Professional Documents
Culture Documents
Experiment No. 8
Aim: Write a program to simulate OFDM transmitter and receiver to elaborate operation of
OFDMA Multiple access techniques for evaluating bit error rate.
Theory: The set of 4G wireless standards is based on the revolutionary new technology of
Orthogonal Frequency Division Multiplexing (OFDM). Orthogonal Frequency Division
Multiplexing forms the basis of fourth generation wireless communication systems. OFDM is
used in 4G wireless cellular standards such as Long Term Evolution (LTE) and WiMAX
(Worldwide Interoperability for Microwave Access). OFDM is a keyword broadband wireless
technology which supports data rates in excess of 100 Mbps. OFDM is a combination of
modulation and multiplexing. In this technique, the given resource (bandwidth) is shared among
individual modulated data sources. The multiple access technology based on OFDM is termed
Orthogonal Frequency Division for Multiple Access (OFDMA).
Necessity of OFDM:
OFDM is very effective for communication over channels with frequency selective fading
(different frequency components of the signal experience different fading). It is very difficult to
handle frequency selective fading in the receiver, in which case, the design of the receiver is
hugely complex. Instead of trying to mitigate frequency selective fading as a whole (which
occurs when a huge bandwidth is allocated for the data transmission over a frequency selective
fading channel), OFDM mitigates the problem by converting the entire frequency selective
fading channel into small flat fading channels (as seen by the individual subcarriers). Flat fading
is easier to combat (when compared to frequency selective fading) by employing simple error
correction and equalization schemes.
In the figure, symbols represented by small case letters are assumed to be in time domain,
whereas the symbols represented by uppercase letters are assumed to be in frequency domain.
Consider data bits D = {d0,d1,d2,…). Select number of subcarriers required to send the given
data. As a generic case, assume N subcarriers. The data (D) is first converted from serial stream
to parallel stream depending on the number of sub-carriers (N). Decide digital modulation
techniques such as BPSK/ QAM. Apply IFFT algorithm on generated symbols and add cyclic
prefix bits . Finally, the resultant output from the N parallel arms are summed up together to
produce the OFDM signal. The channel in this case is modeled as a simple AWGN channel.
Since the channel is considered to be an AWGN channel, there is no need for the frequency
domain equalizer in the OFDM receiver as shown in Fig. 1. Reverse the process at the receiver
side. Compare the transmitted and received bits to compute bit error rate.
Matlab Code
Experiment No. 5
Aim : Write a program to measure bit error rate in presence of Hata propagation model and
establish Link budget
Theory: In order to plan the installation and deployment of a wireless network, one needs to
characterize the performance of the communication system in terms of the transmitted power and
total load in terms of users that can be supported by the network. Link-budget of wireless link is
a systematic listing of power losses and gains of different intermediate components in the
transceiver chain.
Hata Model
The Hata model is a popular model for signal strength prediction proposed initially by the
Japanese engineer Masaharu Hata in his 1980 paper titled “ Empirical Formula for Propopgation
Loss in Land Mobile Radio Services “. The Hata model presents an analytical approximation for
the graphical-information based on another Okumura model. Parameters required for simulations
:Hbts= Height measured from the base of the BTS tower to the radiation centerline
Tbts = Terrain elevation at the location of the BTS
Htav= Height of the average terrain (from 3 Km to 15 km distance from the BTS)
Hm=Height of the mobile antenna in meters
f= Range of frequencies in MHz
d=Range of Tx-Rx separation distances in Kilometers
Pt = Power transmitted by the BTS antenna in Watts
Gt= BTS antenna gain in dBi
Hb= Hbts+ Tbts - Htav = Effective Height of the BTS antenna in meters
models =
Big City (Urban model
aHm=3.2*(log10(11.75*Hm))^2-4.97;
C=0
Small & Medium City (Urban model)
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
Sub-urban environment
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
C=-2*(log10(f/28))^2-5.4;
Open Rural environment
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
C=-4.78*(log10(f))^2+18.33*log10(f)-40.98;
A = 69.55 + 26.16*log10(f) - 13.82*log10(Hb)-aHm;
B = 44.9 - 6.55*log10(Hb);
Path Loss (dB)=PL=A+B*log10(d)+C;
Received Signal Level(dB) =Pr = 10*log10(Pt*1000)+Gt-PL
%Matlab code to simulate Hata-Okumura Models
clc;clear all;
%----------Input Section---------------
Hbts= 50 ;%Height measured from the base of the BTS tower to the radiation centerline
Tbts = 350 ;%Terrain elevation at the location of the BTS
Htav= 300;%Height of the average terrain (from 3 Km to 15 km distance from the BTS)
Hm=3 ;%Height of the mobile antenna in meters
f=900 ;%100:100:3000; %Range of frequencies in MHz
d=0.5:0.5:15; %Range of Tx-Rx separation distances in Kilometers
Pt = 0.020; %Power transmitted by the BTS antenna in Watts
Gt= 10; %BTS antenna gain in dBi
%--------------------------------------
Hb=Hbts+Tbts-Htav ;%Effective Height of the BTS antenna in meters
%Cell array to store various model names
models = {'Big City (Urban model)';'Small & Medium City (Urban model)';'Sub-urban
environment';'Open Rural environment'};
display('Hata-Okumura Model');
display(['1 ' models{1,1}]);
display(['2 ' models{2,1}]);
display(['3 ' models{3,1}]);
display(['4 ' models{4,1}]);
reply = input('Select Your choice of environment : ','s');
if 0<str2num(reply)<4
modelName = models{str2num(reply),1};
display(['Chosen Model : ' modelName])
else
error('Invalid Selection');
end
switch reply
case '1',
C=0;
if f<=200
aHm=8.29*(log10(1.54*Hm))^2-1.1;
else
aHm=3.2*(log10(11.75*Hm))^2-4.97;
end
case '2',
C=0;
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
case '3',
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
C=-2*(log10(f/28))^2-5.4;
case '4',
aHm = (1.1*log10(f)-0.7)*Hm-(1.56*log10(f)-0.8);
C=-4.78*(log10(f))^2+18.33*log10(f)-40.98;
otherwise ,
error('Invalid model selection');
end
Experiment No. 4
Theory: The move to digital modulation provides more information capacity, compatibility with
digital data services, higher data security, better quality communications and quicker system
availability. Developers of communication systems face following constraints:
1. available bandwidth
2. permissible power and
3. inherent noise level of the system
The RF spectrum must be shared, yet everyday there are more users for this spectrum as demand
for communication services increases. Digital modulation schemes have greater capacity to
convey large amounts of information than analog modulation schemes.
Phase shift keying (PSK) involves the switching of the instantaneous phase of the carrier
between 2 or more levels according to the baseband digital data. A MATLAb script to generate
Binary PSK is given below :
clear all;
close all;
clc;
fc=1000; % Frequency for "0" bits
t=linspace(0,1/1000,50);
e0=cos(2*pi*fc*t); % BPSK output for "1"
e1=-cos(2*pi*fc*t); % BPSK output for "0"
b=mod(randperm(16),2);
bnot=1-b;
n=['The binary data is ',num2str(b)];
bpsk1=[];bpsk2=[];bin=[];
for i=1:length(b)
bpsk1=[bpsk1,b(i)*e0];
bpsk2=[bpsk2,bnot(i)*e1];
bin=[bin,b(i)*ones(1,50)];
end;
bpskout=bpsk1+bpsk2;
tm=[0:length(bpsk1)-1];
plot(tm,bin,'r--');
axis([0 length(bin) 0 1.5]);
hold on;
plot(tm,bpskout,'b');
axis([0 length(tm) -1.5 1.5]);
hold off;
xlabel('Time index');
ylabel('Amplitude');
legend('Random binary','BPSK output');
title('Simulation of Binary Phase Shift keying');
gtext(n);
Transmitter:
For the QPSK modulation, a series of binary input message bits are generated. In QPSK, a
symbol contains 2 bits. The generated binary bits are combined in terms of two bits and QPSK
symbols are generated. From the constellation of QPSK modulation the symbol ‘00’ is
represented by 1, ‘01’ by j (90 degrees phase rotation), ‘10’ by -1 (180 degrees phase rotation)
and ‘11’ by -j (270 degrees phase rotation). In another form of QPSK, these phase rotations are
offset by 45 degrees. So the effective representation of symbols in this form of QPSK is ‘00’=1+j
(45 degrees), ’01′=-1+j (135 degrees), ‘10’ = -1-j (225 degrees) and ‘11’= 1-j (315 degrees).
Here we are simulating a 45* rotated QPSK system. Once the symbols are mapped, the power of
the QPSK modulated signal needs to be normalized by 1/sqrt(2).
For the channel model “randn” function in Matlab is used to generate the noise term. This
function generates noise with unit variance and zero mean. In order to generate a noise with
standard deviation - σ for the given Eb/N0 ratio, use the above equation, find σ, multiply the
“randn” generated noise with this σ, add this final noise term with the transmitted signal to get
the received signal. For a pi/4 rotated QPSK system, since the modulated signal is in complex
form (due to sine and cosine basis functions),the noise should also be in complex form.
Receiver:
QPSK receiver employs two threshold detectors that detect real (in phase arm) and imaginary
parts (quadrature arm). The detected signals are sent through a parallel to serial converter
(implemented by “reshape” function in MATLAB).
% Demonstration of Eb/N0 Vs BER for QPSK modulation scheme
clear;
clc;
%---------Input Fields------------------------
N=1000000;%Number of input bits
EbN0dB = -4:2:10; % Eb/N0 range in dB for simulation
%---------------------------------------------
data=randn(1,N)>=0; %Generating a uniformly distributed random 1s and 0s
oddData = data(1:2:end);
evenData = data(2:2:end);
qpskModulated = sqrt(1/2)*(1i*(2*oddData-1)+(2*evenData-1)); %QPSK Mapping
M=4; %Number of Constellation points M=2^k for QPSK k=2
Rm=log2(M); %Rm=log2(M) for QPSK M=4
Rc=1; %Rc = code rate for a coded system. Since no coding is used Rc=1
BER = zeros(1,length(EbN0dB)); %Place holder for BER values for each Eb/N0
index=1;
for i=EbN0dB,
%-------------------------------------------
%Channel Noise for various Eb/N0
%-------------------------------------------
%Adding noise with variance according to the required Eb/N0
EbN0 = 10.^(i/10); %Converting Eb/N0 dB value to linear scale
noiseSigma = sqrt(1./(2*Rm*Rc*EbN0)); %Standard deviation for AWGN Noise
%Creating a complex noise for adding with QPSK modulated signal
%Noise is complex since QPSK is in complex representation
noise = noiseSigma*(randn(1,length(qpskModulated))+1i*randn(1,length(qpskModulated)));
received = qpskModulated + noise;
%-------------------------------------------
%Threshold Detector
detected_real = real(received)>=0;
detected_img = imag(received)>=0;
estimatedBits=reshape([detected_img;detected_real],1,[]);
%------------------------------------------
%Bit Error rate Calculation
BER(index) = sum(xor(data,estimatedBits))/length(data);
index=index+1;
end
%Plot commands follows
plotHandle=plot(EbN0dB,log10(BER),'r--');
set(plotHandle,'LineWidth',1.5);
title('SNR per bit (Eb/N0) Vs BER Curve for QPSK Modulation Scheme');
xlabel('SNR per bit (Eb/N0) in dB');
ylabel('Bit Error Rate (BER) in dB');
grid on;
hold on;
theoreticalBER =0.5*erfc(sqrt(10.^(EbN0dB/10)));
plotHandle=plot(EbN0dB,log10(theoreticalBER),'b*');
set(plotHandle,'LineWidth',1.5);
legend('Simulated','Theoretical-QPSK','Theoretical-QPSK');
grid on;
Conclusions : Write in brief answers to the following Questions :
Que 1: Comparison of Analog Modulation Schemes with Digital Modulation.
Que 2: Mention theoretical bandwidth efficiency limits for each modulation formats..
Ans :
Modulation format Theoretical bandwidth efficiency
BPSK 1 bit/sec/Hz
QPSK
8PSK
16-QAM
1024- QAM
Experiment No. 7
Aim: Prepare a Case study on Visit to Mobile Telephone Switching Office (MTSO).
Theory:
Conclusion :
Que 1 : Explain the call routing process for voice and Data from your visit.
Experiment No. 1
0 0 0 0 X1 Y1 0 0 0 1 X1 Y3
1 0 0 0 X2 Y1 1 0 0 1 X2 Y3
0 1 0 0 X3 Y1 0 1 0 1 X3 Y3
1 1 0 0 X4 Y1 1 1 0 1 X4 Y3
0 0 1 0 X1 Y2 0 0 1 1 X1 Y4
1 0 1 0 X2 Y2 1 0 1 1 X2 Y4
0 1 1 0 X3 Y2 0 1 1 1 X3 Y4
1 1 1 0 X4 Y2 1 1 1 1 X4 Y4
Experiment No. 2
Aim: Write a program in MATLAB to simulate Loss Call system model of Traffic
Engineering.
Theory: The capacity of a switch system is expressed as the maximum number of originating
plus incoming calls that can be processed in a high traffic hour. The call volume offered to a
switch depends on geographical area, class of service mix and time of day. There are basically
two types of systems: 1. Lost system 2. Delay system. Telephone and Mobile network is a lost
system where overflow traffic is rejected. In other words, the overflow traffic experience
blocking from network. There are three ways in which overflow traffic is to be handled:
The traffic rejected by one set of resources may be cleared by another set of resources in
network.
Traffic may return to the same sources after some time.
Traffic may be hold by the sources as if using serviced but actually only after resources
become available.
In order to obtain analytical solutions to tele-traffic problems it is necessary to have a
mathematical model of the traffic offered to telecommunication systems. A simple model is
based on the following assumptions:
Pure Chance Assumption implies that call arrivals and call terminations are independent
Traffic
random events
Statistical Implies that probabilities do not change.
equilibrium
Full availability Every call that arrives can be connected to any outgoing trunk which is free.
Calls which
Implies that any call which encounters congestion is immediately cleared
encounter
congestion are from the system.
lost
The loss probability for a full availability group of N trunk offered with traffic A erlangs is
given by:
Algorithm: A group of 5 trunks is offered 2 E of traffic. Find the Grade of service, the
probability that only one trunk is busy, the probability that only one trunk is free, the probability
that at least one trunk is free.
clc;
clear all;
Num=A^N/factorial(N)
sum=0;
for k= 1:1:n
Den=A^k/factorial(k)
sum=sum+Den;
end
Den=sum+1;
fprintf('\n The value of Denominator Den=%d',Den);
B=Num/Den;
grid on;
plot(N,B,'r+:')
end
Conclusion: If the offered traffic A increases, the number of trunks N must obviously increase to
provide a given grade of service.
Experiment No. 3
Apparatus: GSM trainer kit, SIM card, PC with FALCOM software and
serial interface network.
5 Modulation GMSK
Procedure:
1. Insert SIM.
2. Run software.
3. Connect COM1 to COM1 of the Hardware kit.
4. Software will RUN AT commands &will show signal strength.
5. From software panel, make voice call.
6. Do same for by AT commands.
7. Also verify commands for various operations like sending & receiving SMS.
8. RUN various AT commands
Connection Diagram:
Observation Table:
e.g.: ATD 9988001122; this command dials a destination number for making a call.
2. AT-H: - Hang up command H.
It is used for application to disconnect remote
user case of multiple cells.
3. ATA: Answer the call.
4. ATDL: Redial last numbers.
Last dialed number is displayed follower by I for service calls only.
5. AT+CMGR: Read message.
This command allows application to read necessary message (by
memory selected by command)
Syntax: AT+CMGR<index>
7. AT + CMGL: List message
8. AT+CMGS: Send message.
9. AT+CMGD: Delete message.
Conclusion: Write in brief answers to the following questions.
Que 2: Explain step by step process of call connection from mobile to PSTN?
Experiment No. 6
Aim: Voice over Internet Protocol to communicate with peers using Skype service.
Theory: Voice over data networks is primary constructed of computer servers and gateways.
Servers control the overall system access and processing of calls & gateways convert the voice
over data network data to signals that can be used by telephone access devices.
In addition to providing the essential telecom service features, voice over data (VoIP) telephone
service can perform advanced features such as:
1. Unified messaging: Unified messaging is a multimedia messaging system that allows you to
store, manage, transfer and retrieve different forms of messages.
2. Videophone: A videophone is a communication device that can capture and display video
information in addition to audio information. The use of videophones with an internet
telephone service allows the video portion of the communications session to share the data
connection.
5. Distant learning through Webinars: Audio chat rooms are real time communication services
that allow several participants to interact much like an audio conference session.
Connection Establishment:
Skype is a proprietary Voice over Internet Protocol service allows user to communicate with
peers by voice, video and instant messaging over the internet. So here’s how you do Skype to
Skype calling:
1. If it’s your first call you’ll need to add the person you want to call to your contacts by
searching for their Skype name. If they are on Skype too, calls are free.
2. Otherwise just check who’s available – if the little icon next to their name is green they
are online and ready to talk.
3. Once you have found the person you had like to talk to, just push the green call button
to start chatting, wait for them to answer, and you can start talking.
4. S, open up Skype, find a person to chat to, push the button and away you go.
Free - Skype to Skype Calls, One to One Video calls, Instant messaging etc.
Note: Full details on how to use Skype are available from their website at www.Skype.com
Experimental Setup: