Free Essay

Energy Based Detection Scheme for Orthogonal Frequency Division Multiplexing

In:

Submitted By BAKota
Words 2583
Pages 11
International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011 Proceedings published by International Journal of Computer Applications ® (IJCA)

Energy based Detection Scheme for Orthogonal Frequency Division Multiplexing
Bala Aditya Kota, Bharadwaj S #, Kiran C S, Nithin Krishna B M, Sutharshun V
Students (B.Tech), Dept. of ECE, Amrita Vishwa Vidyapeetham, Ettimadai, Coimbatore – 641105.

P.Sudheesh, Dr.M.Jayakumar
Assistant Professor, Associate Professor, Dept. of ECE, Amrita Vishwa Vidyapeetham, Ettimadai, Coimbatore – 641105.
1 2

ABSTRACT
Orthogonal Frequency Division M ultiplexing (OFDM ) has been accepted as the modulation scheme of choice for the next generation high-speed wireless communication systems due to the advantages that it offers like high spectral efficiency, resistance to multipath fading and resistance to frequency selective fading. M oreover, it lends itself to simple channel equalization. Conventional single carrier systems do not provide such advantages and hence, OFDM would almost ubiquitously be used for high speed wireless data transmission. However, the main drawback of such systems over single carrier systems is that in the presence of noise, there is an increased computational complexity at the receiver end to decode the data. In this paper, a low complexity detection algorithm is proposed for OFDM systems. M aximum likelihood detection is taken as the baseline detection algorithm and the proposed algorithm is compared with M L detection algorithm. Comparison results are plotted and conclusions are drawn.

Reference [4] provides an iterative detection scheme for OFDM in presence of impulsive noise while [5] proposes an impulsive noise mitigation scheme for over-sampled OFDM systems. Performance and design of impulse noise detector for OFDM systems is provided in [6]. Reference [7] proposes an MM SE detection algorithm assuming noise to have a random variance. Reference [8] deals with noise resistant OFDM for power-line communications emphasizing on narrowband interference (NBI) since power lines typically offer only narrowband noise. Reference [9] proposes a detection scheme for OFDM systems in the presence of coloured noise. While all of the above references provide effective methods for symbol detection, most of them concentrate mainly on narrowband, impulsive and coloured noise. The noise offered by wireless channels, however, cannot be modelled as any of these and hence, the methods provided in [4-9] cannot be directly used when communicating over wireless channels. Alternate detection schemes are required for this purpose. This paper proposes a novel detection algorithm for OFDM systems in the presence of AWGN. The basic aim of the paper is to reduce the computational complexity at the receiver end for symbol detection. In the scheme that we propose, the receiver is required to perform no vector manipulations to detect data. The algorithm operates purely on scalar manipulations thereby reducing the computational load on the receiver for symbol detection. The paper is organized as follows. Section-II gives an introduction to OFDM and describes the modulation and demodulation process. Special emphasis is laid on the design of signal constellation since it is this design of constellation that facilitates the use of the proposed detection algor ithm. The form of the received signal which is corrupted by noise is also given and the problem of detection is formulated. Section-III describes the proposed low complexity detection algorithm. M aximum likelihood detection is taken as the baseline detection algorithm and in section-IV, the proposed algorithm is compared with the baseline detection algorithm on the basis of computational complexity and bit error rate performance. Plot of SNR versus BER is obtained through simulation for both M L and proposed detection algorithms and the results are plotted. Section-V gives the summary and conclusions.

General Terms
M ulticarrier communication systems, Orthogonal Frequency division multiplexing.

Keywords: energy. OFDM, Computational complexity, symbol

1. INTRODUCTION
Orthogonal Frequency Division M ultiplexing (OFDM ) is a special case of multicarrier transmission where a single data stream is transmitted over a number of lower rate subcarriers [1]. OFDM has been placed at the apex due to the advantages that it offers like resistance to frequency selective fading and resistance to multipath fading. In addition to robustness that OFDM offers in wireless channels, it also provides high spectral efficiency and lends itself to simple channel equalization. Owing to such advantages, OFDM has received widespread attention in the communications industry as evidenced by standards such as xDSL (digital subscriber lines), IEEE 802.11a/g for wireless Local Area Networks (WLANs) [2] and 3GPP Long Term Evolution (LTE) wireless cellular systems [3] among many others. However, in the presence of noise, symbol detection at the receiver becomes computationally complex when large numbers of subcarriers are employed. This would be the case while transmitting through wideband channels that have very low coherence bandwidth. Considerable research has gone into developing detection algorithms for OFDM systems. A brief overview of existing techniques is given below.

2. Proble m Formulation
C = {F 1(t), F 2(t) ... F N(t)} is the set of N orthogonal subcarriers used by the transmitter. N must be chosen such that the bandwidth of each subcarrier is lesser than the coherence bandwidth of the channel. 11

International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011 Proceedings published by International Journal of Computer Applications ® (IJCA) S = {S 1, S 2 ... SM } is the signal constellation used. M is determined by the required data rate. The set S must contain vectors from the vector space RN. Furthermore, the vectors in S must be chosen in such a way that no two vectors in S have the same energy. The rationale for these conditions will be clear in the subsequent sections. Having chosen the signal constellations as above, modulation and demodulation are done as follows. high degree of confidence, N max can be assumed to be the upper bound value taken by noise. The proposed algorithm is basically built upon the above assumption. The improbable case when noise takes a value greater than N max is when an error occurs in detection. Error simulation for the proposed algorithm has been done and the results are provided in the next section. Since each entry of the noise vector has an upper bound, the energy of the added vector also has an upper bound which happens when all the entries of the noise vector take their maximum value simultaneously. This upp er bound is given by (6) Now, the signal constellation is chosen in such a way that no two symbols in the constellation have the same energy. Suppose that the minimum energy difference between any two symbols is Emin. Emin is chosen according to the following inequality. (1) (7) Suppose that the transmitted vector is S j and its energy is Ej . From the triangle inequality, we can conclude that the energy of received vector which is the sum of the transmitted vector and noise would be upper bounded by Ej +EUB and lower bounded by Ej -EUB. M athematically, (8) where Rj is the energy of the received vector. Since the vectors in the signal constellation are chosen to have a minimum energy difference of 2(EUB), Rj will be closer to Ej than Ei for all i ≠ j where Ei is the energy of S i. Hence, if a table containing each vector in S and the corresponding energy is stored in the receiver, the receiver can detect the transmitted vector just by comparing the energy of received vector with the energies of vectors in S and finding out that energy which is the closest to the received energy. Once that energy is known, only a look-up operation is required to detect the transmitted vector. This detection algorithm involves only comparison of scalar quantities and doesn’t involve any tedious vector manipulations (except while computing the energy of the received vector) unlike M L detection algorithm which requires the receiver to do vector operations for detection. Hence, the proposed algorithm is computationally more efficient compared to M L detection algorithm. The next section proves this efficiency by providing relevant comparison results.

2.1 Modulation
The data symbols to be transmitted are produced serially by the signal constellation. Let this data sequence be X1, X2, X3 and so on. Each of these symbols is an N-tuple as per the choice of the set S. The above sequence of information symbols is modulated and transmitted as follows:

2.2 Demodulation
The signal obtained at the output of the channel equalizer of the receiver, in the ideal case, is given by (2) where N(t) is the noise that was added in the chann el which we assume to be AWGN. By correlating the received signal with Fi (t-kT s), the receiver recovers the i-th entry of the N-tuple sent in the k-th time frame. (3) where (4) By doing the above operation for all i, the receiver demodulates the vector sent in the k-th time frame and by doing it for all k, the receiver demodulates the transmitted sequence of vectors. Let this demodulated vector sequence be Y0, Y1, Y2 ... where each Yi is a vector in RN. This demodulated data is the noise corrupted version of the transmitted vector sequence. M athematically, the received vector during k-th time frame, Y k can be expressed in terms of transmitted vector at k-th time frame, X k as (5) where Nk is a Gaussian random vector in RN each entry of which is given by (4). Hence, the problem of detection can be formulated as follows. Recover the transmitted vector Xk from the received vector Yk for all values of k. In theory, M L detection algorithm gives the best results in terms of bit error rate but this algorithm involves high computational complexity and hence may not be a practical solution for the problem of detection. The following section proposes a novel detection algorithm that reduces this computational complexity significantly thereby making it a practical solution for the problem of detection.

4. SIMULATION AND RESULTS
This section provides the comparison results of computational complexity and BER performance for proposed system and baseline system. Figure.1 is the plot of computational complexity versus the constellation size. The black colored line corresponds to M L detection algorithm and the red colored line corresponds to the proposed detection algorithm. The figure has been plotted for an OFDM system employing 16 subcarriers. The constellation size is varied from 2 to 1024 corresponding to a data rate of 1 bit to 10 bits per transmission. The graph has been plotted in logarithmic scale. The computational complexity has been measured as the total number of additions and multiplications 12

3. PROPOSED DETECTION ALGORITHM
The added noise vector N k has its entries to be i.i.d Gaussian random variables with zero mean and variance V2. Let N max be the value such that the probability that N k(i) takes a value greater than Nmax is Pe . Pe is typically taken to be close to zero. Hence, with a

International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011 Proceedings published by International Journal of Computer Applications ® (IJCA) required to detect each vector which is an element in R 16. The plot shows that the proposed algorithm comfortably outperforms M L detection algorithm in terms of computational complexity. Figure.2 provides the comparison result for BER performances of M L detection algorithm and the proposed detection algorithm. The constellation for the system employing the proposed algorithm is chosen as per the conditions mentioned in the paper. The constellation for system employing M L algorithm is chosen from a 2-QAM constellation resulting in a total of 8 QAM symbols being transmitted per time frame. The constellation size for the proposed detection algorithm is chosen to be 256 so that the number of bits per transmission for the systems employing the two algorithms is the same. SNR is varied by scaling the symbols in the signal constellation in the case of proposed scheme while the constellation power is varied by scaling the QAM constellation in the case of M L detection scheme. The BER expression for M L detection algorithm is given in [10] and the graph is plotted in logarithmic scale. It is seen from the figure that for lower values of SNR, the proposed detection algorithm has a lower BER while for higher values of SNR, M L detection algorithm has a lower BER. Therefore, it can be concluded that the proposed scheme provides better performance than M L detection scheme in terms of both computational complexity and bit error rate for low values of SNR whereas the proposed algorithm sacrifices BER for computational complexity for higher values of SNR. Error control coding can be done at the transmitter before transmission to reduce the BER of the proposed scheme but it results in a reduction in data rate. This highlights the interplay between computational complexity, bit error rate and data rate for the proposed detection algorithm. The exact choice of parameters, therefore, would depend upon the system specifications like total available transmit power or the required BER.
Bit Error Rate (log Scale)

10

0

Proposed Detection Algorithm ML Detection Algorithm

10

-1

10

-2

10

0

10 Signal to Noise Ratio (log scale)

1

10

2

Figure.2 Plot of BER versus SNR for ML detection and proposed algorithm This result also confirms to intuition since the proposed algorithm works purely on scalar operations which is not the case with M L detection algorithm. Finally, it is concluded that the proposed detection algorithm would be feasible in situations where M L algorithm wouldn’t.

6. REFERENCES

[1] Ramjee Prasad, “OFDM for wireless communication systems,” Artech house, 2004. [2] IEEE 802.11, “Wireless LAN M edium Access Control (MAC) Physical Layer (PHY) Specifications, Amendment 1: High-Speed Physical Layer in the 5 GHz Band,” July 1999. [3] M ohammadnia-Avval M ., Snow C., Lampe L., “Error-Rate Analysis for Bit-Loaded Coded M IM O-OFDM ,” IEEE Transactions on Vehicular Technology, vol. 59 , issue: 5, 2010. [4] Chantaranotai, S., Supnithi, P., “Improved iterative detection for OFDM communication system with impulsive noise,” IEEE International Symposium on Communications and Information Technology, vol. 1, 2005. [5] Xiaoxin Zhang, Yuping Zhao, Li Zou, “An efficient impulsive noise mitigation scheme for over-sampled OFDM systems,” IEEE Transactions on Consumer Electronics, vol. 55, issue: 2, 2009. [6] M ahadevan A., Pons J., Duvaut P., “Performance and Design of an Impulse Noise Detector for OFDM Systems with ReedSolomon Erasure-Decoding,” IEEE Global Telecommunications Conference, 2008. [7] Xinning Wei, Weber T., “MM SE Detection Based on Noise Statistics with Random Noise Variance,” IEEE Vehicular Technology Conference, 2008. [8] Jun Zhang, M eng J., “Noise resistant OFDM for power-line communications,” IEEE Transactions on Power Delivery, vol. 25, issue: 2.

5. SUMMARY AND CONCLUSIONS
In this paper, a low complexity detection algorithm which uses specially designed signal constellations was proposed for OFDM systems. The computational complexity of the proposed algorithm was compared with that of M L detection algorithm. The results prove that the proposed algorithm is computationally more efficient than M L detection algorithm.
Computational Complexity per Symbol detection (log scale)

10

25

10

20

10

15

10

10

10

5

Proposed Detection Method Maximum Likelihood Detection 10
1

10 Constellation Size (log scale)

2

10

3

[9] “Optimal Training Signals and Detection for OFDM under Colored Noise,” IEEE Vehicular Technology Conference, 2007. [10] John G Proakis, M asoud Salehi, “Fundamentals Communication Systems,” Pearson Education, 2008. of

Figure.1 Plot of computational complexity versus constellation size for ML detection and proposed algorithm

13

Similar Documents

Premium Essay

Gprs Core Network

...------------------------------------------------- Technical overview See also: S Core NetworkGPR 2.5G and 3G systems rely on double core network infrastructures; traditional circuit-switched network nodes (switching points) for telephony, and packet-switched GPRS nodes for various data services. Dedicated nodes handle the SMS service. 4G systems are expected to be all-IP, meaning that the core network is based on IP routers.[citation needed] [edit]Services offered GPRS extends the GSM Packet circuit switched data capabilities and makes the following services possible: * SMS messaging and broadcasting * File manipulation functions * Active process block process * "Always on" internet access * Multimedia messaging service (MMS) * Push to talk over cellular (PoC) * Instant messaging and presence—wireless village * Internet applications for smart devices through wireless application protocol (WAP) * Point-to-point (P2P) service: inter-networking with the Internet (IP) * Point-to-Multipoint (P2M) service: point-to-multipoint multicast and point-to-multipoint group calls If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS transmission speed is about 6 to 10 SMS messages per minute. [edit]Protocols supported GPRS supports the following protocols:[citation needed] * Internet protocol (IP). In practice, built-in mobile...

Words: 9684 - Pages: 39

Free Essay

Introduction to Ofdm

...Introduction to OFDM, II edition 10/30/98/TUD-TVS 1 OFDM as a possible modulation technique for multimedia applications in the range of mm waves Duš Matiæ an Abstract - In this paper is given an overview of a multiple carrier modulation technique known as OFDM (Orthogonal Frequency Division Multiplex). It focuses on problems that are specific for its use in the future mobile multimedia communications (MMC) in the range of 60 GHz. I Introduction Multimedia is effectively an infrastructure technology with widely different origins in computing, telecommunications, entertainment and publishing. New applications are emerging, not just in the wired environment, but also in the mobile one. At present, only low bit-rate data services are available to the mobile users. However, demands of the wireless multimedia broadband system are anticipated within both public and private sector. This report discusses possible ways to enable multimedia communications in the mobile environment. Multimedia communication has a rather large demands upon bandwidth and quality of service (QoS) compared to what is available today to the mobile user. Bitrates for multimedia span from a few Kb/s, for voice, to about 20 Mb/s for HDTV, or even more in the peaks. When solving this problem, first question is how to put this large bit stream on air with sufficient QoS guaranties, i.e. which modulation can compromise all contradicting requirements in the best manner. The radio environment is harsh,...

Words: 8198 - Pages: 33

Free Essay

Performance Evaluation of Ofdm System for Different Channel and Different Modulation Techniques

...T093011, Email: mamunmoon19@yahoo.com Contact No.: +8801717934676 Gazi Shamsul Arefeen (Shams) Dept. of ETE, International Islamic University Chittagong, Metric No.: T093016, Email: shams.ete@gmail.com Contact No.: +8801676848247 Contact Information of Supervisor: Md. Jashim Uddin Dept. Of ETE, International Islamic University Chittagong. Contact No. +8801716-823959 Email: jashimcuet@yahoo.com Abstract The demand for high-speed mobile wireless communications is rapidly growing. Orthogonal Frequency Division Multiplexing (OFDM) technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems in the near future. An Orthogonal Frequency Division Multiplexing (OFDM) scheme offers high spectral efficiency and better resistance to fading environments. In OFDM the data is modulated using multiple numbers of sub-carriers that are orthogonal to each other because of which the problems associated with other modulation schemes such as Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI) is reduced. This paper deals with the analysis of OFDM System utilizing different modulation techniques over Rayleigh, Rician and Additive White Gaussian Noise (AWGN) fading environments with the use of pilot aided arrangement and finally the results are conveyed. The aim of this thesis is to provide practical solutions for OFDM communication system by showing its better...

Words: 16266 - Pages: 66

Free Essay

My Paper

...Zia Muhammad, Hasan Mahmood, Awais Ahmed, and Nazar Abbas Saqib Abstract—We present a novel selective Hybrid Automatic Repeat reQuest (HARQ) based transceiver design for orthogonal frequency division multiplexing (OFDM) system. The proposed method is bandwidth efficient and has lower complexity as compared to conventional HARQ method adopted by communication standards such as long-term evolution (LTE). Our transceiver design introduces an additional retransmission layer at OFDM modulation level, which is independent of conventional HARQ methods. Instead of calculating computationally expensive soft information and applying forward error correction (FEC) on the soft information, receiver requests retransmission of information symbols corresponding to the subcarriers that have signal-tonoise ratio (SNR) below a set threshold at modulation level. We also provide criteria for selective retransmission and throughput analysis with new selective retransmission approach. We demonstrate that with limited feedback at modulation layer level, the proposed method enhances throughput of the system in all SNR regimes. The proposed selective HARQ method provides great flexibility for an application to optimize throughput based on its bit error rate (BER) requirement. Index Terms—Hybrid ARQ, partial retransmission, LDPC codes, OFDM, LTE, joint detection. I. I NTRODUCTION VER the past decade, multiple-input multiple-output (MIMO) communication systems have been attraction for the research community...

Words: 3616 - Pages: 15

Free Essay

Antenna Design

...TABLE OF CONTENTS PAGE NO. CHAPTER 1- INTRODUCTION 1.1 INTRODUCTION 6 1.2 WHAT IS OFDMA? 9 CHAPTER 2 - SUBCARRIER ALLOCATION SCHEMES 2.1 STATIC SUBCARRIER ALLOCATION 12 2.2 DYNAMIC SUBCARRIER ALLOCATION 14 2.2.1 THE PROPOSED DSA SCHEME 15 CHAPTER 3- FLOW CHART AND ALGORITHM 4.1 FLOW CHART 17 4.1.1 MAIN FLOWCHART 17 4.1.2 WHEN 2 USERS FALL IN RANGE NUMBERED 3,5,8,14 20 4.1.3 WHEN 3 USERS FALL IN RANGE NUMBERED 3,5,8,14 22 4.2 ALGORITHM 24 CHAPTER 5-BLOCK DIAGRAMS 5.1 CONTROL FRAME TRANSCEIVER 28 5.2 DATA TRANSMISSION 29 5.3 DATA RECEPTION 31 CHAPTER 6- IMPLEMENTATION AND RESULTS 6.1 MATLAB 34 6.1.1 INSTRUCTIONS USED IN CODE 35 6.2 CONTROL FRAME TRANSMISSION AND RECEPTION 39 6.3 DATA GENERATION...

Words: 7933 - Pages: 32

Premium Essay

Third Generation Wireless Standard

...3G Unit-1: GPRS & EDGE General Packet Radio Service (GPRS) General Packet Radio Service (GPRS) is a mobile data service available to users of GSM mobile phones. It is often described as "2.5G", that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused TDMA channels in the GSM network. Originally there was some thought to extend GPRS to cover other standards, but instead those networks are being converted to use the GSM standard, so that is the only kind of network where GPRS is in use. GPRS is integrated into GSM standards releases starting with Release 97 and onwards. First it was standardised by ETSI but now that effort has been handed onto the 3GPP. GPRS is different from the older Circuit Switched Data (or CSD) connection included in GSM standards releases before Release 97 (from 1997, the year the standard was feature frozen). In CSD, a data connection establishes a circuit, and reserves the full bandwidth of that circuit during the lifetime of the connection. GPRS is packet-switched which means that multiple users share the same transmission channel, only transmitting when they have data to send. This means that the total available bandwidth can be immediately dedicated to those users who are actually sending at any given moment, providing higher utilization where users only send or receive data intermittently. Web browsing, receiving e-mails as they arrive and instant...

Words: 18564 - Pages: 75

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Capture

...AN INTRODUCTION TO LTE LTE, LTE-ADVANCED, SAE AND 4G MOBILE COMMUNICATIONS Christopher Cox Director, Chris Cox Communications Ltd, UK A John Wiley & Sons, Ltd., Publication This edition first published 2012 © 2012 John Wiley & Sons Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor...

Words: 124044 - Pages: 497

Premium Essay

Data Communications and Networking by Behrouz A.Forouzan

...Don't forget to check out the Online Learning Center, www.mhhe.com/forouzan for additional resources! Instructors and students using Data Communications and Networking, Fourth Edition by Behrouz A. Forouzan will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures...

Words: 59848 - Pages: 240

Premium Essay

Ntc 406 Week 5 Hybrid Analysis Final Project

...Final Paper: Cross-Layer or Hybrid Analysis and Recommendations Final Paper: Cross-Layer or Hybrid Analysis and Recommendations According to "Cat-5" (2014), "Cat-5, short for Category 5, network cabling that consists of four twisted pairs of copper wire terminated by RJ45 connectors. Cat-5 cabling supports frequencies up to 100 MHz and speeds up to 1000 Mbps. It can be used for ATM, token ring, 1000Base-T, 100Base-T, and 10Base-T networking. Computers hooked up to LAN s are connected using Cat-5 cables, so if you're on a LAN, most likely the cable running out of the back of your PC is Category 5. Cat-5 is based on the EIA/TIA 568 Commercial Building Telecommunications Wiring Standard developed by the Electronics Industries Association as requested by the Computer Communications Industry Association in 1985.” In contrast to that are the electrical power lines. According to “Electrical Power lines” (2014), “Power line networking uses power line communications (PLC) to connect computers using existing power outlets in the home, essentially transforming every electrical outlet in the building into a network connection. Power line networking is one of the cheapest forms of home networking and has a low start-up cost and minimal IT workload.” As we can see the startup cost and the workload and management for IT is leaned towards the PLC which is easy to implement and maintain. However the standard used in corporations are the Cat-5 network cabling. Even with the introduction...

Words: 5457 - Pages: 22

Premium Essay

Cognitive Radio Network

...POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK by Major Awal Uddin Ahmed (ID: 1003) Major Md Shariful Islam(ID: 1004) Major K M Hasnut Zamil (ID: 1006) A Project Report submitted to the department of Electrical Electronic and Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Electrical Electronic and Communication Engineering Advisor: M. Shamim Kaiser Military Institute of Science and Technology Mirpur Cantonment, Dhaka December 2010 To Our Beloved Parents ii DECLARATION This thesis is a presentation of my original research work. Wherever contributions of others are involved, every effort is made to indicate this clearly, with due reference to the literature, and acknowledgement of collaborative research and discussions. The work was done under the guidance of Dr. M. Shamim Kaiser, at the Mililary Institute of Science and Technology (MIST), Mirpur Cantonment, Dhaka. (Major Awal Uddin Ahmed (ID: 1003)) (Major Md Shariful Islam(ID: 1004)) (Major K M Hasnut Zamil (ID: 1006)) iii CERTIFICATE This is to certify that the thesis entitled POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK and submitted by Major Awal Uddin Ahmed (ID: 1003), Major Md Shariful Islam(ID: 1004), Major K M Hasnut Zamil (ID: 1006) for the degree of Bachelor of Engineering in Electrical Electronics and Communication Engineering. They embody original work under my supervision...

Words: 9257 - Pages: 38

Free Essay

Computer

...CONTENT Page No 1 2 3 4 5 6 7 8 9 10 Academic calendar Digital Communications Microprocessors and microcontrollers Digital Signal Processing Object Oriented Programming Through Java Managerial Economics And Financial Analysis Digital Signal Processing Lab Microprocessor & Microcontroller Lab Advanced English Communication Skills Lab Object Orient Programming Through Java Lab 2 3 48 85 129 186 217 219 222 224 ACADEMIC CALENDAR VIGNAN INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT ACADEMIC CALENDAR B. Tech Academic Year 2013 - 2014 - II - Semester S.No Event Date th 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Submission of abstracts of main project by IV years Faculty orientation program Commencement of Class work Spell for UNIT – I Instructions Fresher’s day Spell for UNIT – II Instructions Alumni meet VIGNAN TARANG Spell for Unit-III Instructions st nd Assignment -1/ Unit test-1 on I & II Units Submission of results & week students list to Dept Spell for Unit-IV Instructions University I-Mid-Exam- II & IV Year rd University I-Mid-Exam- III Year Spell for UNIT – V Instructions for II &IV years rd Spell for UNIT – V Instructions for III year LAB INTERNAL-1 Commencement of Special classes for Slow learners Spell for UNIT – VI Instructions for II &IV years rd Spell for UNIT – VI Instructions for III year Submission of Mini project title along with guide for III year Spell for Unit...

Words: 28702 - Pages: 115

Free Essay

Idrivesa

...2007-2008 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD B.TECH. ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3...

Words: 26947 - Pages: 108

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506

Free Essay

Engineering

...-Aa posteriori distribution a priori distribution A.C. pulse abandoned connection abbreviated address calling abend aberration abnormal end abnormal reflection abnormal termination abort sequence abort, to aborted connection absolute code absolute delay absolute error absolute error of measurement absolute instruction absolute instrument absolute pressure absolute stability of a system absolute system of electrical units absolute-value device absolutely stable system absolutely summable absorb, to absorbant absorbing state absorption cross-section absorption loss absorption modulation absorption absorption spectrum absorption trap absorptive attenuator abstract abstract symbol abstract syntax tree abstraction AC AC/DC converter accelerate, to accelerated test accelerating relay acceleration of gravity sonsal dağılım önsel dağılım almaşık akım darbesi yarıda kalan bağlantı kısa numarayla arama olağandışı sonlanma sapınç olağandışı son olağandışı yansıma olağandışı son durdurma dizisi (bitirmeden) durdurmak yarıda kalan bağlantı makina dilindeki kod, mutlak kod mutlak gecikme mutlak hata mutlak ölçüm hatası makina dilindeki komut, mutlak komut mutlak ölçü aleti mutlak basınç bir dizgenin mutlak kararlılığı elektrik birimlerinin mutlak sistemi mutlak değer aygıtı mutlak kararlı dizge mutlak toplanır soğurmak soğurgan soğurucu durum etkin soğurma alanı soğurum yitimi enerji soğurum kiplenimi soğurulma, soğurum soğurum izgesi soğurum tuzağı soğurgan zayıflatıcı 1) öz; 2) soyut soyut...

Words: 38690 - Pages: 155