BER AND SIMULATION OF OFDM MODULATOR AND DEMODULATOR FOR WIRELESS BROADBAND APPLICATIONS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
With the rapid growth of digital wireless communication in recent years, the need for high speed mobile data transmission has increased. New modulation techniques are being implemented to keep up with the desired more communication capacity. Processing power has increased to a point where OFDM has become feasible and economical. Some examples of current applications using OFDM include DVB (Digital video broadcasting), DAB (Digital audio broadcasting), and HDTV (high - definition television).OFDM as a transmission technique has been known having a lot of strengths compared to any other transmission technique, such as its high spectral efficiency, its robustness to the channel fading. Orthogonal. frequency division multiplexing (OFDM) has become very popular, allowing high speed wireless communications. Orthogonal frequency division multiplexing (OFDM) has become very popular, allowing high speed wireless communications. A basic OFDM system consists of a QAM or QPSK modulator, a serial to parallel data, and an IFFT and FFT module, Guard interval inserter, in phase and quadrature phase signal generator, and parallel to serial data. In this thesis I have implemented the OFDM modulator and demodulator by using different types of digital modulation techniques such as BPSK, QPSK, 8-QAM. BER for OFDM by using 8-QAM,16-QAM, 64-QAM . MATLAB environment was used for simulation of proposed algorithm.
Authors and Affiliations
V. SRIDHAR , M. V BRAMHANANDA REDDY 2 , M. NAGALAXMI
A COMPARATIVE BEAMFORMING ANALYSIS OF LMS & NLMS ALGORITHMS FOR SMART ANTENNA
Beamforming is a technique of directional signal transmission and recitation. Now a days, because of an increasing demand on wireless communication (like RADAR, satellite communication, mobile communication, broadcast...
Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors
Because of the increasing of networks’ speed and the amount of network traffic, it is essential that IDSs need to be lightweight to cope with it before classification. Feature selection has been successfully used t...
Wireless Sensor Networks for Disaster Management
World is a happening ground for the disasters almost daily. These incidents of mass destruction irrespective of the whether natural calamities or man-made catastrophes cause a huge loss of money, property and lives...
Computaional Complexity Analysis on Water Quality Index
The computational algorithms are used to determine the features and applications from large data sets in real time environment. The computational applications are also used in environmental computing to evaluate th...
Product Recommendation Techniques for Ecommerce - past, present and future
With the advent of emerging technologies and the rapid growth of Internet, the world is moving towards e-world where most of the things are digitized and available on a mouse click. Most of the commercial transacti...