Orthogonal Frequency Division Multiplexing (OFDM)
Leow Min Huay Amy
Nanyang Technological University
School of Electrical and Electronic Engineering
Information Engineering and Media (IEM) leow0097@e.ntu.edu.sg U1422183H Abstract — This EE4152/IM4152 research report gives an overview of the concepts on Orthogonal Frequency Division Multiplexing (OFDM). It provides a summary of the advantages and disadvantages of OFDM.
Keywords --- frequency division multiplexing, intersymbol interference, modulation, orthogonal
I. INTRODUCTION
Orthogonal Frequency Division Multiplexing also known as OFDM in short, is one of the signal modulation formats that breaks a long stream of high data rate modulating stream into multiple slow modulated narrowband
…show more content…
Since the main issue with Code Division Multiple Access (CDMA) systems is complexity of channel equalization that is used across the entire channel. An OFDM uses many sub-channels, making it easy to apply channel equalization.
B. Disadvantages of OFDM
As far as we may know about the advantages of OFDM, there are also several disadvantages regarding the use of OFDM. Although OFDM is widely used, the disadvantages should also be taken into consideration. The disadvantages are OFDM has a high peak to average power ratio and it is sensitive to the carrier offset and drift.
i. High peak to average power ratio
There are noise such as amplitude variation in the OFDM signal with a high peak to average power ratio. It causes the efficiency of radio frequency amplifier to suffer because it will require the amplifiers to be linear in order to suit the different variations of the amplitudes. Hence, the amplifier is not able to operate in such high efficiency level.
ii. Sensitive to carrier offset and drift
Single carrier systems are not as sensitive to the carrier offset and drift as compared to OFDM.
V. PARAMETERS OF OFDM
A. Data
…show more content…
Flash OFDM is created by Flarion. Flash OFDM is a quick hopped type of OFDM. Flash OFDM applies to many tones and quick hopping to distribute signals through a spectrum band.
• OFDMA, A stands for Access. OFDMA is yet another variant of OFDM. It is a scheme used to deliver a multiple access capability for applications.
• Vector OFDM is commonly known as VOFDM. This type of OFDM applies the fundamental idea of MIMO (Multiple Input Multiple output technology). MIMO is created by CISCO Systems. MIMO applies to many antennas to transmitter’s and receiver’s signals. Therefore, multi-path effects improve reception of the signal and speed of transmission.
• WOFDM stands for Wideband OFDM. WOFDM uses the concept of OFDM by applying some gap between the channels. It is important to have a gap that is big enough to take in any frequency errors between transmitter and receiver so that it will not make any changes to performance of the system. WOFDM is used in Wi-Fi systems.
All types of OFDM use the same fundamental concept. They use orthogonal carriers which are close-spaced to one another. Those carriers carry low data rate signals. Hence, when it is in its demodulation phase, data will be added together to produce the whole complete
The SIFS( Shortest Inter-Frame Space),derives the time between the last transmission and high priority transmissions such as positive acknowledgments(ACKs),Clear-To-Send(CTS)frames,polling responses, continuation frames in a burst transmission. priority is given to the positive ACK frames so that a station which has just completed the reception of a frame can give immediate feedback to the sender. RTS and CTS frame coordinate correspondence between sets of stations so that different stations know not the medium to be free for the time of the exchange .This is one of the reasons for why the control frames have priority over normal data transmissions. If a station finished transmitting a frame and has enough time left to send an additional frame, it is allowed to send after a SIFS.
Assessment 3 – Assignment 1 Student Name: John Matanisiga Student ID No: S11124727 1. The difference between these wireless encryption is that WEP is wired equivalent privacy, a default procedure for wired security networks, WPA is an upgrade from WEP, and it is a wireless protected access to networks, whereas WPA2 is modernized into a more secure Wi-Fi from WPA. 2. With Static addressing, a computer (or other device) is configured to always use the same IP address, whereas dynamic addressing, the IP address can change periodically and is managed by a centralized network service.
a). Based on the observation, we assume that the distance between two stations is 0.375 KM Mean time to send = propogation time + transmission time = 375m. + 1000bits 200 x 106 m/sec. 10 000 000 bps. = 102 μsec. b).
WPA2 –Wi-Fi protected access version 2 This security was made because of the 802.11i wireless security standard. WPA2 is very similar to WPA but it uses AES – advanced encryption standard to encrypt. AES has a 128 bit key whereas DES – data encryption standard which was used before AES has a 64bit key. 64bit keys take a lot less time to break than 128bit key.
Describe GSM radio interface in terms of physical and logical channels. 4. Work out the sequence of signal transactions for a variety of communications scenarios such as mobile station switch-on, incoming/outgoing voice call, SMS and handover 5. Explain how a GSM/PCS/GPRS mobile set gets and remains synchronized to a base station 6. Explain why and how a mobile station conserve power 7.
Wifi WPS: It stands for “Wi-Fi Protected Setup” and provides simplified mechanisms to configure secure wireless
Wireless technology is used for data transmission. Wireless technology carries a particular information from one place to another. Examples of wireless technologies are a remote control because while you’re using it, it sends control commands information to your TV making you want to change the channel or record a particular programme. Another example of wireless technology is a wireless sound system because it sends audio information to speakers and headphones. Bluetooth is a wireless technology used for the exchanging of data over short distances.
This component is when you transmit any file from one computer to another computer, this is usually a much larger file. Most of the webs users would explain this simply as sending it to another computer that is set up to receive it or to send it up onto the internet where several people will be able to access it from their own computers. For example, YouTubers upload their videos on to the YouTube
Before each location data UDP transmission, device-side APIs are checked to assess the current level of cellular signal and determine if a
Network internet layer This can be used to set the border line of what people can think of about the network. With this layer it will be able to interconnect with networks and will decide how the layers can do this process. It will be able to can concentrate and determine how the data will get from one remote network to the computer. Also it will take care with devices which are local. This is mainly tasked to take care of is routing which allows data to be moved the data across the series of networks which are connected.
1. Symmetric encryption the keys should be changed frequently. They are shared between two peers, keys should be known only by the two members using them. So confidentiality is extremely important to key exchange. In-band key exchange takes place in the existing and established communication channel.
It’s an app that enables teleconferencing of members. Members can view each other and exchange audio during a meeting. This enhances communication and strengthens the bond between members. However, it requires technical know how and skills for effective usage of the app. 5.
Have you ever wonder how would it be to be extraordinary? To get out of our daily routines, and go discover new things and save lives. Well, that is what superheroes do on the daily basis other then having a family and work. As a child you see all Marvel, Imagine Comics, Dark Horse, IDW Comics and D.C. Comics super heroes having wonderful powers like flying like superman, running fast like the flash, being invisible like Violet Parr, or ever mind control like Professor X. But why limit yourself to one superpower?
Next, the company uses High Speed Downlink Packet Access (HSDPA) to enhance the high speed 3G network in which promoting wireless broadband services. Other than that,