
Or if difference is -11, Assign 0.25(X) to user1, Assign 0.75(X) to user2 * STEP 5.5- Return to main algorithm i.e to STEP 7 The algorithm from steps 6.1 to 6.10 are given below. * STEP 6.1- If all users do not come in 1,2. Find the difference of no assigned to each user & using the numbers 3,5,8,14. * STEP 6.2- If difference of all user is 0, i.e all the users fall in same range, then assign X/3 to each * STEP 6.3- If any 2 user fall under 14. Assign X/2 to each user neglect third user, because 3rd user data is less than comparing to these twos. * STEP 6.4- Now if 1 user fall under 14 , Assign X/2 to this user and (X/4) to other two users * STEP 6.5- Now If 2 user fall in 8, Assign X/2, X/2 to two users in 8 , Neglecting the lower range user * STEP 6.6- If not above case then now check whether If 2 user fall in 5, if so then now calculate difference between the user in 5 and user in other.
If the difference is 2, then assign X/2, X/2 to each user
If the difference is other than 2, then assign X/4, X/4 to each * STEP 6.7- Now check if two user come under 3, then assign them X/4,X/4 to each. * STEP 6.8- Next case if 1 user in 8, then Assign X/2 to that user and X/4, X/4 to other users * STEP 6.9- Finally the last case if above all cases not satisfied, This shows all 3 users are in 3 or 5 so assign X/3 to each user * STEP 6.10 - Return to main flow algorithm i.e to STEP 7

CHAPTER 5
BLOCK DIAGRAMS

CHAPTER 5
BLOCK DIAGRAMS
5.1 CONTROL FRAME TRANSCEIVER :
In the first time slot the control information i.e, the number of sub-carriers allocated to each user determined as per the DSA algorithm is sent. The Block diagram for this is as shown.

Figure 5.1 : Block diagram for transmitting and receiving control frame. Here S/P is Serial to Parallel Converter ,IFFT stands for Inverse Fast Fourier Transform ,P/S is parallel to serial converter , FFT Stands for Fast Fourier Transform. We use Binary Phase Shift Keying (BPSK) to modulate each control bit. Here 0 is mapped to -1 and 1 is mapped to 1. Hence it is also called as symbol mapping. The serial to parallel converter (S/P) converts the input data from a serial stream to parallel sets. The output of S/P converter is fed to an IFFT block. Inverse Fast Fourier Transform (IFFT) converts the frequency domain data set into samples of corresponding time domain representation. Specially, IFFT is useful for OFDMA because it generates samples of waveform with orthogonal frequency components. At receiver , DFT and symbol demapping is performed and the control information is decoded and stored.
5.2 DATA TRANSMISSION
Data and control information are time multiplexed and transmitted over the Gaussian channel. The block diagram for data transmission is as shown in figure 5.2.

Figure 5.2 : Block diagram for data transmission
The sub-carrier allocation block stands for implementing the DSA algorithm. Depending on the number of sub-carriers allocated finally , the data for the remaining number of sub-carriers should be zero padded for each user . Finally the output of the 3 IFFT Blocks are added and sent over the AWGN channel.
The white noise is characterized by a constant power spectral density i.e., power spectral density(PSD) is independent of the operating frequency. We express the PSD of white noise, with sampled function w(t) as

where the dimensions of N0 are in watts per Hertz. The autocorrelation function is given as

Figure 5.3 Characteristics of white noise (a) PSD , (b) autocorrelation.
The random variable Y is said to be Gaussian distribution if the Probability Density Function (PDF) is of the form

Where is the mean and is the variance of Y. We assume zero mean and variance of 1.Hence Y is said to be normalised.
The IFFT equation is given by where x(n) is the data bits mapped using BPSK.
The signal space diagram of BPSK can be shown as below. Here Eb is the average transmitted energy per bit.

Decision boundary

Region Z 2 Region Z1

- Eb + Eb Message point 2 Message point 1

Figure 5.4 : signal space diagram for coherent BPSK system.

The decision rule is that 1 was transmitted if the received point falls in the region Z1 and 0 was transmitted if the received point falls in the region Z2.
5.3 DATA RECEPTION:

Figure 5.5: Block diagram for Data reception The data transmitted is subjected to white Gaussian noise. The serially received data is converted to parallel before giving it to the FFT block. Fast Fourier Transform (FFT) is a method to convert time domain sequence into frequency domain sequence. This is given by the equation below.

From the knowledge of the sub-carrier allocation and the decoded control frame, the receiver for each user de-maps the corresponding data and utilizes it.
Note : Data is fed parallely to IFFT and DFT blocks for speed and accuracy.

CHAPTER 6 IMPLEMENTATION AND RESULTS

CHAPTER 6 IMPLEMENTATION AND RESULTS
6.1 MATLAB
MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include:
• Math and computation
• Algorithm development
• Modeling, simulation, and prototyping
• Data analysis, exploration, and visualization
• Scientific and engineering graphics
• Application development, including graphical user interface building.

MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially those with matrix and vector formulations, in a fraction of the time it would take to write a program in a scalar non-interactive language such as C or Fortran.
THE MATLAB SYSTEM

The MATLAB system consists of five main parts:

Development Environment: This is the set of tools and facilities that help you use MATLAB functions and files. Many of these tools are graphical user interfaces. It includes the MATLAB desktop and Command Window, a command history, and browsers for viewing help, the workspace, files, and the search path.
The MATLAB Mathematical Function Library: This is a vast collection of computational algorithms ranging from elementary functions like sum, sine, cosine, and complex arithmetic, to more sophisticated functions like matrix inverse, matrix eigenvalues, Bessel functions, and fast Fourier transforms.

The MATLAB language: This is a high-level matrix/array language with control flow statements, functions, data structures, input/output, and object-oriented programming features. It allows both "programming in the small" to rapidly create quick and dirty throw-away programs, and "programming in the large" to create complete large and complex application programs.
Handle Graphics ®: This is the MATLAB graphics system. It includes high-level commands for two-dimensional and three-dimensional data visualization, image processing, animation, and presentation graphics. It also includes low-level commands that allow you to fully customize the appearance of graphics as well as to build complete graphical user interfaces on your
MATLAB applications:
The MATLAB Application Program Interface (API). This is a library that allows you to write C and Fortran programs that interact with MATLAB. It include facilities for calling routines from MATLAB (dynamic linking), calling MATLAB as a computational engine, and for reading and writing MAT-files.
6.1.1 INSTRUCTIONS USED IN CODE 1) RANDI : Pseudorandom integers from a uniform discrete distribution. R = RANDI([IMIN,IMAX],...) : returns an array containing integer values drawn from the discrete uniform distribution on IMIN:IMAX.

2) RANDN : Normally distributed pseudorandom numbers.
R = RANDN(N) returns an N-by-N matrix containing pseudorandom values drawn from the standard normal distribution. RANDN(M,N) or RANDN([M,N]) returns an M-by-N matrix. RANDN(M,N,P,...) or RANDN([M,N,P,...]) returns an M-by-N-by-P-by-... array. RANDN returns a scalar. RANDN(SIZE(A)) returns an array the same size as A.
Note: The size inputs M, N, P, ... should be nonnegative integers. Negative integers are treated as 0.

3) LENGTH : Length of vector.
LENGTH(X) returns the length of vector X. It is equivalent to MAX(SIZE(X)) for non-empty arrays and 0 for empty ones.

4) FLOOR : Round towards minus infinity. FLOOR(X) rounds the elements of X to the nearest integers towards minus infinity.

5) CEIL : Round towards plus infinity.
CEIL(X) rounds the elements of X to the nearest integers towards infinity.

6) DE2BI: Convert decimal numbers to binary numbers.
B = DE2BI(D) converts a nonnegative integer decimal vector D to a binary matrix B. Each row of the binary matrix B corresponds to one element of D. The default orientation of the binary output is Right-MSB; the first element in B represents the lowest bit. 7) AWGN: Add white Gaussian noise to a signal. Y = AWGN(X ,SNR) adds white Gaussian noise to X. The SNR is in dB. The power of X is assumed to be 0 dBW. If X is complex, then AWGN adds complex noise.

8) WGN :Generate white Gaussian noise. Y = WGN(M,N,P) generates an M-by-N matrix of white Gaussian noise.
P specifies the power of the output noise in dBW.

9) RESHAPE(X,...,[],...) : (acts as a serial to parallel converter block) calculates the length of the dimension represented by [], such that the product of the dimensions equals PROD(SIZE(X)). PROD(SIZE(X)) must be evenly divisible by the product of the known dimensions. You can use only one occurrence of []. Note : RESHAPE(X,...,,...[]) : performs parallel to serial conversion. 10) IFFT : Inverse discrete Fourier transform.
IFFT(X) is the inverse discrete Fourier transform of X.

11) FFT : Discrete Fourier transform. FFT(X) is the discrete Fourier transform (DFT) of vector X. For matrices, the FFT operation is applied to each column. For N-D arrays, the FFT operation operates on the first non-singleton dimension.

For length N input vector x, the DFT is a length N vector X, with elements N X(k) = sum x(n)*exp(-j*2*pi*(k-1)*(n-1)/N), 1 <= k <= N. n=1 The inverse DFT (computed by IFFT) is given by N x(n) = (1/N) sum X(k)*exp( j*2*pi*(k-1)*(n-1)/N), 1 <= n <= N. k=1

12) PADARRAY : Pad array.
B = PADARRAY(A,PADSIZE,PADVAL,DIRECTION) pads A in the direction specified by the string DIRECTION. DIRECTION can be one of the following strings. String values for DIRECTION
'pre' Pads before the first array element along each dimension .
'post' Pads after the last array element along each dimension.

13) PLOT : Linear plot. PLOT(X,Y) plots vector Y versus vector X. If X or Y is a matrix, then the vector is plotted versus the rows or columns of the matrix, whichever line up. If X is a scalar and Y is a vector, disconnected line objects are created and plotted as discrete points vertically at X. PLOT(Y) plots the columns of Y versus their index. If Y is complex, PLOT(Y) is equivalent to PLOT(real(Y),imag(Y)). In all other uses of PLOT, the imaginary part is ignored. Various line types, plot symbols and colors may be obtained with PLOT(X,Y,S) where S is a character string made from one element from any or all the following 3 columns: b blue . point - solid g green o circle : dotted r red x x-mark -. dashdot c cyan + plus -- dashed m magenta * star (none) no line y yellow s square k black d diamond w white v triangle (down) ^ triangle (up) < triangle (left) > triangle (right) p pentagram h hexagram 14) XLABEL : X-axis label, YLABEL: Y-axis label. XLABEL('text') adds text beside the X-axis on the current axis. YLABEL('text') adds text beside the Y-axis on the current axis. 15) LEGEND(string1,string2,string3, ...) puts a legend on the current plot using the specified strings as labels. LEGEND works on line graphs, bar graphs, pie graphs, ribbon plots, etc. You can label any solid-colored patch or surface object. The fontsize and fontname for the legend strings matches the axes fontsize and fontname.

6.2 CONTROL FRAME TRANSMISSION AND RECEPTION
This block generates a control frame based on the information from the sub-carrier allocation block, which contains the buffer length and number of subcarriers allocated to each user. This information is needed by the receiver to know which sub-carriers contains which users data so that it can decode appropriately.
For example: Figure 6.2 – Control frame.
L=buffer length
U=no. of sub-carriers allocated
Sample result :
After matlab simulations of the flow chart given in chapter 4, the following results were obtained for a particular case. Here initially assigned sub-carriers for user1,2 and 3 are 12, 21 and 15. According to the algorithm 16/4=4 is added to the initially assigned sub-carriers for user1 and 3. To user1 which has relatively more data 16/2=8 sub-carriers are added.
The length of data buffers for user1 is 59
The length of data buffers for user2 is 216
The length of data buffers for user3 is 85
The initial no of sub-carriers assigned for user1 is 12
The initial no of sub-carriers assigned for user2 is 21
The initial no of sub-carriers assigned for user3 is 15
The remaining no of subcarriers to be allocated 16
The final assignment for user1 is 16
The final assignment for user2 is 29
The final assignment for user3 is 19
The control frame generation and reception outputs are as follows:
The control frame is 59 16 216 29 85 19
The binary form of control frame is 0 0 1 1 1 0 1 1 0 0 0 1 0 0 0 0 1 1 0 1 1 0 0 0 0 0 0 1 1 1 0 1 0 1 0 1 0 1 0 1 0 0 0 1 0 0 1 1

The total no of subcarriers assigned for data reception incase of user 1 is 16
The total no of subcarriers assigned for data reception incase of user 2 is 29
The total no of subcarriers assigned for data reception incase of user 3 is 19
6.3 DATA GENERATION, TRANSMISSION AND RECEPTION
The bufsiz is a variable which has the size of each register. Here it 256. The data generated is so divided that at a particular time only the corresponding subcarriers for each user transmits and receives data. The variables rp1,rp2 and rp3 are used to determine the number of times the loop for transmission and reception is run since BPSK maps only 1 bit into corresponding symbol. Data is generated using randn function (inbuilt ) in matlab. Zero padding is done wherever necessary using the ‘padarray’ instruction.
To determine the performance of the system, the bit error rate is calculated simultaneously for varying Eb/N0 values. The calculation is discussed in chapter 6.4.
The additive white Gaussian complex noise is added to the channel using function wgn (inbuilt). The practical BER values is calculated for the user which has the most data to be transmitted. 6.4 BER CALCULATION AND RESULTS
In digital transmission, the number of bit errors is the number of received bits of a data stream over a communication channel that have been altered due to noise, interference, distortion or bit synchronization errors. The bit error rate (BER) is the number of bit errors divided by the total number of transferred bits during a studied time interval. BER is a unitless performance measure, often expressed as a percentage.

The probability of error for a coherent BPSK is given by

As we increase the transmitted signal energy per bit Eb, for a specified noise spectral density No, the message points corresponding to symbols 1 and 0 move farther apart , and the average probability of error is correspondingly reduced in accordance to the above equation which is intuitively satisfying
The derivation of the probability of error formula mentioned above for BPSK is further discussed in Appendix- A.
The BER plot obtained for an example is as shown

Figure 6.4 : BER plot after matlab simulation.

CHAPTER 7
ADVANTAGES AND CHALLENGES

CHAPTER 7
ADVANTAGES AND CHALLENGES
7.1 ADVANTAGES: * For large bandwidth solutions, OFDMA allows simpler receivers such as in optical communication, which could lead to lower cost devices. * Good performance under delay spread / frequency selective fading conditions. * Efficient digital signal processor based generation/ detection techniques. * Can easily adapt to severe channel conditions without complex time-domain equalization. * Robust against narrow-band co-channel interference. * Robust against Inter-symbol interference(ISI) * High spectral efficiency as compared to conventional modulation schemes, spread spectrum, etc. * Efficient implementation using Fast Fourier Transform (FFT). * Low sensitivity to time synchronization errors. * Tuned sub-channel receiver filters are not required (unlike conventional FDM). * Facilitates single frequency networks (SFNs). * Dynamic sub-carrier allocation (DSA) improves signal quality and system capacity of OFDMA system. * DSA has low signaling overhead and low complexity of multiuser receiver. * DSA can achieve higher throughput compared to static assignment schemes. * Good performance under delay spread/ frequency selective fading conditions due to the orthogonality of the sub carriers.

7.2 CHALLENGES
Extending our algorithm to N users is a challenge. The limitations on channel bandwidth and the distance between the users is a concern. The maximum distance over which the signal can be transmitted without considerable attenuation can be area of concern. There should be proper synchronization (timing and channel) between the transmitter and receiver. The control frame should not be corrupted to an extent where its contents cannot be decoded. * It has a relatively high sensitivity to frequency offsets as this degrades the orthogonality between the carriers * It is sensitive to phase noise on the oscillators as this degrades the orthogonaility between the carriers. * Requires complex electronics to run the software - DSP including FFT algorithms needed for the forward error correction. This is always active regardless of data rate, although when no data is being transmitted the system can hibernate. However power consumption can be an issue. * If only a few carriers are assigned to each user the resistance to selective fading will be degraded or lost. * The adaptive sub-carrier assignment is more complex than CDMA.

CHAPTER 8 APPLICATIONS

CHAPTER 8 APPLICATIONS
8.1 APPLICATIONS: 1. Favourable in broadcasting networks like Ethernet LAN , Token bus, etc., with 3 users operating at the same time . 2. OFDMA is used in Asymmetric digital subscriber line (ADSL) and Very-high-bit-rate digital subscriber line (VDSL or VHDSL) broadband access via Plain old telephone service (POTS) copper wiring. 3. Used in PLC ( Power line communication) as well as in BPL (Broadband over Power line): OFDMA is used by many powerline devices to extend Ethernet connections to other rooms in a home through its power wiring. 4. Allows single frequency networks to be used, particularly important for broadcasters where this facility gives a significant improvement in spectral usage. 5. Multimedia over Coax Alliance ( MoCA) home networking: It is a trade group promoting a standard that uses coaxial cables to connect consumer electronics and home networking devices in homes. It allows both data communication and the transfer of audio and video streams. 6. OFDMA is being used in a number of wireless and wire-line applications including LTE (Long term evolution), Wireless LAN, Digital Audio and Video Broadcast, Fixed WiMAX, ADSL and ADSL2+.

CHAPTER 9 CONCLUSION

CHAPTER 9
CONCLUSION
9.1 CONCLUSION
In this project report, an algorithm to allocate subcarriers dynamically for a random input data rate in an OFDMA-based wired network is given. The complexity of the resource allocation problem increases exponentially with the number of subcarriers, the possible number of bits per subcarrier and the number of users. The flexibility of adaptive resource allocation (DSA), combined with the ability to deal with ISI, makes OFDMA very suitable to support high-data-rate services. With the spectrum becoming more and more fragmented especially for systems such as ADSL, DVB-RCT, LTE etc our idea to improve data rate provides flexibility of deployment across a variety of frequency bands with little need for modifications. Data transmissions with a higher rate can be achieved with the use of digital signal processing techniques and simpler receiver designs. The technique can be extended to many other applications. Hence this technique can be of paramount importance in the near future.

APPENDIX - A

ERROR PROBABILITY FOR COHERENT BPSK
In coherent BPSK system, the pair of signals, s1(t) and s2(t) , used to represent binary symbols 1 and 0, respectively are defined by

Where , and Eb is the transmitted signal energy per bit. There is only 1 basis function of unit energy given by

We write the transmitted signal , s1(t) and s2(t) in terms of we get

The signal space diagram is as shown in Figure 5.4. The coordinates of the message points equals

To calculate probability of error, from figure 5.4 we have, the decision region associated with the symbol 1 or signal s1(t) is described by

where x1 is the observation scalar :

where x(t) is the received signal. We deduce that the likelihood function, when symbol 0 or s2(t) is transmitted is defined by

The conditional probability of the receiver deciding in favour of symbol1 , given that 0 was transmitted , is therefore

Putting,

And changing the variable of integration from x1 to z , we may re-write above equation in the form

Where erfc(*) is complementary error function. Similarly the conditional probability of the receiver deciding in favour of symbol 0, given that 1 was transmitted , also has the same values as the above equation. Thus , averaging the conditional probabilities, we find that the average probability of symbol error equals. [2]

REFERENCES

The references [1] amd [2] used in the report are

1. OFDMA Fundamentals and Applications by Tao Jiang, Lingyang Song and Yan Zhang. 2. The derivation for probability of error for BPSK as mentioned in Appendix –A is taken from Digital Communications by Simon Haykin.
The other references used are * 3GPP Long-Term Evolution Uplink Friday December 4, 2009 EE359 Project by Nima Soltani Comparison of Single-Carrier FDMA vs. OFDMA * Signal Processing for Communications EPFL Winter Semester 2006/2007 by Prof. Suhas Diggavi * Uplink Resource Scheduling in Dynamic OFDMA Systems by Farshad Naghibi * Wimax general info about 802.16 by Rohde & Schwarz * Multi-Carrier Digital Communications: Theory and Applications of OFDM Ahmad R. S. Bahai and Burton R. Saltzberg * Wireless networks and communications by Dr Van Zhang, Series Editor Simula Research Laboratory, Norway * OFDM-based Communication Systems: Lecture Notes by Dr. Doron Ezri, Dr. Michael Erlihson

Similar Documents

Free Essay

Effective Reconfigurable Antenna Designs to Enhance Performance and Enable Wireless Powering

...Digital Commons FIU Electronic Theses and Dissertations University Graduate School 11-12-2009 Effective Reconfigurable Antenna Designs to Enhance Performance and Enable Wireless Powering Shishir S. Punjala Florida International University, spunj001@fiu.edu Follow this and additional works at: http://digitalcommons.fiu.edu/etd Recommended Citation Punjala, Shishir S., "Effective Reconfigurable Antenna Designs to Enhance Performance and Enable Wireless Powering" (2009). FIU Electronic Theses and Dissertations. Paper 108. http://digitalcommons.fiu.edu/etd/108 This work is brought to you for free and open access by the University Graduate School at FIU Digital Commons. It has been accepted for inclusion in FIU Electronic Theses and Dissertations by an authorized administrator of FIU Digital Commons. For more information, please contact dcc@fiu.edu. FLORIDA INTERNATIONAL UNIVERSITY Miami, Florida EFFECTIVE RECONFIGURABLE ANTENNA DESIGNS TO ENHANCE PERFORMANCE AND ENABLE WIRELESS POWERING A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY in ELECTRICAL ENGINEERING by Shishir Shanker Punjala 2009 To: Dean Amir Mirmiran College of Engineering and Computing This dissertation, written by Shishir Shanker Punjala, and entitled Effective Reconfigurable Antenna Designs to Enhance Performance and Enable Wireless Powering, having been approved in respect to style and intellectual content, is...

Words: 890 - Pages: 4

Free Essay

Statement of Purpose

...workshop in NIT Trichy. * Undergone detail training in understanding EMBEDDED SYSTEM trained at ACCEL IT academy, Adyar ,Chennai. * Experienced the different phases of a project execution under antenna approach. Professional & Academic Qualifications B.E. Electronics and communication Engineering., Periyar Maniammai University, THANJAVUR . CGPA : 8.54/10. Current GPA : 8.71. year of passing : 2013 Class : First class. * Higher Secondary Ramakrishna vidhayala matric Higher Secondary School, VILLUPURAM.(Tamil Nadu State Board) Percentage : 72.25% Year of Passing : 2009 Class : First Class. * SSLC Ramakrishna vidhayala matric Higher Secondary School, VILLUPURAM. (MATRICULATION) Percentage : 71.72% Year of Passing : 2007 Class : First Class Project profile Mode of project : Self project. Title : Multiband Antennas for SDR Applications. Simulators : HFSS (high frequency structure simulator) ANSIS Description : SDR- software defined radio, the most emerging product in RF signaling field, in this as platform, I have work in the area of antenna design with the developed...

Words: 448 - Pages: 2

Free Essay

Total Quality Management

...UNIVERSITY OF SAINT LOUIS Mabini Street, Tuguegarao City Experiment No. 3 THE YAGI-UDA ANTENNA Fyne D. Talay BSECE-5 Date Submitted: September 24, 2012 Date Due: September 24, 2012 Gerino Mappatao, PECE, MSECE, PhD. ECE (Professor) The Yagi-Uda Antenna Objective: To demonstrate the effect of parasitic elements on the gain and radiation pattern of cylindrical half-wave dipole. Introduction: A Yagi-Uda antenna is familiar as the commonest kind of terrestrial TV antenna to be found on the rooftops of houses. It is usually used at frequencies between about 30MHz and 3GHz, or a wavelength range of 10 meters to 10 cm. (There are some obsessional amateur radio enthusiasts who construct Yagi-Uda antennas for the 80 meter wavelength band. This is rather impractical as spacing them from the ground by more than half a wavelength is difficult.) The rod lengths in a Yagi-Uda are about a half wavelength each, and the spacings of the elements are about 1/3 of a wavelength. This puts the overall sizes of Yagi-Udas in the ranges freq transverse length length length dimension 3 elements 5 elements 15 elements (lambda/2) 30MHz 5 m 6 m 13 m 47 m 100MHz 1.5 m 1.8 m 3.9 m 14 m 300MHz ...

Words: 1294 - Pages: 6

Premium Essay

Assignment

...1.) A Netgear wireless access point is using a Marconi antenna, Figure 1. Let’s assume the antenna is working in ISM Band @ frequency, f=2.4 [GHz], and is having the impedance, Za=50 [Ω]. They ask to calculate: 1a.) lambda_0[m] = c_0/f[Hz] lambda_0[m] = (3*10^8)/(2.4[GHz]) lambda_0[m] = 0.125[m] 1b.) la[m] = k_1 * (lambda_0[m])/4 la[m] = 0.95 * (0.125[m])/4 la[m] = 0.0296875 1c.)Va[Vrms] = ((50)^(1/2))*10^((15-30)/20) Va[Vrms]= 1.25743343 =====================================================================2.) A LAN server is located on the first floor level of a bank building and is connected via RG-58 cables, to various client computers located on all of the floors of the skyscraper. Let’s assume that you are a field engineer working for a LAN service company and you have the task to find out a faulty cable serving the client. To locate the failure in that cable you are using a Fluke DSP-2000 Cable Analyzer, connected at the floor level, set on TDR test. The screen of the instrument is illustrated in Figure 2. Based on the screen reading, they ask to: 2a). Locate the distance to the failure point on that cable, d [m], with respect to the LAN server’s position, and back-and-fourth propagation time, t [nsec], of the test pulses generated by the instrument, if the velocity factor of the UTP cable, k=0.66 (Given: Speed of light in free space, c_0=3*108 [m/sec]). Reading of the DSP-2000 screen is providing the distance to the failure point, d[m]: d[m]=______30...

Words: 550 - Pages: 3

Free Essay

The Radar

...This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar This is a radar...

Words: 456 - Pages: 2

Premium Essay

Nt1310 Unit 1 Lab Report

...A GPR is made up of three core components, control unit, antenna, and the power supply. The control unit is what contains the electronics which trigger the energy pulses to the antenna that sends it into the ground. The GSSI SIR 20, which was used in this lab, has a laptop with software loaded on it already which processes and interprets the data. The antenna is what receives the electrical pulse from the control unit and transmits it into the ground. The frequency is a huge factor in the depth penetration. The frequency that used was 200 MHz which is right between the high and low pass filter allowing a the signal to go deeper. The time interval for collecting this data was 400 ns with 20 traces per meter. In this amount of time and traces per meter, 12 transecs were collected. The AGC was used to amplify the GPR lines getting better data. The data from the GPR was then brought back to the lab and the lines and sections were examined to figure out the GPR facies. The equipment used for coring was an auger core....

Words: 1984 - Pages: 8

Free Essay

Equivalent Impedance of an Antenna

...of an Antenna Introduction: Antenna impedance is a measure of the resistance to an electrical signal in an antenna. Many factors have an impact on an antenna’s ability to transmit a signal, including the environment that the antenna is in and the design and composition of the antenna. Understanding antenna impedance is important when designing components that connect an antenna to a receiver or transmitter. The ratio to voltage current, which is equal to antenna impedance, is expressed in ohms. The antenna impedance represents the power that is absorbed by the antenna as well as the power that is dispersed by it as it comes into contact with electromagnetic waves. Voltage and Current Relationship: Antenna impedance relates the voltage to the current at the input to the antenna. Let us assume that the antenna has an impedance of 50 ohms. And if a sinusoidal voltage is applied at the antenna terminals with amplitude of 1 volt, then the current will have amplitude of I=VR=150=0.02 A. Since the impedance is a real number, the voltage is in phase with the current. Alternatively suppose the impedance is given by complex number say Z=50+j50 ohms. If Z=50+j50, then the impedance has the magnitude equal to: 502+502=70.71 The phase will be equal to: tan-1ImZReZ=45° This means the phase of the current will lag the voltage by 45°. That is the current waveform is delayed relative to the voltage waveform. To spell it out, if the voltage with frequency f at the antenna terminals...

Words: 1383 - Pages: 6

Free Essay

Antenna

...Name Instructor Course Date Antennas This report provides details of different types of antennas used in ships as well as maintenance procedures and precaution measures when dealing with antennas. An Antenna is a component capable of radiating and capturing radio waves. Thus, antennas are useful elements of a ship and together with radio equipment are a means of communication between the vessel and the control tower. The first type of antenna used on ships is the quarter wave vertical antenna widely used at all frequencies from MF to VHF. The quarter wave vertical antenna is simple to construct and erect in locations with limited space like a ship. For VHF and UHF, it is important to elevate the antenna above close obstacles. One advantage is that, the single element vertical antennas have a multi-directional radiation design meaning they do not require re-alignment in a mobile application and are thus suitable for ships. A quarter wave aerial with a quarter-wave radials exhibits 50-ohms impedance thus uses a 50-ohm coaxial cable (Stutzman and Thiele). In summary, the quarter wave antenna is popular for its convenience and simplicity. The second type of antenna is the dipole antenna that is one of the commonly used RF antenna types. Primarily, it consists of two poles into which radio frequency current flows and together with a voltage causes radiation of a radio signal. There are several types of dipole antennas that include, half wave dipole, multi-half wave...

Words: 1149 - Pages: 5

Free Essay

Stuff

...CH. 12 1. Transmission – Conductive connect6ions between system elements that carry signal power. 2. CAT6/5e – Category 5e computer networking cable capable of handling a 1000MHz bandwidth up to a length of 100m. 3. RJ-45 – the four pair termination commonly used for terminating CAT6/5e cable. 4. Attenuation – amount of loss in the signal strength as it propagates down a wire. 5. Near-end Crosswalk – measure of the level of crosstalk or signal coupling within the cable, with a high NEXT (db) value being desirable. 6. Crosstalk – Unwanted coupling caused by overlapping electric and magnetic fields. 7. ACR – combined measurement of attenuation and crosstalk; a large ACR indicates greater bandwidth. 8. Delay Skew – measure of the difference in time for the fastest ti the slowest wire pair in a UTP cable. 9. Power-Sum next testing – measures the total crosstalk of all the cable pairs to ensure that the cable can carry data traffic on all four pairs at the same time with minimal interference. 10. Return loss – measure of the ratio of power transmitted into a cable to the amount of power returned or reflected. 11. Unbalanced line – electrical signal in a coaxial line is carried by the center conductor with respect to the grounded outer conductor. 12. Balanced line – same current flows in each wire 180 degrees out of phase. 13. Common mode rejection – when signals are 180 degrees out of phase cancel each other out. 14. Baluns – circuits that convert between balanced and...

Words: 1650 - Pages: 7

Free Essay

Airframes and Flat Panel Antennas Match

... for which flat panel antennas (FPAs) have emerged as the most popular innovation in recent years. The limited speed and large size of mechanically-steered and the 1st generation of electronically-steered flat panel antennas drew many to wonder if the Holy Grail of the satellite world – a cost-competitive, electronically-steered flat panel antennas with an ultra-low profile- would ever be within reach. But the journey to this goal has been a long, difficult one because of the many desired features of such a product as depicted in the figure below. NSR has often noted the tremendous increase in satellite mobility bandwidth demand has driven many operators to add new HTS systems and constellations to meet this demand. But at the same time, the industry metric has put more emphasis on cost-efficiencies, which is where NSR expects flat panel antennas (FPAs) to play a key role in this transformation. As service providers look to provide more bandwidth at lower cost to end-users, falling capacity prices, next generation modems with beam switching capabilities, and better software are icing on the cake of the HTS capacity onslaught, in which FPAs are a perfect fit. In NSR’s recently released Flat Panel Satellite Analysis report, both the mobility and fixed satellite side of the business were analyzed, and commercial aeronautical connectivity was observed on top as the biggest driver and revenue generator for FPAs. Indeed, a low-profile antenna is a necessity for lower...

Words: 495 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1

...If A and B are two bits arriving at the relay node, with the use of network coding the relay node can add the bits together e.g. mixing A and B here and transmitting A + B to achieve the multicast capacity of 2 bits per second because here transmission of 2 bits (A+B) is taking place Network coding offers definitely an improvement over traditional routing in which the link transmits either A or B instead both bits together. The major difference between communication performed with and without network coding in a wireless system is shown in Figure 1.7. More specifically, Figures 7(a) and 7(b) depict the transmission of packet b1 from A to B and packet b2 from B to A using relay C- when the range of and A and B is r. Figure 7(c) demonstrates that the relay C needs only one extra step to broadcast the linear combination of packets b1 and b2 as opposed to a conventional system which would require two extra steps, i.e, one step to transmit b1 and one step to send b2. Figure 1.7 Wireless communication without network coding (b) and with network coding (c) To conclude, we see that network coding in the previous example requires 3 time slots. Physical network coding allows A and B to transmit simultaneously reducing the total number of time slots to 2. This is a great idea to increase data transfer rates by minimizing the time slots and this way both the performance and the efficiency of the network is improved. All these reasons prompted me in selecting this particular project. ...

Words: 3008 - Pages: 13

Free Essay

Satllite

...------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty of Engineering ------------------------------------------------- ------------------------------------------------- Subject: Satellite Communication Systems ------------------------------------------------- ------------------------------------------------- Assignment Number: Project One/Part A Date Submitted: 26/10/2012 ------------------------------------------------- ------------------------------------------------- Assignment Title: Project One ------------------------------------------------- ------------------------------------------------- Student Name(s) and Number(s) Tutorial Group: ------------------------------------------------- Chao Wang 11275955 ------------------------------------------------- Declaration of Originality: ------------------------------------------------- The work contained in this assignment, other than that specifically attributed to another source, is that of the author(s). It is recognised that, should this declaration be found to be false, disciplinary action could be taken and the assignments of all students involved will be given zero marks. In the statement below, I have indicated the extent to which I have collaborated with other students, whom I have named. ------------------------------------------------- Signature ------------------------------------------------- ...

Words: 740 - Pages: 3

Free Essay

How to Build an Windsurfer

...the reflector surface. When using also a copy on thicker cardboard, glue the tin foil on the copy of the reflector and than glue them together and glue also the copies of the holder together. Use a good kind of glue like Bisonkit transparant. 5. Cut the crosses in the holder with a hobby- or break-knife. 6. Assemble by placing the six tabs of the holder in the six slots of the reflector. Fold the tabs after placing and fix them with glue. 7. Place the assembly on the WiFi antenna and aim the reflector in the direction of the ‘target’ (to WiFi dongle, Router or AP) to get maximum performance. Tell a friend about this idea. Note: If printed at the download size you will see about 6-9 dBi of gain. If you double the size of the image before you print it you will see about 9-12 dBi of gain. If you place two reflectors on an AP or router with two antennas you will see an additional increase in performance. * Types without external antennas can’t be improved this way, but a USB WiFi dongle with external antenna can! Een mathematical example: http://www.ies.co.jp/math/java/conics/focus/focus.html See also the video on YouTube: http://www.youtube.com/watch?v=sUTT8wdN_VA Six inch reflector pattern at 2.4 GHz...

Words: 330 - Pages: 2

Free Essay

Astro

...facilitated a wider range of astronomical discovery through improvements to the instruments by which radio astronomers study celestial objects at radio frequencies. Radio waves are a type of electromagnetic radiation, and differ from ordinary visible light due to a longer wavelength and lower frequency. Engineer Karl Guthe Janksy is associated with the first radio antenna built in 1931 to identify astronomical radio sources. This involved an arrangement of reflectors and diploes, or pairs of equal and oppositely magnetized poles separated by a distance, intended to receive short wave radio signals. Labelled “Janksy’s Merry Go Round” due to its position on a turntable, Janksy monitored his instrument over several months and was able to measure the length of an astronomical sidereal day, which is the time it took for a fixed object located on the celestial sphere to return to the same location in the sky. Most notably, was his serendipitous discovery of the Milky Way in 1933 through comparison of his observations with optical astronomical maps, and eventual conclusion that the radiation source peaked when his antenna was aimed at the densest part of the Milky Way in the constellation of Sagittarius. Furthering Jansky’s work in 1937 was Grote Reber’s first parabolic single dish radio telescope designed to broaden the search and detection for static or noise. The information Janksy and Grote discovered was presented in a mixture of properties, such as frequency, amplitude, and repetitive...

Words: 1059 - Pages: 5

Free Essay

Microstrip Antenna

...IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 54, NO. 12, DECEMBER 2006 3755 A New Compact Microstrip-Fed Dual-Band Coplanar Antenna for WLAN Applications Rohith K. Raj, Manoj Joseph, C. K. Aanandan, K. Vasudevan, Senior Member, IEEE, and P. Mohanan, Senior Member, IEEE Abstract—A novel compact microstrip fed dual-band coplanar antenna for wireless local area network is presented. The antenna comprises of a rectangular center strip and two lateral strips miprinted on a dielectric substrate and excited using a 50 crostrip transmission line. The antenna generates two separate resonant modes to cover 2.4/5.2/5.8 GHz WLAN bands. Lower resonant mode of the antenna has an impedance bandwidth (2:1 VSWR) of 330 MHz (2190–2520 MHz), which easily covers the required bandwidth of the 2.4 GHz WLAN, and the upper resonant mode has a bandwidth of 1.23 GHz (4849–6070 MHz), covering 5.2/5.8 GHz WLAN bands. The proposed antenna occupy an area of 217 mm2 when printed on FR4 substrate . A rigorous experimental study has been conducted to confirm the characteristics of the antenna. Design equations for the proposed antenna are also developed. ( = 4 7) Index Terms—Coplanar waveguide, dual-band antennas, printed antennas, wireless local area networks (WLANs). I. INTRODUCTION IRELESS LOCAL area networks (WLAN) are being widely recognized as a viable, cost effective and high speed data connectivity solution, enabling user mobility. The rapid developments in WLAN technologies...

Words: 5288 - Pages: 22