Beruflich Dokumente
Kultur Dokumente
1-4244-0330-8/06/$20.00©2006 IEEE
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:12 from IEEE Xplore. Restrictions apply.
The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06)
listed in Table.1 [1]. For later purpose, they are numbered as Where PER is packet-error-rate, Thrptmax is the maximum
mode 1 to mode 7. throughput which is a function of the air interface option and
channel bandwidth. The maximum throughputs of all the
Table 1: Mandatory modulation/coding modes
modes under the simulation settings in Table 2 are listed in
Mode. Modulation Block size (bytes) RS code CC Table 3.
No. Uncoded Coded code rate
1 BPSK 12 24 (12,12,0) 1/2 Table 3: Maximum throughput for seven modes
2 QPSK 24 48 (32,24,4) 2/3
3 QPSK 36 48 (40,36,2) 5/6
Mode 1 2 3 4 5 6 7
4 16-QAM 48 96 (64,48,8) 2/3 Thrptmax(Mbps) 1.2 2.4 3.6 4.8 7.2 9.6 10.8
5 16-QAM 72 96 (80,72,4) 5/6
6 64-QAM 96 144 (108,96,6) 3/4 At the receiver side, jamming is added to the specified
7 64-QAM 108 144 (120,108,6) 5/6 subcarriers with varying signal-to-jamming ratio (SJR) val-
ues. Assume that at the receiver side a total power of Jtot
One OFDM symbol can be divided into two parts in time
jamming is distributed evenly over m subjammers, where m is
domain: the cyclic prefix (CP) time Tg and the useful symbol
equal to the number of subcarriers need to be jammed. The
time Tb. The cyclic prefix locates in the beginning of the
power of one subjammer is J 0 = J tot m . SJR is defined as
symbol and is a duplication of the tail of the useful symbol,
which is introduced to mitigate the effect of multipath. In Eb Eb
frequency domain, an OFDM symbol is composed of a series SJR(linear ) = = (2)
NJ J0 W
of subcarriers. In WirelessMAN-OFDM PHY, the number of
subcarriers is 256. As shown in Fig. 1 [1], three types of sub- where Eb is the signal energy per bit, NJ is the power spectral
carriers can be categorized: 192 data subcarriers carrying pay- density, and W stands for the bandwidth of one subjammer.
load, 8 pilot subcarrier mainly for channel estimation, and 56 Depending on the number of jammed subcarriers, several
null subcarriers for guarding purpose. The pilot subcarriers jamming scenarios are tested. They are: four scenarios multi-
distribute evenly among the data subcarriers. tone pilot jamming where 1/2/4/8 pilot(s) is(are) jammed;
three scenarios partial band jamming where 30%, 50% and
100% of the total 200 non-null subcarriers are continuously
jammed from the left most side (refer to Fig. 1). For each
scenario, all the modes in Table.1 are tested with SJR varying
from 1 to 40dB. For every mode under one SJR value jam-
ming, 106 information bits are transmitted through the chan-
Figure 1: OFDM symbol Frequency domain description nel. After data recovery, the packet error rate is recorded and
Channel estimation is mandatory for the OFDM systems the throughput is calculated.
employing coherent detection. Comb type pilot channel esti-
mation [8] is capable of collecting instant information of the IV. SYSTEM PERFORMANCE UNDER JAMMING
channel and therefore used in this research. The channel esti- With the obtained simulation results, the performance of
mation for the payload subcarriers is achieved by interpola- the system is investigated in terms of throughput.
tion, using the channel information obtained at the 8 pilot
subcarriers. A. Performance Comparison in Single Jamming Scenario
The simulation result for 8 pilots jamming is chosen as exam-
III. SIMULATION ple and shown in Fig. 2. The performances of the other six
The computer simulation in this paper is carried out by Monte scenarios are similar.
Carlo method with the aid of Matlab. Besides jamming, the 12
Mode 1
system in the simulation is subjected to multipath fading and 11 Mode 2
Mode 3
additive white Gaussian noise. The multipath channel is simu- 10 Mode 4
Mode 5
9 Mode 6
lated as a frequency selective, slow fading channel by snap- 8
Mode 7
Throughput(Mbps)
listed in Table.2. 6
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:12 from IEEE Xplore. Restrictions apply.
The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06)
tion is mode 3 (QPSK 5/6), its throughput curve intersects the operating in mode 2 tolerates 25 times more jamming power
throughput curve of mode 2 (QPSK 2/3) at higher SJR value than that in mode 6.
than the throughput curve of mode 4 (16QAM 2/3). As the
Table 4: Power of jamming when Thrpt / Thrptmax = 10%
result, mode 3 (QPSK 5/6) never becomes the most efficient
mode, which holds true for all the other jamming scenarios. It Jam Jam Jam Jam
suggests that the influence of Hamming distance is larger than Mode 1 pilot 2 pilots 4 pilots 8 pilots
that of minimum Euclidean distance in the corresponding SJR 1 never never never 0.1600
range. Similar phenomenon has been also reported in other 2 never 0.1000 0.0320 0.0200
papers such as [6]. 3 never 0.0260 0.0180 0.0100
4 never 0.0165 0.0135 0.0055
B. Performance Comparison between Multitone Pilot Jam- 5 0.0065 0.0034 0.0024 0.0019
ming and Partial-Band Jamming 6 0.0063 0.0018 0.0009 0.0006
In order to reveal the performances of the systems in dif- 7 0.0013 0.0009 0.0008 0.0003
ferent jamming environment, comparisons among the seven Jam Jam Jam
jamming scenarios are made. The performances of the rela- Mode 30% Bd. 50% Bd. 100% Bd.
tively robust mode 2 (QPSK-2/3) and the relatively weaker 1 never never 0.6800
mode 6 (64-QAM 3/4) are chosen as examples. Their 2 0.2050 0.1750 0.1950
3 0.0760 0.0804 0.1040
throughputs versus jamming power are plotted in Fig. 3 and
4 0.0820 0.0580 0.0560
Fig. 4. The throughput is presented in percentage which is the
5 0.0195 0.0190 0.0240
ratio of actual throughput to the maximum throughput of the
6 0.0082 0.0074 0.0078
corresponding mode. The total jamming power ‘1’ is the 7 0.0042 0.0040 0.0049
power used in 100% bandwidth jamming. The results for For the scenario ‘Jam 1 pilot’, the tolerances of the sys-
other modes are similar. tems operating in mode 1 to 4 present ‘saturation’ characteris-
100%
Jam
Jam
1 pilot
4 pilots
Jam 2 pilots
Jam 8 pilots
tic: after the jamming reduces the throughputs to a certain
level, the system is insensitive to the increase of jamming
90% Jam 30% Bd. Jam 50% Bd.
Jam 100% Bd.
80%
power and the throughput remains almost constant. It shows
70%
that ‘jam 1 pilot’ is mild for system with strong modula-
Thrpt/Thrptmax x100%
60%
50%
tion/coding modes. Actually, mode 1 (BPSK 1/2) presents
40%
‘saturation’ characteristic to most of the jamming scenarios
30%
except ‘Jam 8 pilots’ and ‘Jam 100% bandwidth’, suggesting
20%
that this newly added operation mode (not specified in
10%
IEEE802.16a-2003) is necessary and endows more robustness
0%
for the system.
0 0.05 0.1 0.15 0.2 0.25 0.3
Power of Jamming
0.35 0.4 0.45 0.5
Before the throughput decreases to 10% of the maximum
throughput, the system performances under partial band jam-
Figure 3: Throughput performance of mode 2 ming are always superior to those under multitone pilot jam-
under seven jamming scenarios ming. As shown in Fig. 3 and 4, the throughput curves of the
100%
two categories jamming form an area which looks like an eye
Jam 1 pilot Jam 2 pilots
90%
Jam 4 pilots
Jam 30% Bd.
Jam 8 pilots
Jam 50% Bd.
shape, whose width represents the throughput difference be-
Jam 100% Bd.
80% tween them. The wider the ‘eye’ opens, the bigger the
70% throughput difference is. The width of ‘eye’ opening dimin-
Thrpt/Thrptmax x100%
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:12 from IEEE Xplore. Restrictions apply.
The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06)
the increased power of subjammer is the major factor for the situation: link 1 is the transmission between the transmit-
jamming severity; when the jamming power is high, the se- ter and the receiver. It maintains fixed; link 2 is the transmis-
quence reverses into: 30%, 50%, 100% bandwidth jamming. sion between the jammer and the receiver. It decreases as the
At this stage, the increased number of jammed subcarriers is jammer approaches the receiver.
the major factor that adverse the system performance. There
is a transition between the two stages, during which the ef-
Link 1, d1
fects of two factors are comparable.
Link 2, d2
V. LINK ADAPTATION
Jammer
Receiver Transmitter
Based on the system performance evaluations above, one link
adaptation algorithm is proposed and its effectiveness is dis- Figure 5: Jamming scenario assumption
cussed in this section. As the jammer approaches the receiver, we assume the
A. Algorithm SJR to be a function of d 22 . In the testing, we choose 15811m
The key issue for a link adaptation algorithm is to select and 500m as the maximum and minimum value of d2, such
channel quality metric. It must be an applicable and fair pa- that after 150000 trials the SJR for scenario ‘jamming 100%
rameter that is able to reflect the quality of the channel. When bandwidth’ changes from 30dB to 0dB. As the total jamming
the reported value of the channel quality metric is outside the power is fixed, the SJR locuses for other six jamming scenar-
specified range of the current operation mode, the system will ios are different and drawn in Fig. 6 as well.
30
adapt to another stronger/weaker mode. In this research the
channel quality metric is chosen to be mean carrier-to- 20
N −1
∑ s[k , n]
2 Figure 6: Assumed SJR changing locuses for seven scenarios
CINR[k ] = n=0 (2) The system performance under such a jamming environ-
N −1
∑ r [k , n] − s [k , n ]
2
ment is simulated with and without link adaptation algorithm.
n =0
The simulation parameters are the same as in Table 2. Each
where r[k,n] is the n-th received sample within message k,
run of simulation lasts for 150000 trials, and in each trial 10
s[k,n] is the corresponding detected or pilot sample corre-
bursts are transmitted. When link adaptation is applied, the
sponding to symbol n. The mean CINR statistic is derived
system begins transmission with the most robust mode 1
from multiple samples of the single message:
(BPSK 1/2). Whenever reporting time is reached, the mean
CINR[0] k=0 CINR is reported based on the previous 10 history values by
µ CINR [k ] = (3)
(
1 − α )
µ
avg CINR [k − 1] + α avg CINR[k ] k >0 (3), and compared with specified CINR thresholds. According
to the result, the system decides the operation mode for the
k is the time index for the message. αavg is an averaging pa- next ten trials. The CINR thresholds are the throughput inter-
rameter in the range of [0, 1] which is specified by base sta- sections from curves ‘throughpout vs. CINR’ which obtained
tion. µ CINR [k ] is the actual value that can be obtained from from simulations like the previous one but without jamming.
the subscriber station, The link adaptation algorithm is tested for seven jam-
Another consideration for the link adaptation algorithm is ming scenarios. The result for jamming 100% bandwidth is
reporting time, which refers to the time period between two shown in Fig. 7. The results for the other six scenarios are
continuous checking of the channel quality. The principle for similar.
selecting the length of reporting time is: neither too short to In Fig. 7, the performance of system with link adaptation
waste radio resource, nor too long to fail the channel condi- is compared with the systems operating with fixed modes. As
tion tracking. Here it is set to be 10 bursts where every burst the distance d2 decreases, the jamming to the receiver in-
is assumed to contain one OFDM symbol. creases, the throughputs degrade accordingly. The through-
puts of systems with fixed mode are presented by thin lines in
B. Jamming Environment for Test the figure. They obtain the highest throughput alternatively
To measure the performance of proposed link adaptation al- but none of them can persist through the entire simulation
gorithm in jamming environment, we conceive a simple case time. In other words, the system performance is not opti-
as shown in Fig. 5. We assume a jamming source, for in- mized. However, when link adaptation is applied, the
stance, an airplane, moves straightly towards the receiver at a throughput is almost the envelope of throughput curves of the
very high and constant speed. There are two connections in
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:12 from IEEE Xplore. Restrictions apply.
The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06)
12 http://www.WiMAXforum.org/news/press_releases/Telephony_WiMAX
with LA
fix mode
fix mode
1
2
.pdf , last visit on May 26, 2006
10 fix mode 3
fix mode
fix mode
4
5 [3] Karhima, T.; Silvennoinen, A.; Hall, M.; Haggman, S.-G.; “IEEE
fix mode 6
802.11b/g WLAN tolerance to jamming”,
Throughpout (Mbps)
fix mode 7
8
Military Communications Conference, 2004. Volume 3, 31 Oct.-3 Nov.
6 2004 Page(s):1364 - 1370 Vol. 3
[4] Li Juan, Edward Mutafungwa, “Rate adaptation of convolutional coded
4
optical CDMA systems for improved goodput”, Optics Communications,
Vol 240/4-6 (2004) pp 315-327.
2
[5] Queseth, O.; Gessler, F.; Frodigh, M. “Algorithms for link adaptation in
0 GPRS.”, Vehicular Technology Conference, 1999 IEEE 49th, Volume: 2
14500 12500 10500 8500 6500 4500 2500 500
Distance (m)
, 1999 Page(s): 943 -947 vol.2
[6] Daji Qiao; Sunghyun Choi; Shin, K.G.; “Goodput analysis and link
Figure 7: Throughput performance of link adaptation and seven adaptation for IEEE 802.11a wireless LANs”, Mobile Computing, IEEE
fixed modes in 100% bandwidth jamming, αavg = 0.5. Transactions on Volume 1, Issue 4, Oct.-Dec. 2002 Page(s):278 - 292.
[7] Ramachandran, S.; Bostian, C.W.; Midkiff, S.F.; “A link adaptation
seven fixed modes as shown by the bold line. The system algorithm for IEEE 802.16”, Wireless Communications and Networking
obtains higher average throughput than any of the fixed mode. Conference, 2005 IEEE Volume 3, 13-17 March 2005 Page(s):1466 -
It proves that the link adaptation algorithm implemented in 1471 Vol. 3
this research gives satisfactory performance. [8] Coleri, S.; Ergen, M.; Puri, A.; Bahai, A.; “Channel estimation tech-
It is noticed that ideal link adaptation should produce niques based on pilot arrangement in OFDM systems”, Broadcasting,
throughput curve exactly as the envelope the seven curves, IEEE Transactions on, Volume 48, Issue 3, Sept. 2002 Page(s):223 -
229
practically it can never be reached due to unavoidable mis-
judgement. The imperfect portion of the link adaptation curve
is very small in our simulations. It confirms that the link ad-
aptation algorithm adopted here is efficient enough.
The improved system performance with link adaptation
proves its ability to resist jamming.
VI. CONCLUSION
In this paper, the performance of IEEE802.16-2004 based
system under both multitone pilot and partial-band jamming
are evaluated with the aid of computer simulations. The re-
sults show that the simulated throughput versus jamming
power curves descends faster for weaker modulation/coding
modes, indicating that weaker modes possess lower tolerance
to jamming. Saturation phenomena to most of the jamming
scenarios are observed for system operating with mode BPSK
1/2. It proves the necessity and robustness of this newly de-
fined operation mode.
Multitone pilot jamming affects the system more severely
than partial-band jamming under the same jamming power. In
multitone pilot jamming, the number of jammed pilots de-
cides the jamming severity and jamming 8 (full) pilots de-
grades the system to the most. In partial band jamming, sys-
tem performance is degraded by either increased power of
subjammer or increased number of subjammer, depending on
the level of jamming power.
A mean carrier-to-interference-noise ratio (CINR) based
link adaptation algorithm is accordingly proposed. The simu-
lated throughput curves for link adaptation almost matches
the envelope of the throughput curves for fixed modula-
tion/coding mode. This means that the system performance is
optimized and the tolerance to jamming is enhanced.
REFERENCES
[1] IEEE std 802.16-2004, ™ IEEE Standard for Local and metropolitan
area networks Part 16: Air Interface for Fixed Broadband Wireless Ac-
cess Systems, The Institute of Electrical and Electronic Engineers, Inc.,
October 1, 2004.
[2] Dan O’Shea, “A Standard Argument: Why WiMAX will Rule”, [Online].
Available:
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on May 28, 2009 at 21:12 from IEEE Xplore. Restrictions apply.