PXC 3871183
PXC 3871183
net/publication/45601600
CITATIONS READS
19 1,321
3 authors, including:
Kv Shriram
Aricent Group
14 PUBLICATIONS 73 CITATIONS
SEE PROFILE
All content following this page was uploaded by Kv Shriram on 30 May 2014.
gain control, which fed an analog to digital converter that was research with its Reconfiguration Management Architecture as
on a computer VME bus with a lot of digital signal processors. well as many on-going papers in the industry.
The transmitter had digital to analog converters on the PCI bus Despite such a wide range of activities, and due to the
feeding an up converter (mixer) that led to a power amplifier complexity of the problem area there is still a wide area of
and antenna. The very wide frequency range was divided into a uncharted territory for fundamental research into re-
few sub-bands with different analog radio technologies feeding configurability and the various levels of SDR technology.
the same analog to digital converters. This has since become a Successful development of SDR equipments will still require a
standard design scheme for wide band software radios. huge amount of efforts in the next 5–10 years.
22
International Journal of Computer Applications (0975 – 8887)
Volume 4– No.8, August 2010
references for the model for its performance The other important reason for inability to calculate
evaluation in the real time functionalities. the through put of the system is that many of this
The implementation is done in SIMULINK because of the implementations are done in special Embedded
following reasons. platforms such as a PC running on Vx-Works. Vx-
The graphical user interface provided by the Simulink Works supports very small response time than
will be better to demonstrate the functioning of Windows operation systems offer so there will be fall
different key components such as CPUs and the in the performance of the system if it was
DSPs. implemented in Windows. This is the reason why Vx-
With MATLAB and SIMULINK it will be easy to Works running on a power PC is used as a standard
implement various Base Band signal operations. system for 4.5 Generation Fighter Aircrafts like
The S-function builder blocks can be used to function Rafale, F-18 Phalcon, Su-30 MKI etc.
exactly as we programmed them so the various The final goal of this paper is to demonstrate the
programming methodologies can be implemented on functionality of all the software blocks designed, as
them. this includes the transmission of large frames in real
The paper closely resembles to the Hardware time, it is not possible to visualize outputs at different
Implementation. stages completely only a part of the output is tapped
separately and plotted
24
International Journal of Computer Applications (0975 – 8887)
Volume 4– No.8, August 2010
802.11a standards the FEC used is convolutional Repeat this procedure until the code word reaches its
codes and are decoded using VERTIBRE algorithm. maximum length.
Then next comes modulation scheme, the modulation The main drawback of this procedure is that the
scheme used for WLAN is simple BPSK modulation. maximum length of the code word would be the
Then the next thing is adding noise to the modulated maximum or the greatest integer value and it cannot
signal, this is done by adding the AWGN through exceed it.
AWGN noise block and fading through importing the
signals to workspace, adding the noise in MATLAB 4.2.1.2 CRC Generation
and sending them back to the Simulink. Take the bits for which CRC is to be generated and
Then at the receivers end a Gaussian filter is used to store them in an array.
filter the AWGN noise, and since the fading is flat Select an appropriate polynomial for 16 bit and 32 bit
and it does not affect the signal much. CRC.
At the receiver the signal is again properly sampled Define another array of length 15 for 16 bit CRC and
and the timing mismatch is corrected if it is present 31 for 32 bit CRC; store the polynomial also into
anywhere. another array.
This is very important to note that the receiver XOR the first 16 bits of the data and store the
operations are completely different in a software remainder in the array just created for them.
defined radio. The reason is that all the Baseband Next add the next bit of the data array to the
Operations are done in software platform rather than remainder array as a last element and do the division
different sorts of hardware. It follows that the once again and repeat the above steps.
analogue to digital converter used at the receiver is Do these till the data is completely divided and the
connected directly to the DSP at the Front End of the CRC is obtained.
receiver. Normally a Pre/post processor should be
involved but this is omitted in the model.
4.2.1.3 Convolutional codes
According to the state transition diagram developed
4.1.2 Bluetooth on paper define a function which has a present state at
Relatively easy to implement. (0,0) and generates the output states according to the
Frame format for Bluetooth is simple compared to the state transition diagram.
WLAN protocol and moreover the only thing which is This is a very precise algorithm which works very
going to be implemented in the Bluetooth is point to efficiently and which is easy to implement.
point connection and no other complex tasks.
The decoding is done through Viterbi algorithm.
Bluetooth standard does not state any source coding
since the Bluetooth frame is relatively smaller.
Hamming codes are used for Bluetooth FEC. 4.2.1.4 BPSK Modulation.
Their channel modelling will be similar to that of Buffer all the data to be transmitted into an array.
WLAN but the SNR will differ and relatively the Pre define the carrier wave with suitable frequency of
Bluetooth channel suffers from less attenuation than the operation.
compared to the normal WLAN channel. Now if the coming input is 1 transmit the same wave
The key aspect in implementing Bluetooth is and if the input is zero phases shift the wave by
authentication. A simple authentication algorithm is simply multiplying it with -1.
used to implement the Bluetooth technology. This will give raise to BPSK modulation where one
symbol is represented by on wave.
4.2 Detailed implementation of above
4.2.1.5 Addition of noise
mentioned algorithms AWGN noise is added by passing the signal through
4.2.1 WLAN protocol AWGN block.
4.2.1.1 Source coding The fading is done by importing the signal to
Source coding is implemented using Lempel-Ziv coding. The workspace and modeling the samples of the input
detailed algorithm is given below. signals by the given Nakagami distribution.
Input all the bits coming from the source and store
them in an array. 4.2.1.6 Bluetooth
Increment the values of the bits by one, that is logical The important algorithms in Bluetooth are CRC, GFSK and the
one is represented as 2 and zero as 1. process of authentication.
Start three more arrays one for the code book, other
for the index and other for the maximum length of the 4.2.2 GFSK Modulation
code word. Algorithm to implement GFSK modulation is given as follows.
Consider the first bit, add it to the code book and log It is similar to FSK modulation except that the
1 into the Zero index of the index. Gaussian filter is used to shape the pulses of logical
Input next number. If it is different add it to the code Zeros and Ones before they are passed onto the FSK
book and increment the index and if it is same add modulator.
that number and the next number to the last two digits Here FSK generates two types of carrier waves and
of the third array, and the rest of the array must be according to the input data one wave is given to the
zeros. Multiply all the elements of the array with output for FSK modulation.
increasing powers of 10 starting from zero in the 4.2.2.1 Authentication
direction of right to left and add the result to the
second array of the code book.
25
International Journal of Computer Applications (0975 – 8887)
Volume 4– No.8, August 2010
There are many algorithms for this purpose and one of the
common algorithms is, one node sends a challenge to the other
node.
The other node responds by sending back the same
received challenge for authentication from the first
node.
In this process this process is used for the process of
authentication.
As the Bluetooth is implemented only as one to one
communication there is no much complexity in Fig 4 Modulation scheme 2
implementing Bluetooth protocol as that of WLAN. BPSK modulation for the sample set of bit [1 0 0 1 1 1 0 1 1 0].
4.2.2.2 Hamming nodes
The generator matrix of a hamming code of [n,k] is a 5.2 Effect of noise on the BPSK modulation for
kXn matrix and the. The generator matrix for the dual
code is (n-k)Xk matrix.
different values of channel parameter m
The check matrix is an nXk matrix.
The K-bit message is multiplied by the generator
matrix and on the receiving end the generated code
word is again multiplied by the check matrix.
The decimal equivalent of the obtained number tells
us where the error has occurred.
.
Fig 3 Modulation scheme 1
BPSK modulation for sample set of bits[1 0 0 1 1 1 0 1 1 0].The Fig 8 BPSK modulation with m=4
sample PSK at 1 MHz and 2MHz is given below.
So from the above plots it is clear that as the value of m is
increasing the noise level of the signal also decreases.
Now the smoothened signal for m=4 is shown below
26
International Journal of Computer Applications (0975 – 8887)
Volume 4– No.8, August 2010
6. CONCLUTION
Transceivers for the communication standard can be
implemented in a pure software platform than the
prevailing architectures.
This implementation will narrow down the differences
between the equipment currently in the present day
market.
Users will be greatly benefited from the equipment
built using the SDR platform as they support multiple
Fig 9 Smoothened signal for m=4 communication standards with the same given
hardware.
The following inferences can be made. There will be no need of buying multiple
Since the fading is flat as explained in the chapter II, equipments for multiple purposes as one equipment
the characteristics of the signal are preserved and are can take care of all the things.
not distorted. Active research is being carried out in this area and
This clearly implies that impulse of the signal does much commercial SDR equipment for different
not change and the original message can be retrieved applications is available for commercial use. Presently
or the signal can be used for demodulation without their costs are very huge.
any problem. In the near future all the mobiles, talkies that are used
Small adjustments for the timing synchronization can will become more and more flexible and tend towards
be made in the receiver. SDR platform rather than the traditional architectures
Since an SDR platform is used it is very easy achieve being used now.
timing synchronization using various techniques. With the advancements made in VLSI and the
5.3 BER curve on m-Nakagami channel microprocessors fields the architecture of an SDR
becomes simplified rapidly.
A day will come where a single transceiver can act as
all in one and can be used as a mobile phone which
can support both GSM and CDMA, which can also be
connected to a WLAN access point, which has got
Bluetooth connectivity, which can receive FM signals
and work as FM radio etc.
7. ACKNOWLEDGMENT
I wish to thank all the co authors who have supported me to a
great extent. I also wish to thank VIT University for providing
us excellent support.
27