SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



    Statistical Multipath Signal Detection in CDMA for Ad hoc Network.
                     H. Umadevi1, K.S. Gurumurthy2, Chandrakanth Gowda3
                     1
                         Department of Electronics & Communication, Dr Ambedkar Institute of Technology
                                2
                                  Department of Electronics & Communication, UVCE, Bangalore
                                 3
                                   Department of Electronics & Communication, KSIT, Bangalore



Abstract:
Mobile ad hoc networks (MANETs) represent complex                     Characters and Fundamental Challenges of Wireless
distributed systems that comprise wireless mobile nodes                                 Ad-hoc Networks
that can freely and dynamically self-organize into arbitrary        Since Wireless Ad-hoc Networks are inherently different
and temporary, ‘‘ad-hoc’’ network topologies, allowing              from the well-known wired networks, it is an absolutely
people and devices to seamlessly internetwork in areas              new architecture. Thus some challenges raise from the two
with no pre-existing communication infrastructure, e.g.,            key aspects: self-organization and wireless transport of
disaster recovery environments. Ad hoc networking                   information [2], [3]. First of all, since the nodes in a
concept is not a new one, having been around in various             Wireless Ad-hoc Network are free to move arbitrarily at
forms for over 20years.Ad Hoc networks are multi-hop                any time. So the networks topology of MANET may
wireless networks where nodes may be mobile. These                  change randomly and rapidly at unpredictable times. This
types of networks are used in situations where temporary            makes routing difficult because the topology is constantly
network connectivity is needed. Ad hoc networks are                 changing and nodes cannot be assumed to have persistent
formed on a dynamic basis, i.e. a number of users may               data storage. In the worst case, we do not even know
wish to exchange information and services between each              whether the node will still remain next minute, because the
other on an ad hoc basis, in order to do this they will need        node will leave the network at any minute. Bandwidth
to form an Ad Hoc network. Multipath signal detection is            constrained is also a big challenge. Wireless links have
done using BPSK for CDMA Extended for OFDM and                      significantly lower capacity than their hardwired
calculated the BER and that signal is analyzed in Ad hoc            counterparts. Also, due to multiple access, fading, noise,
Network.                                                            and interference conditions etc. the wireless links have
                                                                    low throughput. Energy constrained operation. Some or all
Keywords: Ad hoc, BER, BPSK, CDMA, MANETs,                          of the nodes in a MANET may rely on batteries. In this
OFDM, SNR.                                                          scenario, the most important system design criteria for
                                                                    optimization may be energy conservation. Limited
I Introduction                                                      physical security: Mobile networks are generally more
It is important to evaluate the performance of wireless             prone to physical security threats than are fixed cable
devices by considering the transmission characteristics,            networks. MANETs are internetworks formed by mobile
wireless channel parameters and device structure. The               wireless routers, with each router having one or more
performance of data transmission over wireless channels is          associated host devices (e.g., computers and sensors). A
well captured by observing their BER, which is a function           MANET’s router implements routing protocols that—
of SNR [1] at the receiver. In wireless channels, several           unlike conventional routing techniques—tolerate rapid
models have been proposed and investigated to calculate             changes in connectivity among nodes. The paper is
SNR. All the models are a function of the distance                  organized as follows. Section II explains Rayleigh fading,
between the sender and the receiver, the path loss                  CDMA, and OFDM. Section III deals with the
exponent and the channel gain. Several probability                  implementation. Section IV deals with results and
distributed functions are available to model a time-variant         discussions. The paper is concluded in Section
parameter i.e. channel gain. The term ad hoc often means
improvised or for the needs o the moment for a specific             II Rayleigh Fading, Cdma, and Ofdm
purpose. In Computer networking, we                                 The Rayleigh fading is primarily caused by multipath
Think of ad hoc network as a wireless network. Without              reception [4]. Rayleigh fading is a statistical model for the
any infrastructure, e.g. wireless base                              effect of a propagation environment on a radio signal. It is
Stations. More thoroughly described, an ad hoc network              a reasonable model for troposphere and ionospheres signal
consists of a number of nodes with wireless                         propagation as well as the effect of heavily built-up urban
communication capabilities that potentially move around             environments on radio signals. Rayleigh fading [5] is most
and cause the network topology to change frequently.                applicable when there is no line of sight between the
                                                                    transmitter and receiver.
                                                                    Rayleigh fading is a statistical model for the effect of
                                                                    a propagation environment on a radio signal, such as that
                                                                    used by wireless devices. Rayleigh fading models assume
                                                                    that the magnitude of a signal that has passed through such
Issn 2250-3005(online)                                         September| 2012                               Page 1371
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5


a transmission medium (also called a communications                   2. Near Far Problem:
channel) will vary randomly, or fade, according to                    The problem is best described by taking and considering a
a Rayleigh distribution the radial component of the sum of            receiver and two transmitters (one close to the receiver;
two uncorrelated Gaussian random variables. Rayleigh                  the other far away). If both transmitters transmit
fading model: The Rayleigh fading is primarily caused by              simultaneously and at equal powers, then due to the
multipath reception. Rayleigh fading is a statistical model for       inverse square, the receiver will receive more power from
the effect of a propagation environment on a radio signal.            the nearer transmitter. This makes the farther transmitter
It is a reasonable model for troposphere and ionosphere               voice more difficult to understand. Since one
signal propagation as well as the effect of heavily built-up          transmission's signal than the farther transmitter, then the
urban environments on radio signals. Rayleigh fading is               SNR for the farther transmitter may be below detect
most applicable when there is no line of sight between the            ability and the farther transmitter may just as well not
transmitter and receiver.                                             transmit. This effectively jams the communication
                                                                      channel.
Rayleigh fading is a reasonable model when there are
many objects in the environment that scatter the radio                OFDM
signal before it arrives at the receiver. The central limit           Recently, a worldwide convergence has occurred for the
theorem holds that, if there is sufficiently much scatter, the        use of Orthogonal Frequency Division multiplexing
channel impulse response will be well-modeled as                      (OFDM) as an emerging technology for high data rates. In
a Gaussian process irrespective of the distribution of the            particular,    many     wireless    standards  (Wi-max,
individual components. If there is no dominant component              IEEE802.11a, LTE, and DVB) have adopted the OFDM
to the scatter, then such a process will have zero mean and           technology as a mean to increase dramatically future
phase evenly distributed between 0 and 2π radians.                    wireless communications. OFDM is a particular form of
The envelope of the channel response will therefore                   Multi-carrier transmission and is suited for frequency
be Rayleigh distributed.                                              selective channels and high data rates. This technique
In CDMA there is no restriction on time and frequency. In             transforms a frequency-selective wide-band channel into a
this scheme all the users can transmit at all times and at all        group of non-selective narrowband channels, which makes
frequencies, as shown in Fig 1. Because users are isolated            it robust against large delay spreads by preserving
by code, they can share the same carrier frequency,                   orthogonality in the frequency domain. Moreover, the
eliminating the frequency reuse problem encountered in                ingenious introduction of cyclic redundancy at the
other                                                                 transmitter reduces the complexity.
Technologies.
                                                                      Multicarrier modulation splits the broadband channel into
                                                                      a large number of (narrowband) sub channels. The total bit
                                                                      stream is divided over these sub channels. These bits are
                                                                      modulated per sub channel onto a subcarrier with standard
                                                                      narrowband modulation techniques like PSK or QAM.
                                                                      The sum of all the modulated subcarriers forms the
                                                                      composite multicarrier signal that is sent over the channel.
                                                                      When the subcarriers are orthogonal, the sub channels
                                                                      may overlap without interfering each other, resulting in a
           Fig1. Code Division Multiple Access                        high spectral efficiency (compared to e.g. frequency
Problems in Cdma Detection                                            division multiplexing, where all the sub channels are
There are two problems encountered in CDMA Detection                  separated by guard bands to prevent interference). The
                                                                      generation of these subcarriers is done in the digital
 1. Multipath Fading:                                                 domain, so that only one global local oscillator is needed
In a mobile environment, a mobile station will receive one            instead of one for each subcarrier. Normally the Fourier
direct signal from the base station and multiple signals              Transform is used.
which are reflected from obstructions like buildings and
towers as shown in Fig 4. Each signal would have traveled              A. Theoretical BER
a different length and would be displaced in time. Due to             The BER, or quality of the digital link, is calculated from
this, when they are combined at the mobile handset, it will           the number of bits received in error divided by the number
cause interference resulting in poor signal quality. This is          of bits transmitted.
known as fading. This problem is handled in a very good
way in CDMA. Here, the phase of the multiple signals is               BER= (Bits in Error) / (Total bits received).
modified such that only positive interference (addition)
takes place and the overall signal strength. A receiver that          In digital transmission, the number of bit errors is the
implements the above principle is known as RAKE                       number of received bits of a data stream over a
receiver.                                                             communication channel that has been altered due to noise,
                                                                      interference, distortion or bit synchronization errors. The
                                                                      BER is the number of bit errors divided by the total
Issn 2250-3005(online)                                            September| 2012                              Page 1372
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5


number of transferred bits during a particular time              spreading code, number of sub carriers 4, number of users
interval. BER is a unit less                                     15 and other parameters same as [6,8].

Performance measure, often expressed as a percentage [7].              B.   Simulation Results

The theoretical BER for BPSK modulation scheme over
Rayleigh fading channel (with AWGN noise) is given by




The theoretical BER for BPSK modulation scheme over
an AWGN channel is given here for comparison


                                                                         Figure 3.Eb/N0Vs BER
                                                                 The Simulated and theoretical performance curves (Eb/N0
 Eb / N0   BER in AWGN       BER in Rayleigh                     Vs BER) for BPSK modulation over Rayleigh Fading
                                                                 channel and the AWGN is shown in table and in figure2.
 -5 : 0    0.1064            0.1033
                                                                 III Implementation
 0: 5      0. 0952           0.0944                              Figure4. shows the generated signal from modulator is
                                                                 transmitted in multipath via Rayleigh fading[9,10] channel
 5: 10     0. 0578           0.0608                              and at the receiver side having highest received power
                                                                 signal is compared with threshold value and reordered in
 10: 15    0. 0235           0.0275                              descending order using statistical algorithm. The signal
                                                                 having highest receiving power is selected for BER
 15: 20    0. 0078           0.01
                                                                 calculation. The implementation here is considered for
                                                                 five channels. In this paper, one of the important topic in
 20 : 25   0. 0025           0.0029
                                                                 wireless communications that is the concept of fading[11-
Table 1. BER in AWGN and Rayleigh fading channel                 13] is demonstrated by the approach available in
                                                                 MATLAB. Simulink is a graphical extension to MATLAB
The following model is used for the simulation of BPSK           for the modeling and simulation of systems. In Simulink,
over Rayleigh Fading channel and its comparison with             systems are drawn on screen as block diagrams. Many
AWGN channel                                                     elements of block diagrams are available (such as transfer
                                                                 functions, summing junctions, etc.), as well as virtual
                                                                 input devices and output devices. Simulink is integrated
                                                                 with MATLAB and data can be easily transferred between
                                                                 the programs.




 Figure2: BPSK Modulation over Rayleigh and AWGN
                     channel
Figure2 refers to modulation and BPSK detection over
Rayleigh and AWGN channel. Using BPSK modulation,                Figure 4. Five channel with BPSK Modulation
randomly varying Rayleigh fading channel, Walsh
Issn 2250-3005(online)                                      September| 2012                              Page 1373
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



IV Results and Discussions
The reverse and forward Link interoperations comprise of
convolution encoding and repetition, block interleaving,
long PN sequence, data scrambling, Walsh coding and
Quadrature modulation shown in figure 5 and 6and
figure7shows BER for five channels. The signal which is
having highest receiving power and better BER that signal
is considered (output signal from figure 4) and used to
transmit the signal over ad hoc Network and shortest path
algorithm is used to transmit the signal from source to
destination.                                                                      Figure 8.Adhoc network




                                                                              Figure 9.Adhoc network routing

               Figure 5. Reverse channel.

                                                                                           Start


                                                                           Nodes send signal to find the number of
                                                                           other nodes within range



                                                                               Synchronizing between nodes



                                                                     Sender node send message to receiving node


               Figure 6 Forward channel.                             Receiving
                                                                     node Send          Is receiving
                                                                                                             Wait for
                                                                     back Ready         node ready
                                                                                                             sometime
                                                                     Signal



                                                                                    Communication begins



                                                                                    Termination Process



   Figure 7. BER for five channel                                                           Stop

                                                                         Figure 10.Adhoc network working



Issn 2250-3005(online)                                      September| 2012                                Page 1374
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



V Conclusion
In this paper, the simulation of statistical multipath
signal passing through five different channels is
presented. The signal having the highest SNR is
considered at the receiver and the BER for that
particular signal is calculated, and obtained signal is
again used in wireless communication application ie in
Ad hoc network to transmit the information from source
to destination which uses the shortest path algorithm.

References
[1]    IEEE standard for wireless LAN: Medium Access
       Control and Physical Layer Specification,
       P802.11, January 1999.
[2]    M. Satyanarayanan. Fundamental challenges in
       mobile computing. [3] M. Haardt W. Mohr R.
       Becher, M. Dillinger. Broadband wireless access
       and future communication
       networks. Proceedings of the IEEE, 89(1), 20
[4]    Fumiyaki Adachi, “error Rate Analysis of
       Differentially Encoded and detected 16-APSK
       under Rician fading”,IEEE Transactions on
       Vehicular Technology, Vol. 45, No.1, February
       1996
.[5]   Jiho Ryu, Jeong Keun Lee, Sung-Ju Lee and
       Taekyoung Kwon, “Revamping the IEEE 802.11a
       PHY Simulation Models”, MSWim‟ 08, October
       27-31, 2008, Vancouver,BC, Canada.
[6]    K.Chang- Joo H.-J. Lee and H.-S. Lee, “Adaptive
       acquisition of PN sequences for DSSS
       communications,” IEEE Trans. Commun., vol. 46,
       no. 8, pp. 99–996, Aug. 1998
[7]    K. Chang-Joo, “Adaptive acquisition of PN code in
       multipath fading channels,” IEE Electron. Lett., vol.
       38, no. 2, pp. 135–137, Jan. 2002
[8]    Mohammaed Slim Alouini and Andrea J. Goldsmith
       Capacity of Rayleigh fading channels under different
       Adaptive Transmission and Diversity combining
       Techniques”, IEEE Transactions on Vehicular
       Technology, Vol. 48, No. 4, July 1999.
[9].   Gary Breed, High Frequency Electronics, 2003
       submit Technical Media LLC “Bit Error Rate:
       Fundamenta l Concepts and measurement issues”.
[10]   Fumiyaki Adachi, “error Rate Analysis of
       Differentially Encoded and detected 16-APSK under
       Rician fading”, IEEE Transactions on Vehicular
       Technology, Vol. 45, No.1, February 1996.
[11]   Jiho Ryu, Jeong Keun Lee, Sung-Ju Lee and
       Taekyoung Kwon, “Revamping the IEEE 802.11a
       PHY Simulation Models”, MSWim‟ 08, October
       27-31, 2008, Vancouver, BC, Canada.
[12]   A. Alimohammad, S.F.Fard, B.F.Cockburn and
       C.Schlegal, “Compact Rayleigh and Rician fading
       simulation based on random walk processes”, IET
       Communications, 2009, Vol.3, Issue 8, pp 1333-
       1342.
[13]   Yahong Rosa Zheng and Chengshan Xiao,
       “Simulation models with correct statistical properties
       for Rayleigh fading channels”, IEEE Transactions on
       communications, Vol. 51, No. 6, June 2003.
Issn 2250-3005(online)                                          September| 2012                            Page 1375

Weitere ähnliche Inhalte

Was ist angesagt?

Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource Reuse
IJMTST Journal
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
ijtsrd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Ranjeet Bidwe
 

Was ist angesagt? (18)

Jp3417421749
Jp3417421749Jp3417421749
Jp3417421749
 
The Effect of PMD (Polarization Mode Dispersion) the Fibers of New and Old In...
The Effect of PMD (Polarization Mode Dispersion) the Fibers of New and Old In...The Effect of PMD (Polarization Mode Dispersion) the Fibers of New and Old In...
The Effect of PMD (Polarization Mode Dispersion) the Fibers of New and Old In...
 
Ss Ton 2008 Final
Ss Ton 2008 FinalSs Ton 2008 Final
Ss Ton 2008 Final
 
08 01 01
08 01 0108 01 01
08 01 01
 
Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource Reuse
 
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
 
Et24912915
Et24912915Et24912915
Et24912915
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms
 
Id103
Id103Id103
Id103
 
R04504114117
R04504114117R04504114117
R04504114117
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Cq24604607
Cq24604607Cq24604607
Cq24604607
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
 
Bt25420424
Bt25420424Bt25420424
Bt25420424
 
[11] Nu P 07 1
[11] Nu P 07 1[11] Nu P 07 1
[11] Nu P 07 1
 

Andere mochten auch

Anvita Wisp 2007 Presentation
Anvita Wisp 2007 PresentationAnvita Wisp 2007 Presentation
Anvita Wisp 2007 Presentation
guest6e7a1b1
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
IJNSA Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
FITSUM RISTU LAKEW
 
1e4 tss Stem Cell
1e4 tss Stem Cell1e4 tss Stem Cell
1e4 tss Stem Cell
Philip Wan
 

Andere mochten auch (20)

QuScient Higher Education Services
QuScient Higher Education ServicesQuScient Higher Education Services
QuScient Higher Education Services
 
Slavery
SlaverySlavery
Slavery
 
All digital wide range msar controlled duty cycle corrector
All digital wide range msar controlled duty cycle correctorAll digital wide range msar controlled duty cycle corrector
All digital wide range msar controlled duty cycle corrector
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
Wls2
Wls2Wls2
Wls2
 
DESIGN AN AR APPLICATION IN FINDING PREFERRED DINING PLACE WITH SOCIAL NETWOR...
DESIGN AN AR APPLICATION IN FINDING PREFERRED DINING PLACE WITH SOCIAL NETWOR...DESIGN AN AR APPLICATION IN FINDING PREFERRED DINING PLACE WITH SOCIAL NETWOR...
DESIGN AN AR APPLICATION IN FINDING PREFERRED DINING PLACE WITH SOCIAL NETWOR...
 
IIR London
IIR LondonIIR London
IIR London
 
Anvita Wisp 2007 Presentation
Anvita Wisp 2007 PresentationAnvita Wisp 2007 Presentation
Anvita Wisp 2007 Presentation
 
Slides
SlidesSlides
Slides
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Qualificacao acd
Qualificacao acdQualificacao acd
Qualificacao acd
 
Speak Up
Speak UpSpeak Up
Speak Up
 
Boletin Semanal Digital nº 351
Boletin Semanal Digital nº 351Boletin Semanal Digital nº 351
Boletin Semanal Digital nº 351
 
2 seminario de investigacion cap ii y iii
2  seminario de investigacion cap ii y iii2  seminario de investigacion cap ii y iii
2 seminario de investigacion cap ii y iii
 
Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETs
 
Historia Eadpaulino
Historia EadpaulinoHistoria Eadpaulino
Historia Eadpaulino
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
 
Aj25210213
Aj25210213Aj25210213
Aj25210213
 
1e4 tss Stem Cell
1e4 tss Stem Cell1e4 tss Stem Cell
1e4 tss Stem Cell
 

Ähnlich wie IJCER (www.ijceronline.com) International Journal of computational Engineering research

Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
villagopi
 
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
Louati siwar
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
ijasuc
 
Intersatellite laser crosslinks
Intersatellite laser crosslinksIntersatellite laser crosslinks
Intersatellite laser crosslinks
marvelo90
 

Ähnlich wie IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Dense wavelength division multiplexing....
Dense wavelength division multiplexing....Dense wavelength division multiplexing....
Dense wavelength division multiplexing....
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks
 
Ofdm based radcom system with improved
Ofdm based radcom system with improvedOfdm based radcom system with improved
Ofdm based radcom system with improved
 
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
Researchpaper cell resizing-based-interference-reduction-and-delay-avoid-rate...
 
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
Reconfigurable_Intelligent_Surfaces_for_Wireless_Communications_Principles_Ch...
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Intersatellite laser crosslinks
Intersatellite laser crosslinksIntersatellite laser crosslinks
Intersatellite laser crosslinks
 
Performance of modeling wireless networks in realistic environment
Performance of modeling wireless networks in realistic environmentPerformance of modeling wireless networks in realistic environment
Performance of modeling wireless networks in realistic environment
 
Hp3414121418
Hp3414121418Hp3414121418
Hp3414121418
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSSHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKS
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Statistical Multipath Signal Detection in CDMA for Ad hoc Network. H. Umadevi1, K.S. Gurumurthy2, Chandrakanth Gowda3 1 Department of Electronics & Communication, Dr Ambedkar Institute of Technology 2 Department of Electronics & Communication, UVCE, Bangalore 3 Department of Electronics & Communication, KSIT, Bangalore Abstract: Mobile ad hoc networks (MANETs) represent complex Characters and Fundamental Challenges of Wireless distributed systems that comprise wireless mobile nodes Ad-hoc Networks that can freely and dynamically self-organize into arbitrary Since Wireless Ad-hoc Networks are inherently different and temporary, ‘‘ad-hoc’’ network topologies, allowing from the well-known wired networks, it is an absolutely people and devices to seamlessly internetwork in areas new architecture. Thus some challenges raise from the two with no pre-existing communication infrastructure, e.g., key aspects: self-organization and wireless transport of disaster recovery environments. Ad hoc networking information [2], [3]. First of all, since the nodes in a concept is not a new one, having been around in various Wireless Ad-hoc Network are free to move arbitrarily at forms for over 20years.Ad Hoc networks are multi-hop any time. So the networks topology of MANET may wireless networks where nodes may be mobile. These change randomly and rapidly at unpredictable times. This types of networks are used in situations where temporary makes routing difficult because the topology is constantly network connectivity is needed. Ad hoc networks are changing and nodes cannot be assumed to have persistent formed on a dynamic basis, i.e. a number of users may data storage. In the worst case, we do not even know wish to exchange information and services between each whether the node will still remain next minute, because the other on an ad hoc basis, in order to do this they will need node will leave the network at any minute. Bandwidth to form an Ad Hoc network. Multipath signal detection is constrained is also a big challenge. Wireless links have done using BPSK for CDMA Extended for OFDM and significantly lower capacity than their hardwired calculated the BER and that signal is analyzed in Ad hoc counterparts. Also, due to multiple access, fading, noise, Network. and interference conditions etc. the wireless links have low throughput. Energy constrained operation. Some or all Keywords: Ad hoc, BER, BPSK, CDMA, MANETs, of the nodes in a MANET may rely on batteries. In this OFDM, SNR. scenario, the most important system design criteria for optimization may be energy conservation. Limited I Introduction physical security: Mobile networks are generally more It is important to evaluate the performance of wireless prone to physical security threats than are fixed cable devices by considering the transmission characteristics, networks. MANETs are internetworks formed by mobile wireless channel parameters and device structure. The wireless routers, with each router having one or more performance of data transmission over wireless channels is associated host devices (e.g., computers and sensors). A well captured by observing their BER, which is a function MANET’s router implements routing protocols that— of SNR [1] at the receiver. In wireless channels, several unlike conventional routing techniques—tolerate rapid models have been proposed and investigated to calculate changes in connectivity among nodes. The paper is SNR. All the models are a function of the distance organized as follows. Section II explains Rayleigh fading, between the sender and the receiver, the path loss CDMA, and OFDM. Section III deals with the exponent and the channel gain. Several probability implementation. Section IV deals with results and distributed functions are available to model a time-variant discussions. The paper is concluded in Section parameter i.e. channel gain. The term ad hoc often means improvised or for the needs o the moment for a specific II Rayleigh Fading, Cdma, and Ofdm purpose. In Computer networking, we The Rayleigh fading is primarily caused by multipath Think of ad hoc network as a wireless network. Without reception [4]. Rayleigh fading is a statistical model for the any infrastructure, e.g. wireless base effect of a propagation environment on a radio signal. It is Stations. More thoroughly described, an ad hoc network a reasonable model for troposphere and ionospheres signal consists of a number of nodes with wireless propagation as well as the effect of heavily built-up urban communication capabilities that potentially move around environments on radio signals. Rayleigh fading [5] is most and cause the network topology to change frequently. applicable when there is no line of sight between the transmitter and receiver. Rayleigh fading is a statistical model for the effect of a propagation environment on a radio signal, such as that used by wireless devices. Rayleigh fading models assume that the magnitude of a signal that has passed through such Issn 2250-3005(online) September| 2012 Page 1371
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 a transmission medium (also called a communications 2. Near Far Problem: channel) will vary randomly, or fade, according to The problem is best described by taking and considering a a Rayleigh distribution the radial component of the sum of receiver and two transmitters (one close to the receiver; two uncorrelated Gaussian random variables. Rayleigh the other far away). If both transmitters transmit fading model: The Rayleigh fading is primarily caused by simultaneously and at equal powers, then due to the multipath reception. Rayleigh fading is a statistical model for inverse square, the receiver will receive more power from the effect of a propagation environment on a radio signal. the nearer transmitter. This makes the farther transmitter It is a reasonable model for troposphere and ionosphere voice more difficult to understand. Since one signal propagation as well as the effect of heavily built-up transmission's signal than the farther transmitter, then the urban environments on radio signals. Rayleigh fading is SNR for the farther transmitter may be below detect most applicable when there is no line of sight between the ability and the farther transmitter may just as well not transmitter and receiver. transmit. This effectively jams the communication channel. Rayleigh fading is a reasonable model when there are many objects in the environment that scatter the radio OFDM signal before it arrives at the receiver. The central limit Recently, a worldwide convergence has occurred for the theorem holds that, if there is sufficiently much scatter, the use of Orthogonal Frequency Division multiplexing channel impulse response will be well-modeled as (OFDM) as an emerging technology for high data rates. In a Gaussian process irrespective of the distribution of the particular, many wireless standards (Wi-max, individual components. If there is no dominant component IEEE802.11a, LTE, and DVB) have adopted the OFDM to the scatter, then such a process will have zero mean and technology as a mean to increase dramatically future phase evenly distributed between 0 and 2π radians. wireless communications. OFDM is a particular form of The envelope of the channel response will therefore Multi-carrier transmission and is suited for frequency be Rayleigh distributed. selective channels and high data rates. This technique In CDMA there is no restriction on time and frequency. In transforms a frequency-selective wide-band channel into a this scheme all the users can transmit at all times and at all group of non-selective narrowband channels, which makes frequencies, as shown in Fig 1. Because users are isolated it robust against large delay spreads by preserving by code, they can share the same carrier frequency, orthogonality in the frequency domain. Moreover, the eliminating the frequency reuse problem encountered in ingenious introduction of cyclic redundancy at the other transmitter reduces the complexity. Technologies. Multicarrier modulation splits the broadband channel into a large number of (narrowband) sub channels. The total bit stream is divided over these sub channels. These bits are modulated per sub channel onto a subcarrier with standard narrowband modulation techniques like PSK or QAM. The sum of all the modulated subcarriers forms the composite multicarrier signal that is sent over the channel. When the subcarriers are orthogonal, the sub channels may overlap without interfering each other, resulting in a Fig1. Code Division Multiple Access high spectral efficiency (compared to e.g. frequency Problems in Cdma Detection division multiplexing, where all the sub channels are There are two problems encountered in CDMA Detection separated by guard bands to prevent interference). The generation of these subcarriers is done in the digital 1. Multipath Fading: domain, so that only one global local oscillator is needed In a mobile environment, a mobile station will receive one instead of one for each subcarrier. Normally the Fourier direct signal from the base station and multiple signals Transform is used. which are reflected from obstructions like buildings and towers as shown in Fig 4. Each signal would have traveled A. Theoretical BER a different length and would be displaced in time. Due to The BER, or quality of the digital link, is calculated from this, when they are combined at the mobile handset, it will the number of bits received in error divided by the number cause interference resulting in poor signal quality. This is of bits transmitted. known as fading. This problem is handled in a very good way in CDMA. Here, the phase of the multiple signals is BER= (Bits in Error) / (Total bits received). modified such that only positive interference (addition) takes place and the overall signal strength. A receiver that In digital transmission, the number of bit errors is the implements the above principle is known as RAKE number of received bits of a data stream over a receiver. communication channel that has been altered due to noise, interference, distortion or bit synchronization errors. The BER is the number of bit errors divided by the total Issn 2250-3005(online) September| 2012 Page 1372
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 number of transferred bits during a particular time spreading code, number of sub carriers 4, number of users interval. BER is a unit less 15 and other parameters same as [6,8]. Performance measure, often expressed as a percentage [7]. B. Simulation Results The theoretical BER for BPSK modulation scheme over Rayleigh fading channel (with AWGN noise) is given by The theoretical BER for BPSK modulation scheme over an AWGN channel is given here for comparison Figure 3.Eb/N0Vs BER The Simulated and theoretical performance curves (Eb/N0 Eb / N0 BER in AWGN BER in Rayleigh Vs BER) for BPSK modulation over Rayleigh Fading channel and the AWGN is shown in table and in figure2. -5 : 0 0.1064 0.1033 III Implementation 0: 5 0. 0952 0.0944 Figure4. shows the generated signal from modulator is transmitted in multipath via Rayleigh fading[9,10] channel 5: 10 0. 0578 0.0608 and at the receiver side having highest received power signal is compared with threshold value and reordered in 10: 15 0. 0235 0.0275 descending order using statistical algorithm. The signal having highest receiving power is selected for BER 15: 20 0. 0078 0.01 calculation. The implementation here is considered for five channels. In this paper, one of the important topic in 20 : 25 0. 0025 0.0029 wireless communications that is the concept of fading[11- Table 1. BER in AWGN and Rayleigh fading channel 13] is demonstrated by the approach available in MATLAB. Simulink is a graphical extension to MATLAB The following model is used for the simulation of BPSK for the modeling and simulation of systems. In Simulink, over Rayleigh Fading channel and its comparison with systems are drawn on screen as block diagrams. Many AWGN channel elements of block diagrams are available (such as transfer functions, summing junctions, etc.), as well as virtual input devices and output devices. Simulink is integrated with MATLAB and data can be easily transferred between the programs. Figure2: BPSK Modulation over Rayleigh and AWGN channel Figure2 refers to modulation and BPSK detection over Rayleigh and AWGN channel. Using BPSK modulation, Figure 4. Five channel with BPSK Modulation randomly varying Rayleigh fading channel, Walsh Issn 2250-3005(online) September| 2012 Page 1373
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 IV Results and Discussions The reverse and forward Link interoperations comprise of convolution encoding and repetition, block interleaving, long PN sequence, data scrambling, Walsh coding and Quadrature modulation shown in figure 5 and 6and figure7shows BER for five channels. The signal which is having highest receiving power and better BER that signal is considered (output signal from figure 4) and used to transmit the signal over ad hoc Network and shortest path algorithm is used to transmit the signal from source to destination. Figure 8.Adhoc network Figure 9.Adhoc network routing Figure 5. Reverse channel. Start Nodes send signal to find the number of other nodes within range Synchronizing between nodes Sender node send message to receiving node Figure 6 Forward channel. Receiving node Send Is receiving Wait for back Ready node ready sometime Signal Communication begins Termination Process Figure 7. BER for five channel Stop Figure 10.Adhoc network working Issn 2250-3005(online) September| 2012 Page 1374
  • 5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 V Conclusion In this paper, the simulation of statistical multipath signal passing through five different channels is presented. The signal having the highest SNR is considered at the receiver and the BER for that particular signal is calculated, and obtained signal is again used in wireless communication application ie in Ad hoc network to transmit the information from source to destination which uses the shortest path algorithm. References [1] IEEE standard for wireless LAN: Medium Access Control and Physical Layer Specification, P802.11, January 1999. [2] M. Satyanarayanan. Fundamental challenges in mobile computing. [3] M. Haardt W. Mohr R. Becher, M. Dillinger. Broadband wireless access and future communication networks. Proceedings of the IEEE, 89(1), 20 [4] Fumiyaki Adachi, “error Rate Analysis of Differentially Encoded and detected 16-APSK under Rician fading”,IEEE Transactions on Vehicular Technology, Vol. 45, No.1, February 1996 .[5] Jiho Ryu, Jeong Keun Lee, Sung-Ju Lee and Taekyoung Kwon, “Revamping the IEEE 802.11a PHY Simulation Models”, MSWim‟ 08, October 27-31, 2008, Vancouver,BC, Canada. [6] K.Chang- Joo H.-J. Lee and H.-S. Lee, “Adaptive acquisition of PN sequences for DSSS communications,” IEEE Trans. Commun., vol. 46, no. 8, pp. 99–996, Aug. 1998 [7] K. Chang-Joo, “Adaptive acquisition of PN code in multipath fading channels,” IEE Electron. Lett., vol. 38, no. 2, pp. 135–137, Jan. 2002 [8] Mohammaed Slim Alouini and Andrea J. Goldsmith Capacity of Rayleigh fading channels under different Adaptive Transmission and Diversity combining Techniques”, IEEE Transactions on Vehicular Technology, Vol. 48, No. 4, July 1999. [9]. Gary Breed, High Frequency Electronics, 2003 submit Technical Media LLC “Bit Error Rate: Fundamenta l Concepts and measurement issues”. [10] Fumiyaki Adachi, “error Rate Analysis of Differentially Encoded and detected 16-APSK under Rician fading”, IEEE Transactions on Vehicular Technology, Vol. 45, No.1, February 1996. [11] Jiho Ryu, Jeong Keun Lee, Sung-Ju Lee and Taekyoung Kwon, “Revamping the IEEE 802.11a PHY Simulation Models”, MSWim‟ 08, October 27-31, 2008, Vancouver, BC, Canada. [12] A. Alimohammad, S.F.Fard, B.F.Cockburn and C.Schlegal, “Compact Rayleigh and Rician fading simulation based on random walk processes”, IET Communications, 2009, Vol.3, Issue 8, pp 1333- 1342. [13] Yahong Rosa Zheng and Chengshan Xiao, “Simulation models with correct statistical properties for Rayleigh fading channels”, IEEE Transactions on communications, Vol. 51, No. 6, June 2003. Issn 2250-3005(online) September| 2012 Page 1375