Anda di halaman 1dari 35

Gemini Communication Ltd.

Innovation & Leadership

Basics of RF Technology
Ref. 1040001100

Gemini Communication Company Confidential

Ver 1.0

www.gcl.in

WIMAX BASICS

Gemini Communication Company Confidential

Ver 1.0

www.gcl.in

Introduction
Broadband Wireless concept Evolution of WiMAX

Data as on June,06

Ver 01
Ver 1.0

3
www.gcl.in

Gemini Communication Company Confidential

What is Access
System designed to transfer signals from their point of generation (the user), to the first node of the (transport) network is known as Access System
user Access System Access System user Operator / ISP Network
m yste ss S Acce

user

user

Data as on June,06

Ver 01
Ver 1.0

4
www.gcl.in

Gemini Communication Company Confidential

Broad band Wireless Access Point to Multi point Features

Base station serving many customers Distribute costs over large number of users Typically data rates in excess of 256 kbps per Customer Line of Sight Technology

Data as on June,06

Ver 01
Ver 1.0

5
www.gcl.in

Gemini Communication Company Confidential

Prevailing Wireless Access Technologies

Local Multipoint Distribution Services (LMDS) Multi-channel Multipoint Distribution Services (MMDS) W-CDMA TD-CDMA Wi-Fi

Data as on June,06

Ver 01
Ver 1.0

6
www.gcl.in

Gemini Communication Company Confidential

What is WiMAX
Worldwide Interoperability for Microwave Access (WiMAX) is the common name associated to the IEEE 802.16a/d/e standards that originally covered the Wireless Local Loop technologies with radio spectrum from 10 to 66 GHz. The technology on which we are working is IEEE 802.162004/d

Why WiMAX
Standard based (IEEE 802.16 Series of Standards) Lower Cost Ensures compatibility and interoperability Better Performance & Coverage
Data as on June,06

Ver 01
Ver 1.0

7
www.gcl.in

Gemini Communication Company Confidential

IEEE 802.16 Broadband Access System Concept


WAN (Internet / Intranet) Base Station (BS) Subscriber Station (SS) LAN user user user user

LAN

user user

Traffic is generated as Service Flows (SF)

Service Flow is a flow of packets to which specific QoS level is guaranteed Service Flows and their associated QoS parameters are defined before the operation of the network, but can also be modified, added or deleted during operation. Packets are identified as belonging to a specific Service Flow based on Connection Identifier CID CID is used by Subscriber Stations (SS) to request uplink bandwidth grants from Base Station (BS) Data as on June,06

Ver 01
Ver 1.0

8
www.gcl.in

Gemini Communication Company Confidential

Ways of providing Broadband Access?


Copper Wire (DSL) Optical Fiber Cable Wireless Access System. Satellite Communication System

Why Broadband Wireless Access ?


Lower Capital Expenditure Lower Operational Expenditure Faster Deployment Time Scalable & Easy Relocation

Data as on June,06

Ver 01
Ver 1.0

9
www.gcl.in

Gemini Communication Company Confidential

Evolution of Standards
IEEE 802.16 (2001) Air Interface for Fixed Broadband Wireless Access System MAC and PHY Specifications for 10 66 GHZ (LoS) One PHY: Single Carrier Connection-oriented, TDM/TDMA MAC, QoS, Privacy

IEEE 802.16a (January 2003)


Amendment to 802.16, MAC Modifications and Additional PHY Specifications for 2 11 GHz (NLoS) Three PHYs: OFDM, OFDMA, Single Carrier Additional MAC functions: OFDM and OFDMA PHY support, Mesh topology support, ARQ

IEEE 802.16d (July 2004)


Combines both IEEE 802.16 and 802.16a Some modifications to the MAC and PHY

IEEE 802.16e (November 2005)


Amendment to 802.16-2004 MAC Modifications for limited mobility
Data as on June,06

Ver 01
Ver 1.0

10
www.gcl.in

Gemini Communication Company Confidential

WiMAX Technology Description

Data as on June,06

Ver 01
Ver 1.0

11
www.gcl.in

Gemini Communication Company Confidential

Modulation
Modulation is the process by which a carrier wave is able to carry the message or digital signal (series of ones and zeroes). There are three basic methods to this:Amplitude, Frequency Phase shift keying

Data as on June,06

Ver 01
Ver 1.0

12
www.gcl.in

Gemini Communication Company Confidential

Binary Phase Shift Keying (BPSK)


BPSK is the simplest form of PSK. It uses two phases which are separated by 180and so can also be termed 2-PSK. It does not particularly matter exactly where the constellation points are positioned It is, only able to modulate at 1bit/symbol and so is unsuitable for high data-rate applications.

Data as on June,06

Ver 01
Ver 1.0

13
www.gcl.in

Gemini Communication Company Confidential

Quadrature Phase-shift Keying (QPSK)


Sometimes known as quaternary or quadriphase PSK or 4PSK, QPSK uses four points on the constellation diagram, equispaced around a circle. With four phases, QPSK can encode two bits per symboltwice the rate of BPSK. This is used either to double the data rate compared to a BPSK system while maintaining the bandwidth of the signal or to maintain the data-rate of BPSK but halve the bandwidth needed. BPSK is used on both carriers and they can be independently demodulated.

Data as on June,06

Ver 01
Ver 1.0

14
www.gcl.in

Gemini Communication Company Confidential

16-QAM,64-QAM
The number before QAM (for example 16QAM) refers directly to the number of decision points in the constellation. Meaning, 256QAM has 192 more decision points than 64QAM. The number before QAM is also always a power of two. (EG. 2^6=64QAM) The more Decision points, the more throughput per channel. The more Decision points, the more susceptible the channel is to noise (as the decision boundaries get smaller to accommodate more decision points, it becomes harder to distinguish which boundary the point was intended to lie in). More Decision points=More Bandwidth=Higher susceptibility to noise or poor signal (the same applies inversely as well). Deliver the same number of customers incrementally faster speeds.-orDeliver a larger number of customers the same speeds as before.
Data as on June,06

Ver 01
Ver 1.0

15
www.gcl.in

Gemini Communication Company Confidential

Adaptive Modulation
The use of the highest order modulation depending on the channel conditions. In addition, adaptive modulation allows the system to overcome fading and other interference.

Data as on June,06

Ver 01
Ver 1.0

16
www.gcl.in

Gemini Communication Company Confidential

Adaptive Modulation

Data as on June,06

Ver 01
Ver 1.0

17
www.gcl.in

Gemini Communication Company Confidential

Radio Propagation
Received signal is made from a combination of : Direct path (LOS) Reflected path (NLOS) Diffracted signal (NLOS)

Data as on June,06

Ver 01
Ver 1.0

18
www.gcl.in

Gemini Communication Company Confidential

Line Of Sight & Near Line of Sight


For LoS First Fresnel Zone should be clear of any
obstructions (at least 60% area)

This requires both BS and SS to be placed outdoor In case of any obstruction in the transmission path then
30% clearance of FFZ may be taken and is known as Near LOS

Data as on June,06

Ver 01
Ver 1.0

19
www.gcl.in

Gemini Communication Company Confidential

Line Of Sight & Near Line of Sight

First Fresnel Zone


0 dB 0 dB 6dB 16dB 20dB

Data as on June,06

Ver 01
Ver 1.0

20
www.gcl.in

Gemini Communication Company Confidential

Non-Line Of Sight (NLOS)

Both LOS and NLOS coverage conditions are governed by the propagation characteristics of their environment, path loss, and radio link budget The NLOS technology and the enhanced features in WiMAX make it possible to use indoor customer premise equipment (CPE). This has two main challenges:-

Overcoming the building penetration losses and Covering reasonable distances with the lower transmit powers and antenna gains that are usually associated with indoor CPEs.

Data as on June,06

Ver 01
Ver 1.0

21
www.gcl.in

Gemini Communication Company Confidential

Non-Line Of Sight (NLOS)


Signal reaches the receiver through reflections, scattering, and diffractions. These signals have different delay spreads, attenuation, polarizations, and stability relative to the direct path. NLOS technology also make CPE installation easy & less expenses The technology also reduces the need for pre installation site surveys.

Data as on June,06

Ver 01
Ver 1.0

22
www.gcl.in

Gemini Communication Company Confidential

THE HEART OF WiMAX

OFDM - Orthogonal Frequency Division


Multiplexing

Data as on June,06

Ver 01
Ver 1.0

23
www.gcl.in

Gemini Communication Company Confidential

FDM & OFDM

FDM

OFDM
+

Data as on June,06

Ver 01
Ver 1.0

24
www.gcl.in

Gemini Communication Company Confidential

OFDM orthogonal subcarrier packing

Conventional FDM

Significant bandwidth saving spectral efficiency

Orthogonal FDM Data as on June,06

Ver 01
Ver 1.0

25
www.gcl.in

Gemini Communication Company Confidential

Orthogonal Frequency Division Multiplexing

Signals are orthogonal if they are mutually independent of each other.

OFDM: a form of MultiCarrier Modulation & Multiplexing technique. Different symbols are transmitted over different SUBCARRIERS. Spectra overlap, but signals are orthogonal.

The basic idea is that each bit occupies a frequency-time window which ensures little or no distortion of the waveform
Data as on June,06

Ver 01
Ver 1.0

26
www.gcl.in

Gemini Communication Company Confidential

OFDM technology

28 Guard carriers on left 27 on right 8 pilots 1 DC and 192 data sub carrier
Data as on June,06

Ver 01
Ver 1.0

27
www.gcl.in

Gemini Communication Company Confidential

OFDM operation
OFDM is a multicarrier block transmission system Conversion of a high-data rate stream into several low-rate streams Parallel streams are modulated onto orthogonal carriers
Data symbols modulated on these carriers can be recovered without mutual
interference Overlap of the modulated carriers in the frequency domain - different from FDM

Block of N symbols are grouped and sent parallely No interference among the data symbols sent in a block

Data as on June,06

Ver 01
Ver 1.0

28
www.gcl.in

Gemini Communication Company Confidential

Cyclic Prefix

Environment with multi path will have large delay requires in two signals Cyclic prefix provide immunity to multi-path channel distortion protection against time-offset errors (FFT) It is channel BW dependent Low spectrum efficiency Fraction of the OFDM symbol length (1/4, 1/8, 1/16 or 1/32). The sub-carriers are converted by IFFT to a time domain signal A guard interval (cyclic prefix) is added to collect multi path OFDM/OFDMA enable handling peak delay spread as large as the Cyclic Prefix

Data as on June,06

Ver 01
Ver 1.0

29
www.gcl.in

Gemini Communication Company Confidential

Before link budget calculation: decibel definition


Pout mW G= = Pin mW
Gain is a referenced Value without measurements units Pin G=? Pout

When trying to calculate cascade amplifiers in most cases it will be difficult using the linear way (long numbers and most of the time not round ones).This is the reason for working in decibels. G=10Log(Pout/Pin) [dB]

Pin

Pout

Power measurements units in a logarithmical world is dBm (in reference to 1mW) or dBW (in reference to 1W). 1mW = -30dBW = 0dBm 1W = 0dBW = 30dBm

1 = 0 dB 2 = 3 dB 3 = 4.7 dB 4 = 6 dB 5 = 7 dB 6 = 7.7 dB 7 = 8.5 dB 8 = 9 dB 9 = 9.5 dB 10 = 10 dB

A reminder

Log ( A B) = LogA + LogB


Data as on June,06

Ver 01
Ver 1.0

30
www.gcl.in

Gemini Communication Company Confidential

Link budget calculation


Represents performance of a system Must cover complete signal path Can help you estimate coverage (distance) Simple tools (excel) available for manual calculation

Data as on June,06

Ver 01
Ver 1.0

31
www.gcl.in

Gemini Communication Company Confidential

Link Budget Calculations


Transmitter Power output

Cable

Cable Loss Gain Path Loss

Antenna

Antenna Gain Cable Cable Loss

Receiver
Data as on June,06

Sensitivity

Ver 01
Ver 1.0

32
www.gcl.in

Gemini Communication Company Confidential

Link Budget
For correct operation:

Pr interference + SNR

Power received

Power received

Sensitivity Sensitivity SNR SNR SNR

Required received power

Noise floor Noise floor


{thermal noise + implementation noise (NF)}

External interference

Calculating receiver sensitivity

(Note: SNR is a function of rate; values range from 5 dB to 30 dB)

Data as on June,06

Ver 01
Ver 1.0

33
www.gcl.in

Gemini Communication Company Confidential

Q&A

Data as on June,06

Ver 01
Ver 1.0

34
www.gcl.in

Gemini Communication Company Confidential

Thank You
Contact : info@gcl.in
Data as on June,06

Ver 01
Ver 1.0

35
www.gcl.in

Gemini Communication Company Confidential

Anda mungkin juga menyukai